scispace - formally typeset
Search or ask a question

Showing papers in "Digital Communications and Networks in 2019"


Journal ArticleDOI
Liang Huang1, Xu Feng1, Cheng Zhang1, Li Ping Qian1, Yuan Wu1 
TL;DR: A Deep-Q Network (DQN) based task offloading and resource allocation algorithm for the MEC system is proposed and extensive numerical results show that the proposed DQN-based approach can achieve the near-optimal performance.

160 citations


Journal ArticleDOI
TL;DR: This paper proposes an approach that involves device-driven and human-driven intelligence as key enablers to reduce energy consumption and latency in fog computing via two case studies that make use of the machine learning to detect user behaviors and perform adaptive low-latency Medium Access Control (MAC)-layer scheduling among sensor devices.

121 citations


Journal ArticleDOI
TL;DR: An empirical evaluation is included that demonstrates proof of concept attacks on commercial wearable devices and shows how SecuWear captures the information necessary for identifying such attacks, and a process for releasing attack and mitigation information to the security community.

25 citations


Journal ArticleDOI
TL;DR: This paper introduces k-partite graph theory to model the vertical handover problem and shows that the proposed approach can achieve better performance of QoS than the existing algorithms for FTP traffic and video streaming.

24 citations


Journal ArticleDOI
TL;DR: Simulation results show that the proposed KNN and SVM based PR-TAS algorithms are capable of striking a flexible tradeoff between the complexity and the Bit Error Rate (BER), and the new feature can effectively improve the BER performance compared with the conventional feature extraction method.

22 citations


Journal ArticleDOI
TL;DR: The simulative study of the GPLB shows that there is a big improvement in performance metrics and the latency and the jitter are minimized, and the maximum throughput in comparison with related works and has performed better in the heavy traffic situation.

17 citations


Journal ArticleDOI
TL;DR: A comparative study of two widely used classes of ICN name resolution and routing schemes, namely flooding and Distributed Hash Table (DHT), reveals insights into the design tradeoffs and offers guidelines for design strategies.

17 citations


Journal ArticleDOI
TL;DR: The proposed SDN assisted Stackelberg Game (SaSG) model proves better when compared with other game theory models, and hence an optimal data offloading is achieved.

15 citations


Journal ArticleDOI
TL;DR: This paper studies a joint content caching and updating strategy in IoT networks, taking both the energy consumption of the sensors and the freshness loss of the contents into account, and devise a Harmony Search based content Caching and Updating algorithm, which is self-learning and derivative-free.

13 citations


Journal ArticleDOI
TL;DR: The proposed EECDH scheme is used to exchange the secured shared key among multiple owners and also to eliminate the Man-In-The-Middle (MITM) attacks with less computational complexity.

13 citations


Journal ArticleDOI
TL;DR: Simulation results and analysis show that the proposed model and algorithm can achieve the optimal allocation of caching resource and improve the QoE of users.

Journal ArticleDOI
TL;DR: An Extended Kalman Filter (EKF) based detection method is proposed for the detection of weak harmonic signal, which avoids matrix inversion by iterating measurement equation and state equation, which simultaneously improves the robustness and reduces the complexity.


Journal ArticleDOI
TL;DR: The MMN-CDR, when forensically analyzed, reveals an increase in time efficiency over the existing CDR due to its high absolute speed and higher accuracy and completeness percentage are both obtained.

Journal ArticleDOI
TL;DR: The recent progress in the study of Traffic-Driven Epidemic Spreading (TDES) on complex networks is surveyed and the key factors which have significant impact on the epidemic threshold are analyzed.

Journal ArticleDOI
TL;DR: This paper proposes the use of Role-Based Access Control and Mandatory Access Control to define permissions based on role and/or the sensitivity level of services to control the access of who can invoke which services of FHIR RESTful APIs that manage the sensitive healthcare data.

Journal ArticleDOI
TL;DR: A novel analytical model is presented that can relate the application to network packet loss and be used to estimate the effect of lossy wireless channels in CoAP scenarios and is ultimately validated by an experimental framework.

Journal ArticleDOI
TL;DR: This research modeled a WBN as a large-scale random network where the path-loss models of homogenous and heterogenous WBNs were reduced to GDM and RGDM, respectively, and the bounds of the critical density regime were derived for both percolation models.

Journal ArticleDOI
TL;DR: This paper proposes a novel strategy for further improving energy efficiency by considering ternary state transceivers for an AeBSs, and proposes a Markovian Decision Process (MDP) based algorithm, which intelligently switches between three states of the transceIVERS based on the offered traffic meanwhile maintaining a prescribed minimum channel rate per user.

Journal ArticleDOI
TL;DR: A time-aware searchable encryption with designated server is proposed, based on Boneh's public key encryption with keyword search and Rivest's timed-release cryptology, which is securer and more efficient than the existing similar schemes.

Journal ArticleDOI
TL;DR: The extensive experimental results show that the proposed approach is capable of constructing a physically-labeled mobility map from the sporadically-collected crowdsourced motion traces as well as achieving satisfactory localization accuracy in a cost-efficient manner.

Journal ArticleDOI
TL;DR: Simulation results show that the use of co-operative load balancing technique improves the QoS in the C-RAN by reducing the blocking probability and UE waiting time, and the proposed CLB aims to maximize the utilization of hardware resources at the RRH and C-BBU.

Journal ArticleDOI
TL;DR: A novel fraudulent user detection method based solely on the app usage patterns of legitimate users is explored and reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone.

Journal ArticleDOI
TL;DR: AdaptiveMutate, a privacy-leak thwarting technique to defend against the statistical traffic analysis of apps, is proposed and it is concluded that the algorithm is most efficient when it mutates a feature of one app to its most dissimilar one in another app.

Journal ArticleDOI
TL;DR: This paper proposes an S-Transformation (ST) based approach to solve the problems of interpolating missing data in high frequency signals and shows that the proposed scheme outperforms others by improving the accuracy of edge detection.

Journal ArticleDOI
TL;DR: Analysis and simulations for a flat fading channel show that the proposed QSM-IDM method significantly outperforms the original QSM system with the same data rate, while maintaining a relatively acceptable complexity.

Journal ArticleDOI
TL;DR: A closed-form approximation for the Ergodic Achievable Secrecy Sum-Rate (EASSR) is derived by considering the joint impact of eavesdroppers and jammers by using two widely used linear precoding techniques, Zero-Forcing and Maximum Ratio Transmission.

Journal ArticleDOI
TL;DR: Simulation results show that the Bit Error Rate (BER) of the proposed scheme outperforms that of the conventional scheme due to the diversity inherent in the proposed schemes.


Journal ArticleDOI
Jinjin Huang1, Yisheng Zhao1, Zhixiang Dong1, Mengjia Chen1, Zhonghui Chen1 
TL;DR: The simulation results show that the IGCE-B EM outperforms the CE-BEM and GCE- BEM in terms of the Normalized Mean Squared Error (NMSE), and the IBT method is better than the BT method in reducing the Gibbs effect.