Search
Now showing items 741-750 of 860
Analysis of offshore wind turbine by considering soil-pile-structure interaction: effects of foundation and sea-wave properties
(Taylor & Francis, 2022)
Prediction of the dynamic performance of an offshore wind turbine (OWT) requires consideration of many different design parameters. Besides the superstructure, the OWT foundation also plays an important role both functionally ...
Drone routing for post-disaster damage assessment
(Springer, 2021)
We consider drones to support post-disaster damage assessment operations when the disaster-affected area is divided into grids and grids are clustered based on their attributes. Specifically, given a set of drones and a ...
Efficient resource allocation scheme in multi-user liFi networks based on angle oriented transceiver
(IEEE, 2021)
In this paper, an efficient resource allocation scheme in multi-user LiFi networks is proposed using the angle oriented (AO) technology at the receiver and transmitter sides. To cope with the inter-symbol and inter-user ...
Curriculum learning for face recognition
(IEEE, 2021)
We present a novel curriculum learning (CL) algorithm for face recognition using convolutional neural networks. Curriculum learning is inspired by the fact that humans learn better, when the presented information is organized ...
Developing session-based personalized accommodation recommender system by using LSTM
(IEEE, 2022)
Tourism sector has been transformed by the advances in the Internet technology. Users can search for information and can select their destination from various alternatives by themselves, which brings the need for personal ...
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)
Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ...
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
(IEEE, 2021)
Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ...
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
(The ACM Digital Library, 2020-03-16)
The emergence of the internet of Things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a personal ...
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication
(Elsevier, 2022-11-24)
Software-Defined Networking (SDN) is a promising networking paradigm that brings central management and network programmability to improve existing networking systems. However, SDN has several security threats due to its ...
TruSD: Trust framework for service discovery among IoT devices
(Elsevier, 2020-09-04)
IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ...
Share this page