MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things

T Wang, H Luo, W Jia, A Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data
collection, processing, analysis, storage, and sharing on demand. However, compromised …

A review of smartphone point‐of‐care adapter design

T Alawsi, Z Al‐Bawi - Engineering Reports, 2019 - Wiley Online Library
In this review, we explore the potential of smartphone‐based applications based on their
unique ability to support portable, easy‐to‐use, precise, and efficient functions, which, in …

Information fusion for edge intelligence: A survey

Y Zhang, C Jiang, B Yue, J Wan, M Guizani - Information Fusion, 2022 - Elsevier
Edge intelligence capability is expected to enable the development of a new paradigm
integrated with edge computing and artificial intelligence. However, due to the multisource …

A cloud–MEC collaborative task offloading scheme with service orchestration

M Huang, W Liu, T Wang, A Liu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Billions of devices are connected to the Internet of Things (IoT). These devices generate a
large volume of data, which poses an enormous burden on conventional networking …

Breast ultrasound tumor image classification using image decomposition and fusion based on adaptive multi-model spatial feature fusion

Z Zhuang, Z Yang, ANJ Raj, C Wei, P Jin… - Computer methods and …, 2021 - Elsevier
Abstract Background and Objective Breast cancer is a fatal threat to the health of women.
Ultrasonography is a common method for the detection of breast cancer. Computer-aided …

A Review: Security and Privacy for Health Care Application in Wireless Body Area Networks

VD Gaikwad, S Ananthakumaran - Wireless Personal Communications, 2023 - Springer
At present, the utilization of wireless sensor networks (WSN) is extended into various sectors
such as military, building monitoring, health monitoring, surveillance, industrial process …

Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu… - Journal of Parallel and …, 2020 - Elsevier
To improve the data arrival ratio and the transmission delay and considering that the
capacity for determining malicious nodes and energy are limited, a security disjoint routing …

A novel load balancing and low response delay framework for edge-cloud network based on SDN

Y Liu, Z Zeng, X Liu, X Zhu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
For the cloud computing based on software-defined networks (SDNs), a larger amount of
data is collected to cloud for analysis, which will cause the larger amount of redundancy …

Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things

T Li, W Liu, T Wang, Z Ming, X Li… - Transactions on …, 2022 - Wiley Online Library
Due to their mobile character, ground vehicles and unmanned aerial vehicles (UAVs) are
currently being considered as sensing devices that can collect data in the Internet of Things …

Delay-aware data fusion in duty-cycled wireless sensor networks: A Q-learning approach

PK Donta, T Amgoth, CSR Annavarapu - … Computing: Informatics and …, 2022 - Elsevier
In wireless sensor networks (WSNs), the sensor nodes (SNs) are deployed to acquire the
data from the area of interest and transmit it to the sink via multi-hop communications. Due to …