[PDF][PDF] Development of an IoT-based intensive aquaculture monitoring system with automatic water correction

LKS Tolentino, CP De Pedro, JD Icamina… - International Journal of …, 2020 - academia.edu
Due to the depleting stocks of fish in the market, there have been an increased interest in
aquaculture. However, raising fishes in an Intensive Aquaculture System results on a low …

Scalable video transmission in cache-aided device-to-device networks

J Ma, L Liu, H Song, R Shafin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Scalable video coding (SVC) and video caching are two promising techniques in the 5th
generation networks to improve the users' quality of experience (QoE) in terms of video …

Spectrum assignment in hardware-constrained cognitive radio IoT networks under varying channel-quality conditions

HAB Salameh, S Al-Masri, E Benkhelifa, J Lloret - IEEE Access, 2019 - ieeexplore.ieee.org
The integration of cognitive radio (CR) technology with the future Internet-of-Things (IoT)
architecture is expected to allow effective massive IoT deployment by providing huge …

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing

K Bhushan, BB Gupta - Multimedia Tools and Applications, 2019 - Springer
Multimedia computing has evolved as a remarkable technology which provides services to
view, create, edit, process, and search multimedia contents. All these multimedia services …

SIC-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels

K Jiang, T Jing, Y Huo, F Zhang, Z Li - IEEE Access, 2018 - ieeexplore.ieee.org
A new paradigm of uplink non-orthogonal multiple access along with multiple
eavesdroppers to achieve secrecy transmission is studied in this paper. We investigate the …

[HTML][HTML] Cognitive D2D communication: A comprehensive survey, research challenges, and future directions

A Iqbal, A Nauman, R Hussain, M Bilal - Internet of Things, 2023 - Elsevier
The integration of cognitive radio and device-to-device (D2D) communication gives rise to
Cognitive D2D (cD2D) communication, which offers numerous advantages, such as …

[HTML][HTML] Cross channel scripting and code injection attacks on web and cloud-based applications: a comprehensive review

M Kaur, M Raj, HN Lee - Sensors, 2022 - mdpi.com
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant
of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network …

[HTML][HTML] SoK: context and risk aware access control for zero trust systems

S Xiao, Y Ye, N Kanwal, T Newe, B Lee - Security and …, 2022 - hindawi.com
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …

Offset-aware resource allocation in NB-IoT networks

YJ Yu, LX Li - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Narrowband Internet of Things (NB-IoT) is a critical technology for fifth-generation (5G) and
next sixth-generation (6G) networks to meet the high density and latency requirements for …

Optimization of component elements in integrated coding systems for green communications: A survey

Q Chen, L Wang, P Chen… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
The rapid development of the information-exchange networks accelerates the consumption
of resources and energy. For future green communications, the integration of many …