Search
Now showing items 261-270 of 318
Distributed MIMO for Li-Fi: Channel measurements, ray tracing and throughput analysis
(IEEE, 2021-08-15)
LiFi has been considered as a promising candidate for future wireless indoor networks. The IEEE P802.15.13 and P802.11bb standardization groups agreed upon channel models generated using the non-sequential ray tracing ...
Drone routing for post-disaster damage assessment
(Springer, 2021)
We consider drones to support post-disaster damage assessment operations when the disaster-affected area is divided into grids and grids are clustered based on their attributes. Specifically, given a set of drones and a ...
Efficient resource allocation scheme in multi-user liFi networks based on angle oriented transceiver
(IEEE, 2021)
In this paper, an efficient resource allocation scheme in multi-user LiFi networks is proposed using the angle oriented (AO) technology at the receiver and transmitter sides. To cope with the inter-symbol and inter-user ...
Curriculum learning for face recognition
(IEEE, 2021)
We present a novel curriculum learning (CL) algorithm for face recognition using convolutional neural networks. Curriculum learning is inspired by the fact that humans learn better, when the presented information is organized ...
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
(IEEE, 2021)
Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ...
SeCaS: Secure capability sharing framework for IoT devices in a structured P2P network
(The ACM Digital Library, 2020-03-16)
The emergence of the internet of Things (IoT) has resulted in the possession of a continuously increasing number of highly heterogeneous connected devices by the same owner. To make full use of the potential of a personal ...
TruSD: Trust framework for service discovery among IoT devices
(Elsevier, 2020-09-04)
IoT provides an environment which enables access to a plethora of different services. In order to reach these services, devices need to decide if the providers are trustable or not. The decision to trust a node with whom ...
SUTSEC: SDN Utilized trust based secure clustering in IoT
(Elsevier, 2020-09-04)
Internet of Things (IoT) technology consists of huge number of heterogeneous devices that create enormous amount of data. Providing a robust communication for billions of devices is one of the most significant challenges ...
Solver agent: Towards emotional and opponent-aware agent for human-robot negotiation
(International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), 2021)
Negotiation is one of the crucial processes for resolving conflicts between parties. In automated negotiation, agent designers mostly take opponent's offers and the remaining time into account while designing their strategies. ...
A decentralized token-based negotiation approach for multi-agent path finding
(Springer, 2021)
This paper introduces a negotiation approach to solve the Multi-Agent Path Finding problem. The approach aims to achieve a good trade-off between the privacy of the agents and the effectiveness of solutions. Accordingly, ...
Share this page