Modern WLAN fingerprinting indoor positioning methods and deployment challenges

A Khalajmehrabadi, N Gatsis… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Wireless local area networks (WLANs) have become a promising choice for indoor
positioning as the only existing and established infrastructure, to localize the mobile and …

A comprehensive survey on mobility-aware D2D communications: Principles, practice and challenges

M Waqas, Y Niu, Y Li, M Ahmed, D Jin… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Device-to-device (D2D) communication proposes a new epitome in mobile networking to
avail data exchange between physically proximate devices. The exploitation of D2D …

A hybrid trust management framework for a multi-service social IoT network

N Narang, S Kar - Computer Communications, 2021 - Elsevier
Abstract Social IoT (or SIoT) is an alternate architectural pattern for IoT, which involves IoT
devices with social behavioural attributes. A SIoT-based service network makes use of …

Emergency warning messages dissemination in vehicular social networks: A trust based scheme

N Ullah, X Kong, Z Ning, A Tolba, M Alrashoud… - Vehicular …, 2020 - Elsevier
To ensure users' safety on the road, a plethora of dissemination schemes for Emergency
Warning Messages (EWMs) have been proposed in vehicular networks. However, the issue …

D2D relay selection based on joint fuzzy and entropy theories with social similarity

K Wu, M Jiang, HZ Tan - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
The employment of social similarity (SS) aware device-to-device (D2D) user equipment (UE)-
to-network (UE-NW) relay helps to improve system capacity and UEs' accessability to the …

idml: Incentivized decentralized machine learning

H Yu, HY Chen, S Lee, S Vishwanath, X Zheng… - arXiv preprint arXiv …, 2023 - arxiv.org
With the rising emergence of decentralized and opportunistic approaches to machine
learning, end devices are increasingly tasked with training deep learning models on-devices …

Trust aware similarity-based source routing to ensure effective communication using game-theoretic approach in VANETs

R Venitta Raj, K Balasubramanian - Journal of Ambient Intelligence and …, 2021 - Springer
In VANETs, vehicles need to rely on other vehicles for any real-time applications. Therefore
the cooperation of vehicles is needed for relaying the messages in successful manner. Most …

Choosing machine learning algorithms for anomaly detection in smart building iot scenarios

F Almaguer-Angeles, J Murphy… - 2019 IEEE 5th World …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) systems produce large amounts of raw data in the form of log files.
This raw data must then be processed to extract useful information. Machine Learning (ML) …

Manipulation with domino effect for cache-and buffer-enabled social IIoT: Preserving stability in tripartite graphs

Y Sun, B Wang, S Li, Z Sun… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As a new Internet of Things (IoT) paradigm where smart devices work socially by exploiting
social ties with adjacent devices, the Social IoT can effectively meet the real-time data …

Open Dataset for Predicting Pilgrim Activities for Crowd Management During Hajj Using Wearable Sensors

AM Al-Shaery, SG Ahmed, H Aljassmi… - IEEE …, 2024 - ieeexplore.ieee.org
This study aims to create and examine a multimodal dataset to enhance crowd management
during the Hajj seasons. Sixty-four participants were engaged in Hajj rituals such as Tawaf …