- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- Blockchain Technology Applications and Security
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Context-Aware Activity Recognition Systems
- Wireless Networks and Protocols
- Cognitive Radio Networks and Spectrum Sensing
- Big Data and Business Intelligence
- Software-Defined Networks and 5G
- RFID technology advancements
- Indoor and Outdoor Localization Technologies
- ICT Impact and Policies
- Full-Duplex Wireless Communications
- Robotics and Automated Systems
- Wireless Body Area Networks
- Wireless Communication Networks Research
- Caching and Content Delivery
- Advanced Wireless Network Optimization
- Molecular Communication and Nanonetworks
- Network Security and Intrusion Detection
- User Authentication and Security Systems
Stevens Institute of Technology
2015-2024
Siksha O Anusandhan University
2023
New Technology (Israel)
2022
Petroleum Technology Company (Norway)
2022
Applied Mathematics (United States)
2022
University of Technology Sydney
2021
International Institute of Information Technology
2021
Gujarat Matikam Kalakari & Rural Technology Institute
2021
Chongqing University of Posts and Telecommunications
2018
Auburn University
2015
In recent years, the concept of Metaverse has attracted considerable attention. This article provides a comprehensive overview Metaverse. First, development status is presented. We summarize policies various countries, companies, and organizations relevant to Metaverse, as well statistics on number Metaverse-related publications. Characteristics are identified: 1) multitechnology convergence; 2) sociality; 3) hyper-spatio-temporality. For convergence we divide technological framework into...
Wireless sensor networks (WSNs) groups specialized transducers that provide sensing services to Internet of Things (IoT) devices with limited energy and storage resources. Since replacement or recharging batteries in nodes is almost impossible, power consumption becomes one the crucial design issues WSN. Clustering algorithm plays an important role conservation for constrained network. Choosing a cluster head (CH) can appropriately balance load network thereby reducing enhancing lifetime....
In this article we present a survey of transport protocols for wireless sensor networks (WSNs). We first highlight several unique aspects WSNs, and describe the basic design criteria challenges protocols, including energy-efficiency, quality service, reliability, congestion control. then provide summary comparison existing WSNs. Finally, discuss open research problems.
Congestion in wireless sensor networks not only causes packet loss, but also leads to excessive energy consumption. Therefore congestion WSNs needs be controlled order prolong system lifetime. In addition, this is necessary improve fairness and provide better quality of service (QoS), which required by multimedia applications networks. paper, we propose a novel upstream control protocol for WSNs, called priority-based (PCCP). Unlike existing work, PCCP innovatively measures degree as the...
Internet of Things (IoT) is a worldwide system "smart devices" that can sense and connect with their surroundings interact users other systems. Global air pollution one the major concerns our era. Existing monitoring systems have inferior precision, low sensitivity, require laboratory analysis. Therefore, improved are needed. To overcome problems existing systems, we propose three-phase system. An IoT kit was prepared using gas sensors, Arduino integrated development environment (IDE), Wi-Fi...
Internet of Things (IoT) is transforming everyone's life by providing features, such as controlling and monitoring the connected smart objects. IoT applications range over a broad spectrum services including cities, homes, cars, manufacturing, e-healthcare, control system, transportation, wearables, farming, much more. The adoption these devices growing exponentially, that has resulted in generation substantial amount data for processing analyzing. Thus, besides bringing ease to human lives,...
In the era of rapid development artificial intelligence, integration multimedia and human-artificial intelligence has become an important research hotspot. Especially in environment, effective remote visual monitoring exploration direction many scholars. The use traditional correlation filtering (CF) algorithm for real-time context is a practical strategy. However, most existing filtering-based algorithms still have problem insufficient robustness effectiveness. Therefore, by considering...
Wireless sensor networks (WSNs) is a virtual layer in the paradigm of Internet Things (IoT). It inter-relates information associated with physical domain to IoT drove computational systems. WSN provides an ubiquitous access location, status different entities environment, and data acquisition for long-term monitoring. Since energy major constraint design process WSN, recent advances have led project various energy-efficient protocols. Routing involves expenditure considerable amount. In...
Metaverse is a new type of Internet application and social form that integrates variety technologies. It has the characteristics multi-technology, sociality, hyper spatiotemporality. This paper introduces development status Metaverse, from five perspectives network infrastructure, management technology, basic common virtual reality object connection, convergence, it technical framework Metaverse. also nature Metaverse's spatiotemporality, discusses first areas some problems challenges may face.
Internet of Things (IoT) has been the most emerging technology in last decade because number smart devices and its associated technologies rapidly grown both industrial research prospectives. The applications are developed using IoT techniques for real-time monitoring. Due to low processing power storage capacity, things vulnerable attacks as existing security or cryptography not suitable. In this study, we initially review identify privacy issues that exist system. Second, per blockchain...
As COVID-19 hounds the world, common cause of finding a swift solution to manage pandemic has brought together researchers, institutions, governments, and society at large. The Internet Things (IoT), artificial intelligence (AI)-including machine learning (ML) Big Data analytics-as well as Robotics Blockchain, are four decisive areas technological innovation that have been ingenuity harnessed fight this future ones. While these highly interrelated smart connected health technologies cannot...
The Metaverse depicts a parallel digitalized world where virtuality and reality are fused. It has economic social systems like those in the real provides intelligent services applications. In this paper, we introduce from new technology perspective, including its essence, corresponding technical framework, potential challenges. Specifically, analyze essence of etymology point out breakthroughs promising to be made time, space, contents by citing Maslow's Hierarchy Needs. Subsequently,...
Big data create values for business and research, but pose significant challenges in terms of networking, storage, management, analytics, ethics. Multidisciplinary collaborations from engineers, computer scientists, statisticians, social scientists are needed to tackle, discover, understand big data. This survey presents an overview initiatives, technologies, research industries academia, discusses potential solutions.
Internet of Things (IoT) in the agriculture field provides crops-oriented data sharing and automatic farming solutions under single network coverage. The components IoT collect observable from different plants at points. gathered through components, such as sensors cameras, can be used to manipulated for a better farming-oriented decision-making process. This work proposes system that observes crops' growth leaf diseases continuously advising farmers need. To provide analytical statistics on...
The exponential growth in the number of connected devices as well data produced from these call for a secure and efficient access control mechanism that can ensure privacy both users data.Most conventional key management mechanisms depend upon trusted third party like registration center or generation keys.Trusting has its own ramifications results centralized architecture; therefore this article addresses issues by designing Blockchain based distributed IoT architecture uses Hash Chains...
With the recent advances of Internet Things (IoT), and increasing accessibility to ubiquitous computing resources mobile devices, prevalence rich media contents, ensuing social, economic, cultural changes, technology applications have evolved quickly over past decade. They now go beyond personal computing, facilitating collaboration social interactions in general, causing a quick proliferation relationships among IoT entities. The number these their heterogeneous features led communication...
The digital transformation is characterized by the convergence of technologies—from Internet Things (IoT) to edge–fog–cloud computing, artificial intelligence (AI), and Blockchain—in multiple dimensions, blurring lines between physical worlds. Although these innovations have evolved independently over time, they are increasingly becoming more intertwined, driving development new business models. With adaptation, embracement, development, we witnessing a steady fusion technologies resulting...
Internet of Things (IoT) is an expanding technology that facilitate physical devices to inter-connect each other over a public channel. Moreover, the security next-generation wireless mobile communication technology, namely 5G with IoT, has been field much interest among researchers in last several years. Previously, Sharif et al. had suggested IoTbased lightweight three-party authentication scheme proclaiming secured against different threats. However, it was found could not achieve user...
LEACH protocol is one of the clustering routing protocols in wireless sensor networks. The advantage that each node has equal probability to be a cluster head, which makes energy dissipation relatively balanced. In protocol, time divided into many rounds, round, all nodes contend head according predefined criterion. This paper focuses on how set length prolong lifetime network and increase throughput, denoted as amount data packs sent sink node. functions throughput related round are...
The edge cache is an effective way to reduce the heavy traffic load and end-to-end latency in radio access networks (RANs) for supporting a number of critical Internet Things (IoT) services applications. It has been verified provide high spectral efficiency (SE), energy (EE), low latency. Along with several key techniques that have applied, such as device-to-device communication predictive caching, RANs IoT are becoming diversified. This paper comprehensively surveys recent advances RANs,...
As a promising technique for next-generation wireless networks, femtocells expand the coverage of cellular provide high data rate users, decrease transmission power user equipments, and increase spectrum efficiency. In few years, number deployed femtocell base stations (FBSs) will reach hundreds millions. This huge deployment bring lot challenges in terms interference management, resource scheduling, energy consumption. recent more attention has been paid to energy-efficient communications....
Network slicing has been advocated by both academia and industry as a cost-efficient way to enable operators provide networks on an as-a-service basis meet the wide range of use cases that fifth generation wireless network will serve. The existing works are mainly targeted at partition core network, prospect in radio access should be jointly exploited. To solve this challenge, enhanced F-RANs, called slicing, is proposed. This article comprehensively presents novel architecture related key...
As the trajectory of Internet Things (IoT) moving at a rapid pace and with worldwide development public embracement wearable sensors, these days, most companies organizations are awash in massive amounts data. Determining how to profit from data deluge can give an edge market because have potential add tremendous value many aspects business. The has already seen level monetization across vertical domains form layering connected devices variety Software-as-a-Service (SaaS) choices, such as...
This paper investigates the performance of EPC-gloabl Generation-2 (Gen-2) ultra high frequency (UHF) radio identification (RFID) protocol. Gen-2 protocol has a critical parameter Q that plays an important role in resolving tag collisions. proposes adaptive slot-count algorithm to adjust dynamically based on type replies from tags. In this paper, we define two metrics for identification: Query Success Rate (QSR) and speed (TIS). We establish Discrete-Time Markov Chain (DTMC) model...