Search
Now showing items 2851-2860 of 3460
Efficient resource allocation scheme in multi-user liFi networks based on angle oriented transceiver
(IEEE, 2021)
In this paper, an efficient resource allocation scheme in multi-user LiFi networks is proposed using the angle oriented (AO) technology at the receiver and transmitter sides. To cope with the inter-symbol and inter-user ...
Platform control during battles for market dominance: The case of Apple versus IBM in the early personal computer industry
(Elsevier, 2016)
We conduct a case study of the battle for market dominance between the industry platforms led by Apple and by IBM in the early personal computer industry (1977–1986). Platform leaders such as Apple or IBM need to consider ...
Curriculum learning for face recognition
(IEEE, 2021)
We present a novel curriculum learning (CL) algorithm for face recognition using convolutional neural networks. Curriculum learning is inspired by the fact that humans learn better, when the presented information is organized ...
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)
Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ...
Deep learning-based speaker-adaptive postfiltering with limited adaptation data for embedded text-to-speech synthesis systems
(Elsevier, 2023-06)
End-to-end (e2e) speech synthesis systems have become popular with the recent introduction of text-to-spectrogram conversion systems, such as Tacotron, that use encoder–decoder-based neural architectures. Even though those ...
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
(IEEE, 2021)
Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ...
CWT-DPA: Component-wise waiting time for BC-enabled data plane authentication
(Elsevier, 2022-11-24)
Software-Defined Networking (SDN) is a promising networking paradigm that brings central management and network programmability to improve existing networking systems. However, SDN has several security threats due to its ...
TruSD: Trust framework for service discovery among IoT devices
(Elsevier, 2020-09-04)
IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ...
Sorec: Self-organizing and resource efficient clustered blockchain network
(Elsevier, 2023-09)
With the emergence of Industry 4.0, the features of the technologies that are utilized in broad range of areas are obliged to change according to the new necessities. Especially, the network requirements have to be adopted ...
SUTSEC: SDN Utilized trust based secure clustering in IoT
(Elsevier, 2020-09-04)
Internet of Things (IoT) technology consists of huge number of heterogeneous devices that create enormous amount of data. Providing a robust communication for billions of devices is one of the most significant challenges ...
Share this page