Data-driven anomaly detection approach for time-series streaming data

M Zhang, J Guo, X Li, R Jin - Sensors, 2020 - mdpi.com
Recently, wireless sensor networks (WSNs) have been extensively deployed to monitor
environments. Sensor nodes are susceptible to fault generation due to hardware and …

Blockchain based data storage mechanism in cyber physical system

J Wang, W Chen, Y Ren, O Alfarraj… - Journal of Internet …, 2020 - jit.ndhu.edu.tw
As cyber-physical systems (CPS) flourish, the data security issues it encounters have
increasingly become a research focus in the field. And it has received widespread attention …

Blockchain-based data storage mechanism for industrial internet of things

J Wang, W Chen, L Wang, Y Ren… - … Automation and Soft …, 2020 - centaur.reading.ac.uk
With the development of the Industrial Internet of Things and the continuous expansion of
application scenarios, many development bottlenecks have followed. Its data security issue …

An enhanced PROMOT algorithm with D2D and robust for mobile edge computing

J Wang, W Wu, Z Liao, YW Jung… - Journal of Internet …, 2020 - jit.ndhu.edu.tw
With the development of the fifth-generation network (5G), the base station is becoming
denser and denser, which leads to the user device is covered by multiple edge servers in …

[PDF][PDF] A Data-Aware Remote Procedure Call Method for Big Data Systems.

J Wang, Y Yang, J Zhang, X Yu, O Alfarraj… - Comput. Syst. Sci …, 2020 - academia.edu
In recent years, big data has been one of the hottest development directions in the
information field. With the development of artificial intelligence technology, mobile smart …

A novel dynamic three-level tracking controller for mobile robots considering actuators and power stage subsystems: Experimental assessment

JR García-Sánchez, S Tavera-Mosqueda… - Sensors, 2020 - mdpi.com
In order to solve the trajectory tracking task in a wheeled mobile robot (WMR), a dynamic
three-level controller is presented in this paper. The controller considers the mechanical …

[PDF][PDF] Intelligent tunicate swarm-optimization-algorithm-based lightweight security mechanism in internet of health things

GN Nguyen, NH Le Viet, GP Joshi… - Computers, Materials & …, 2020 - academia.edu
Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing
need for energy-and latency-optimized health sector provisioning. Additionally, clinical data …

An systematic study on blockchain transaction databases storage and optimization

J Zhang, S Zhong, J Wang… - … IEEE Intl Conf on Parallel & …, 2020 - ieeexplore.ieee.org
As the peer-to-peer networks, blockchain transaction systems require each node to store a
complete collection of Unspent Transaction Output (UTXO) in the in-memory transaction …

A supervised named entity recognition method based on pattern matching and semantic verification

N Gao, Z Zhu, Z Weng, G Chen… - Journal of Internet …, 2020 - jit.ndhu.edu.tw
Named entity recognition is a basic task in the field of natural language processing and
plays a pivotal role in tasks such as information extraction, machine translation, and …

Remote procedure call optimization of big data systems based on data awareness

J Wang, Y Yang, J Zhang… - … IEEE Intl Conf on Parallel & …, 2020 - ieeexplore.ieee.org
In recent years, with the development of artificial intelligence technologies, mobile smart
terminals, and high-bandwidth wireless internet, the scale of data generated by various data …