Search
Now showing items 1-10 of 1720
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ...
A new approach of clustering based machine-learning algorithm
(
Elsevier B.V.
, 2005 , Article)
Machine-learning research is to study and apply the computer modeling of learning processes in their multiple manifestations, which facilitate the development of intelligent system. In this paper, we have introduced a ...
Cooperative Q-learning techniques for distributed online power allocation in femtocell networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks
(
IEEE
, 2013 , Conference Paper)
Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Guest Editorial: Special Issue on: WiMAX security and applications
(
John Wiley & Sons, Ltd.
, 2009 , Article)
Estimating design effort for the compressor design department: a case study at Pratt & Whitney Canada
(
Elsevier Ltd
, 2009 , Article)
The effort required in a design project not only impacts the final cost, but also the project lead-time. This paper presents a case study carried out with the collaboration of Pratt & Whitney Canada, a global leader in the ...
Designing Decision Support Systems for Humanitarian Organisations
(
John Wiley & Sons, Inc.
, 2015 , Book chapter)
The first step to ensure the success of applications in a specific field consists in producing a complete and representative model of the studied system. This alignment with reality is not easy to achieve though. This is ...
Controlling Error Propagation in Network-Coded Cooperative Wireless Systems
(
IEEE
, 2009 , Article)
In cooperative communications, error propagation at relays degrades the diversity order of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error ...