Search results for "Computer Networks"

showing 10 items of 860 documents

Energy Efficient Resource Allocation for Wireless Power Transfer Enabled Collaborative Mobile Clouds

2016

In order to fully enjoy high rate broadband multimedia services, prolonging the battery lifetime of user equipment is critical for mobile users, especially for smartphone users. In this paper, the problem of distributing cellular data via a wireless power transfer enabled collaborative mobile cloud (WeCMC) in an energy efficient manner is investigated. WeCMC is formed by a group of users who have both functionalities of information decoding and energy harvesting, and are interested for cooperating in downloading content from the operators. Through device-to-device communications, the users inside WeCMC are able to cooperate during the downloading procedure and offload data from the base sta…

ScheduleenergiatehokkuusComputer Networks and CommunicationsComputer sciencewireless power transfer02 engineering and technology7. Clean energyBase station0203 mechanical engineeringresources allocation0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic Engineeringenergy efficiencyta113collaborative mobile cloudscontent distributionta213business.industryQuality of service020206 networking & telecommunications020302 automobile design & engineeringEnergy consumptionUser equipmentMobile telephonybusinessComputer networkEfficient energy useIEEE Journal on Selected Areas in Communications
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks

2018

Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...

Scheme (programming language)Computer Networks and Communicationsbusiness.industryComputer science010401 analytical chemistry020206 networking & telecommunications02 engineering and technologyCommunications system01 natural sciences0104 chemical sciencesComputer Science ApplicationsHardware_GENERALHardware and ArchitectureOn demandSignal Processing0202 electrical engineering electronic engineering information engineeringWireless energy harvestingInternet of ThingsbusinessEnergy harvestingcomputerEnergy (signal processing)Information Systemscomputer.programming_languageComputer networkIEEE Internet of Things Journal
researchProduct

Attribute based access control scheme with controlled access delegation for collaborative E-health environments

2017

Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …

Scheme (programming language)Computer access controlDelegationRevocationComputer Networks and CommunicationsComputer sciencebusiness.industrymedia_common.quotation_subject020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineeringPhysical accessRole-based access controlSafety Risk Reliability and QualitybusinesscomputerSoftwaremedia_commoncomputer.programming_languageJournal of Information Security and Applications
researchProduct

Receiver-Initiated Data Collection in Wake-Up Radio Enabled mIoT Networks: Achieving Collision-Free Transmissions by Hashing and Partitioning

2021

To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of Things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, a WuR enabled IoT device can be woken up for data transmission at any time by a wake-up call (WuC). However, collisions happen among WuCs for transmitter-initiated data reporting and among data packets for receiver-initiated data collection . In this article, we propose three novel hashing-based schemes in order to achieve collision-free data transmissions for receiver-initiated data collection. We consider first a simple scenario where all devices in a region of interest …

Scheme (programming language)Data collectionSIMPLE (military communications protocol)Computer Networks and CommunicationsRenewable Energy Sustainability and the Environmentbusiness.industryNetwork packetComputer scienceHash functionVDP::Technology: 500Energy consumptionUploadbusinesscomputercomputer.programming_languageComputer networkData transmission
researchProduct

Multi-beam cooperative frequency reuse for coordinated multi-point transmission

2010

Coordinated multi-point (CoMP) joint transmission is considered in the 3rd generation partnership project (3GPP) long term evolution (LTE)-advanced as a key technique to mitigate inter-cell interference and improve the cell-edge performance. To effectively apply CoMP joint transmission, efficient frequency reuse schemes need to be designed to support resource management cooperation among coordinated cells. However, most of the existing frequency reuse schemes are not suitable for CoMP systems due to not considering multi-point joint transmission scenarios in their frequency reuse rules. In addition, the restrictions of frequency resources in those schemes result in a high blocking probabili…

Scheme (programming language)Operations researchComputer Networks and CommunicationsComputer scienceDistributed computingInterference (wave propagation)Blocking (statistics)LTE AdvancedTelecomunicacióTransmission (telecommunications)Signal ProcessingKey (cryptography)Resource managementThroughput (business)computerComunicació i tecnologiaInformation Systemscomputer.programming_language
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

Multi-cloud privacy preserving schemes for linear data mining

2015

This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…

Scheme (programming language)privacy linear data miningSIMPLE (military communications protocol)Computer sciencebusiness.industryPrivacy softwareSettore ING-INF/03 - TelecomunicazioniCloud computingcomputer.software_genreSecret sharingComputer Networks and CommunicationFeature (machine learning)Overhead (computing)Data miningElectrical and Electronic EngineeringbusinesscomputerComputer networkcomputer.programming_language
researchProduct

User Evaluation of the Smartphone Screen Reader VoiceOver with Visually Disabled Participants

2018

Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing hand gestures to interact with a touch user interface. In a global perspective, the World Health Organisation estimates that around 285 million people are visually disabled with 2/3 of them over 50 years old. This paper presents the user evaluation of VoiceOver, a built-in screen reader in Apple Inc. products, with a detailed analysis of the gesture interaction, familiarity and training by visually disabled users and the system response. Six participants with prescribed visual disability took part in the tests in a usability laboratory under controlled con…

Screen readerArticle SubjectComputer Networks and Communicationsbusiness.industryComputer scienceTouch user interface05 social sciencesPerspective (graphical)UsabilityVisual disabilityTK5101-6720Computer Science Applicationslaw.invention03 medical and health sciences0302 clinical medicineTouchscreenHuman–computer interactionlawTelecommunication030221 ophthalmology & optometry0501 psychology and cognitive sciencesbusinessMobile device050107 human factorsGesture
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct