An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system
Tài liệu tham khảo
Tan, 2019, A high-accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology, Trans. Emerg. Telecommun. Technol.
Zheng, 2018, Adaptive communication protocols in flying ad hoc network, IEEE Commun. Mag., 56, 136, 10.1109/MCOM.2017.1700323
Soni, 2019, An improved three-factor authentication scheme for patient monitoring using wsn in remote health-care system, Comput. Methods Progr. Biomed., 182, 105054, 10.1016/j.cmpb.2019.105054
Li, 2012, An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards, J. Netw. Comput. Appl., 35, 763, 10.1016/j.jnca.2011.11.009
Kinsella, 2005, Global aging: the challenge of success, population reference Bureau Washington, DC (Diabetol. Croat.), 60, 1
Sangaiah, 2019, Cognitive data science methods and models for engineering applications, Soft Computing, 23, 9045, 10.1007/s00500-019-04262-2
Wang, 2020, Big data service architecture: a survey, J. Internet Technol., 21, 393
He, 2020, Parameters compressing in deep learning, Comput. Mater. Continua (CMC): Comput. Mater. Continua (CMC), 62, 321, 10.32604/cmc.2020.06130
Jiang, 2020, Trust based energy efficient data collection with unmanned aerial vehicle in edge network, Trans. Emerg. Telecommun. Technol., 10.1002/ett.3942
Li, 2011, Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards, J. Netw. Comput. Appl., 34, 73, 10.1016/j.jnca.2010.09.003
Sangaiah, 2018, Towards an efficient risk assessment in software projects–fuzzy reinforcement paradigm, Comput. Electr. Eng., 71, 833, 10.1016/j.compeleceng.2017.07.022
Li, 2013, An enhanced smart card based remote user password authentication scheme, J. Netw. Comput. Appl., 36, 1365, 10.1016/j.jnca.2013.02.034
Li, 2013, A novel smart card and dynamic id based remote user authentication scheme for multi-server environments, Math. Comput. Model., 58, 85, 10.1016/j.mcm.2012.06.033
Wang, 2020, LogEvent2vec: LogEvent-to-vector based anomaly detection for large-scale logs in internet of things, Sensors, 20, 2451, 10.3390/s20092451
Li, 2021, Adaptive contention window MAC protocol in a global view for emerging trends networks, IEEE ACCESS, 9, 18402, 10.1109/ACCESS.2021.3054015
Liang, 2020, Secure data storage and recovery in industrial blockchain network environments, IEEE Trans. Ind. Inf., 10.1109/TII.2020.2966069
C. Y. Chen, F. Liu, L. Wu, H. Yan, W. Gui, and H. E. Stanley, Tracking performance limitations of networked control systems with repeated zeros and poles. IEEE Trans. Automat. Contr., Doi: 10.1109/TAC.2020.2999444.
Chen, 2017, Optimal tracking performance of discrete-time systems with quantization, J. Nonlinear Sci. Appl., 10, 1873, 10.22436/jnsa.010.04.47
Teng, 2020, Vehicles joint uavs to acquire and analyze data for topology discovery in large-scale IoT systems, Peer-to-Peer Netw. Appl., 13, 1720, 10.1007/s12083-020-00879-5
Li, 2021, A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems, Inf. Sci., 545, 65, 10.1016/j.ins.2020.07.052
Ren, 2020, A trust-based minimum cost and quality aware data collection scheme in p2p network, Peer-to-Peer Netw. Appl., 13, 2300, 10.1007/s12083-020-00898-2
Wang, 2019, An empower Hamilton loop based data collection algorithm with mobile agent for WSNs, Human-Centr. Comput. Inf. Sci., 9, 18, 10.1186/s13673-019-0179-4
Wang, 2019, An affinity propagation-based self-adaptive clustering method for wireless sensor networks, Sensors, 19, 2579, 10.3390/s19112579
Wang, 2020, Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs, Comput. Mater. Continua (CMC), 62, 695, 10.32604/cmc.2020.08674
Yin, 2019, Communication-efficient data aggregation tree construction for complex queries in IoT applications, IEEE Internet of Things J., 6, 3352, 10.1109/JIOT.2018.2882820
Li, 2019, Complexity and algorithms for superposed data uploading problem in networks with smart devices, IEEE Internet of Things J., 7, 5882, 10.1109/JIOT.2019.2949352
Liu, 2020, A novel load balancing and low response delay framework for edgecloud network based on sdn, IEEE Internet of Things J., 7, 5922, 10.1109/JIOT.2019.2951857
Huang, 2021, A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs, Phys. Commun., 47, 101320, 10.1016/j.phycom.2021.101320
Huang, 2020, An auv-assisted data gathering scheme based on clustering and matrix completion for smart ocean, IEEE Internet of Things J., 7, 9904, 10.1109/JIOT.2020.2988035
Manfredi, 2016, Decentralized control algorithm for fast monitoring and efficient energy consumption in energy harvesting wireless sensor networks, IEEE Trans. Ind. Inf., 13, 1513, 10.1109/TII.2016.2627478
Badawy, 2010, Energy provisioning in solar-powered wireless mesh networks, IEEE Trans. Veh. Technol., 59, 3859, 10.1109/TVT.2010.2064797
He, 2019, Interference-Aware routing for difficult wireless sensor network environment with SWIPT, Sensors, 19, 3978, 10.3390/s19183978
He, 2018, Energy-aware routing for SWIPT in multi-hop energy-constrained wireless network, IEEE Access, 6, 17996, 10.1109/ACCESS.2018.2820093
Valera, 2013, Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks, Ad Hoc Netw., 11, 1202, 10.1016/j.adhoc.2013.01.005
Sangaiah, 2019, Arabic text clustering using improved clustering algorithms with dimensionality reduction, Cluster Comput., 22, 4535, 10.1007/s10586-018-2084-4
Ye, 2002, An energy-efficient mac protocol for wireless sensor networks, 3, 1567
Van Dam, 2003, An adaptive energy-efficient mac protocol for wireless sensor networks, 171
Polastre, 2004, Versatile low power media access for wireless sensor networks, 95
Buettner, 2006, X-mac: a short preamble mac protocol for duty-cycled wireless sensor networks, 307
Sun, 2008, RI-mac: a receiver-initiated asynchronous duty cycle mac protocol for dynamic traffic loads in wireless sensor networks, 1
Byun, 2013, Queue management based duty cycle control for end-to-end delay guarantees in wireless sensor networks, Wireless Network, 19, 1349, 10.1007/s11276-012-0537-x
Gu, 2020, Secure data query framework for cloud and fog computing, IEEE Trans. Netw. Serv. Manag., 17, 332, 10.1109/TNSM.2019.2941869
Gu, 2020, Reusable mesh signature scheme for protecting identity privacy of IoT devices, Sensors, 20, 1, 10.3390/s20030758
Gu, 2020, Efficient traceable ring signature scheme without pairings, Adv. Math. Commun., 14, 207, 10.3934/amc.2020016
Lee, 2013, A traffic-aware energy efficient scheme for wsn employing an adaptable wakeup period, Wireless Pers. Commun., 71, 1879, 10.1007/s11277-012-0914-x
Chen, 2017, Distributed duty cycle control for delay improvement in wireless sensor networks, Peer-to-Peer Netw. Appl., 10, 559, 10.1007/s12083-016-0501-0
Liu, 2020, Context-aware collect data with energy efficient in cyber–physical cloud systems, Future Generat. Comput. Syst., 105, 932, 10.1016/j.future.2017.05.029