Search
Now showing items 911-920 of 1375
Basic psychological needs in relationships with parents and best friend and identity statuses among Turkish emerging adults
(Springer, 2022-05)
The present study a) compared emerging adults’ perceived basic psychological needs (autonomy, relatedness, competence) satisfaction (BPNS) in their relationships with their parents and best friends b) examined the links ...
Efficient resource allocation scheme in multi-user liFi networks based on angle oriented transceiver
(IEEE, 2021)
In this paper, an efficient resource allocation scheme in multi-user LiFi networks is proposed using the angle oriented (AO) technology at the receiver and transmitter sides. To cope with the inter-symbol and inter-user ...
Curriculum learning for face recognition
(IEEE, 2021)
We present a novel curriculum learning (CL) algorithm for face recognition using convolutional neural networks. Curriculum learning is inspired by the fact that humans learn better, when the presented information is organized ...
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)
Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ...
Deep learning-based speaker-adaptive postfiltering with limited adaptation data for embedded text-to-speech synthesis systems
(Elsevier, 2023-06)
End-to-end (e2e) speech synthesis systems have become popular with the recent introduction of text-to-spectrogram conversion systems, such as Tacotron, that use encoder–decoder-based neural architectures. Even though those ...
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
(IEEE, 2021)
Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ...
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication
(Elsevier, 2022-11-24)
Software-Defined Networking (SDN) is a promising networking paradigm that brings central management and network programmability to improve existing networking systems. However, SDN has several security threats due to its ...
TruSD: Trust framework for service discovery among IoT devices
(Elsevier, 2020-09-04)
IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ...
Sorec: Self-organizing and resource efficient clustered blockchain network
(Elsevier, 2023-09)
With the emergence of Industry 4.0, the features of the technologies that are utilized in broad range of areas are obliged to change according to the new necessities. Especially, the network requirements have to be adopted ...
SUTSEC: SDN Utilized trust based secure clustering in IoT
(Elsevier, 2020-09-04)
Internet of Things (IoT) technology consists of huge number of heterogeneous devices that create enormous amount of data. Providing a robust communication for billions of devices is one of the most significant challenges ...
Share this page