Results (16)
Search Parameters:
Keyword: ScalableEfficient and Scalable Ant Colony Optimization based WSN Routing Protocol for IoT
IoT integrates and connects intelligent devices or objects with varied architectures and resources. The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. Wireless Sensor Network (WSN) has…
Read MoreA Resolution-Reconfigurable and Power Scalable SAR ADC with Partially Thermometer Coded DAC
Power consumption is becoming more and more important in the Internet of Things (IOT). The ADC is the main power hungry in multi-sensor electronic systems and effectively reducing ADC power consumption without affecting ADC characteristics is an important. This paper is extended from the conference paper. The segmented SAR ADC presents reconfigurable 9 to 12-bit…
Read MoreStradNet: Automated Structural Adaptation for Efficient Deep Neural Network Design
Deep neural networks (DNNs) have demonstrated remarkable success across a wide range of machine learning tasks. However, determining an effective network architecture, particularly the sizes of the hidden layers, remains a significant challenge and often relies on inefficient trial-and-error experimentation. In this paper, we propose an automated architecture design approach based on structurally adaptive DNNs,…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreCooperative Game Theory for Grid Service Pricing: A Utility-Centric Approach
This study presents a novel alternative to traditional Net Energy Metering (NEM) by proposing a set of innovative pricing schemes for solar customers participating in utility-led grid service programs through the aggregation of Distributed Energy Resources (DERs). Grounded in cooperative game theory, the proposed framework facilitates equitable and efficient value allocation among key stakeholders, namely…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MoreWeb-based Remote Lab System for Instrumentation and Electronic Learning
Lab sessions in Engineering Education are designed to reinforce theoretical concepts. However, there is usually not enough time to reinforce all of them. Remote and virtual labs give students more time to reinforce those concepts. In particular, with remote labs, this can be done interacting with real lab instruments and specific configurations. This work proposes…
Read MorePerformance Evaluation Reprogrammable Hybrid Fiber-Wireless Router Testbed for Educational Module
Fiber-Wireless (FiWi) network is an integration of fiber optic and wireless connections in the same network. It is one of the best solutions to overcome rapid increment of Internet users and bandwidth-hungry services. To facilitate fundamental knowledge and further understanding on FiWi for students and researchers at the university level, this article proposes the development…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreA Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador
It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…
Read MoreImproved Hybrid Opponent System for Professional Military Training
Described herein is a general-purpose software engineering architecture for autonomous, computer controlled opponent implementation in modern maneuver warfare simulation and training. The implementation has been developed, refined, and tested in the user crucible for several years. The approach represents a hybrid application of various well-known AI techniques, including domain modeling, agent modeling, and object-oriented programming.…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read MoreWireless Android Based Home Automation System
This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…
Read More
