Swarm intelligence for next-generation networks: Recent advances and applications
- Quoc-Viet Pham,
- Dinh C. Nguyen,
- Seyedali Mirjalili,
- Dinh Thai Hoang,
- Diep N. Nguyen,
- Pubudu N. Pathirana,
- Won-Joo Hwang
In next-generation networks (NGN), a very large number of devices and applications are emerged, along with the heterogeneity of technologies, architectures, mobile data, etc., and optimizing such a network is of utmost importance. ...
Privacy protection among three antithetic-parties for context-aware services
The popularity of context-aware services is improving the quality of life, while raising serious privacy issues. In order for users to receive quality service, they are at risk of leaking private information by adversaries that are ...
Cross-layer multipath approach for critical traffic in duty-cycled wireless sensor networks
Ensuring that an active path is provided at all times in a Wireless Sensor Network (WSN) is fundamental for securing the timely delivery of critical data and maintaining the quality of service required to effectively support delay-...
Two-sided preferences task matching mechanisms for blockchain-based crowdsourcing
In this paper, novel task matching mechanisms with two-sided preferences of workers and requesters are proposed for blockchain-based crowdsourcing. Existing blockchain-based crowdsourcing frameworks match workers to tasks using ...
Graphical abstractDisplay Omitted
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for ...
Performance analysis of spatially distributed LTE-U/NR-U and Wi-Fi networks: An analytical model for coexistence study
To access an unlicensed channel, Wi-Fi follows the Listen Before Talk (LBT) mechanism, whereas LTE-U (and future New Radio in Unlicensed (NR-U) Patriciello et al., 2020; Lagen et al., 2019) adopts the ON–OFF duty-cycled mechanism to ...
Fog radio access network optimization for 5G leveraging user mobility and traffic data
The surging data traffic and dynamic user mobility in 5G networks have posed significant demands for mobile operators to increase data processing capacity and ensure user handover quality. Specifically, a cost-effective and quality-...
An optimized content caching strategy for video stream in edge-cloud environment
With the mobile data traffic grows rapidly and the video data has a high proportion, the backhaul link faces great pressure. The conventional centralized architecture has been far from enough to satisfy the user demands. For reducing ...
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
Software-defined networking (SDN) is a new networking paradigm that separates the controller from the network devices i.e. routers and switches. The centralized architecture of the SDN facilitates the overall network management and ...
Graphical abstractDisplay Omitted
Highlights
- A new regularizer method, namely SD-Reg, which is based on the standard deviation of the weight matrix, has been used to address the problem of overfitting ...
SecureBallot: A secure open source e-Voting system
Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (...