Deployment techniques in wireless sensor networks, coverage and connectivity: A survey

M Farsi, MA Elhosseini, M Badawy, HA Ali… - Ieee …, 2019 - ieeexplore.ieee.org
… the recent and the main techniques for node deployment in WSN with the consideration of
coverage and connectivity … techniques in order to improve network reliability and robustness. …

[HTML][HTML] An analytical methodology for reliability assessment and failure analysis in distributed power system

M Ghiasi, N Ghadimi, E Ahmadinia - SN Applied Sciences, 2019 - Springer
… paper [9], a new reliability assessment model considering the … approach to evaluate and
analyze the reliability of network-… (DESs) deployment with goal to reliability-oriented planning of …

Reliable computation offloading for edge-computing-enabled software-defined IoV

X Hou, Z Ren, J Wang, W Cheng, Y Ren… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
… special server vehicle could be deployed in hot-spot areas … reliability caused by the dynamic
changes of network topology, … Considering the actual situation of real-time IoV applications, …

Reliable data transmission model for mobile ad hoc network using signcryption technique

M Elhoseny, K Shankar - IEEE transactions on reliability, 2019 - ieeexplore.ieee.org
… In these applications, sensors are deployed in an ad hoc … MANET, the clustering procedure
separates the network into clusters, … Quality-of-service (QoS) routing should consider different …

5G network-based Internet of Things for demand response in smart grid: A survey on application potential

H Hui, Y Ding, Q Shi, F Li, Y Song, J Yan - Applied Energy, 2020 - Elsevier
… investigated under market paradigm considering DR, which … response during the reserve
deployment process. The results … cyber security methods, and reliability analysis methods. Then…

Machine learning methods for reliable resource provisioning in edge-cloud computing: A survey

TL Duc, RG Leiva, P Casari, PO Östberg - ACM Computing Surveys …, 2019 - dl.acm.org
deployment, applications are increasingly being supplemented with components instantiated
closer to the edges of networks… [34] consider hybrid fiberwireless networks as a computing …

Service placement and request scheduling for data-intensive applications in edge clouds

V Farhadi, F Mehmeti, T He, TF La Porta… - … on Networking, 2021 - ieeexplore.ieee.org
… 1, we consider a wireless edge network consisting of a set N of … intensive services [49], [50],
ie, video analytics and ultra-reliable vir… The re-deployment of services has a cost which in our …

Network function virtualization-aware orchestrator for service function chaining placement in the cloud

H Hawilo, M Jammal, A Shami - IEEE Journal on Selected …, 2019 - ieeexplore.ieee.org
… proposed approach enhances the reliability and the quality of service (… latter desired networks
introduce various deployment and … The authors also consider that the networking service is …

Adaptive deployment for UAV-aided communication networks

Z Wang, L Duan, R Zhang - IEEE transactions on wireless …, 2019 - ieeexplore.ieee.org
… users via more reliable communication channels thanks to line… with, we consider a 1D terrestrial
user network shown in Fig. 1, … One application of such 1D scenario is to consider that the …

Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks

P Kumar, A Baliyan, KR Prasad… - Wireless …, 2022 - Wiley Online Library
… Availability, integrity, secrecy, authenticity, and undeniable are some of the most … The
DDoS vulnerability of the three-node ODL clusters under consideration is investigated in further …