Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular networkPeer-to-Peer Networking and Applications - Tập 14 - Trang 296-304 - 2020
Noor Mohammed Vali Mohamad, Prasun Ambastha, Sukriti Gautam, Rishabh Jain, Hariharan Subramaniyam, Lakshmanan Muthukaruppan
Beyond Fifth Generation (B5G) network aims to provide a very high data rate with
minimum latency to an ultra-dense user environment. To achieve this demand, the
possible approaches are network-centric and device-centric approach. In a
network-centric approach, a new frequency band is introduced, and the existing
network infrastructure is modified. The device-centric approach does not require
any m... hiện toàn bộ
Underlaid-D2D-assisted cooperative multicast based on social networksPeer-to-Peer Networking and Applications - Tập 9 - Trang 923-935 - 2015
Wenjun Xu, Shengyu Li, Yue Xu, Xuehong Lin
In this paper, device-to-device (D2D) communication is integrated into
cooperative multicast to elevate the multicast transmission rate from base
station to users. To this end, a new optimization problem, aiming to maximize
the overall cooperative multicast rate, is formulated with two essential
features 1) D2D communication is exploited to accomplish the data forwarding in
the second phase of coo... hiện toàn bộ
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systemsPeer-to-Peer Networking and Applications - Tập 7 - Trang 676-686 - 2013
Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang
This paper presents some novel watermarking approaches that are based on vector
quantization and provide ownership protection in gray-level images. Nowadays,
information sharing in P2P architecture is immensely involved with
knowledge-learning on the Internet. Copyright protection is therefore considered
in the studies of P2P systems. The proposed approaches combine images,
watermarks, and codeboo... hiện toàn bộ
An adaptive algorithm for super-peer selection considering peer’s capacity in mobile peer-to-peer networks based on learning automataPeer-to-Peer Networking and Applications - Tập 11 - Trang 74-89 - 2016
Nahid Amirazodi, Ali Mohammad Saghiri, Mohammadreza Meybodi
Mobile peer-to-peer (MP2P) networks refer to the peer-to-peer overlay networks
superimposing above the mobile ad-hoc networks. Heterogeneity of capacity and
mobility of the peers as well as inherent limitation of resources along with the
wireless networks characteristics are challenges on MP2P networks. In some MP2P
networks, in order to improve network performances, special peers, are called
supe... hiện toàn bộ
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contractsPeer-to-Peer Networking and Applications - Tập 14 - Trang 3124-3142 - 2021
Vibha Jain, Bijendra Kumar
With the elevation of terminal devices, network traffic has also grown with
rapid speed. To relieve cloud computing constraints on timely delivery, energy
consumption, and congestion, fog computing is introduced to provide proximate
and spot-on services to network devices. In fog environment, resource-deprived
user nodes can offload their multi-task to network periphery situated fog nodes.
However... hiện toàn bộ
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detectionPeer-to-Peer Networking and Applications - Tập 17 - Trang 227-245 - 2023
Fang Li, Hang Shen, Jieai Mai, Tianjing Wang, Yuanfei Dai, Xiaodong Miao
As cyber threats continue to evolve, ensuring network security has become
increasingly critical. Deep learning-based intrusion detection systems (IDS) are
crucial for addressing this issue. However, imbalanced training data and limited
feature extraction weaken classification performance for intrusion detection.
This paper presents a conditional generative adversarial network (CGAN) enhanced
by Bi... hiện toàn bộ
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computingPeer-to-Peer Networking and Applications - Tập 12 - Trang 924-933 - 2018
Jian Shen, Huijie Yang, Anxi Wang, Tianqi Zhou, Chen Wang
Healthcare in fog computing is a novel topic in recent year. With the
development of technology, it is a pressing issue to accomplish the secure
healthcare in fog computing. Moreover, how to ensure the security and efficiency
of the transmission healthcare data in open channel is a challenge to be solved.
In this paper, a lightweight authentication and matrix-based key agreement
scheme is proposed... hiện toàn bộ