Network security situation assessment and prediction method based on multimodal transformation in edge computing

M Xu, S Liu, X Li - Computer Communications, 2024 - Elsevier
Network security play a critical role in ensuring the robustness and integrity of network
systems. We propose a novel method based on multimodal transformation in edge …

Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

D Chen, A Aljohani - Mobile Networks and Applications, 2024 - Springer
Data protection shares sensitive data with authorized users over a wireless communication
network (WCN). To protect the data, a secured sharing method for WCNs is required, which …

Reinforcement Learning Infused MAC for Adaptive Connectivity

DK Sah, A Nauman, MA Jamshed… - 2024 IEEE Wireless …, 2024 - ieeexplore.ieee.org
The beginning of cellular communication (next-gen, such as 5G and 6G) promises an
extreme leap in connectivity, introducing intelligent, adaptive solutions that integrate …

Optimizing Energy Efficiency in Smart Buildings Through Intelligent HVAC Control Systems

K Cengiz - 2024 8th International Symposium on …, 2024 - ieeexplore.ieee.org
This work explores the optimization of HVAC systems in smart buildings through the
integration of advanced methodologies, including machine learning algorithms. Specif …

Optimizing Power Consumption in Data Centers Through Intelligent Load Balancing Algorithms

K Cengiz - 2024 8th International Symposium on …, 2024 - ieeexplore.ieee.org
Efficiently managing energy consumption, optimizing resource allocation, and improving
computational performance are crucial objectives in contemporary data processing …

Cross-Layer Design and Security of Network Applications

P Bhambu, K Preetham… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Cross-layer design and security for network applications have been a major concern for
network providers and their clients alike. Cross-layer design provides for interoperability …