- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Advanced Wireless Communication Technologies
- Advanced Wireless Network Optimization
- Indoor and Outdoor Localization Technologies
- Advanced MIMO Systems Optimization
- Wireless Communication Security Techniques
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- UAV Applications and Optimization
- Underwater Vehicles and Communication Systems
- IoT and Edge/Fog Computing
- Security in Wireless Sensor Networks
- Wireless Communication Networks Research
- Face and Expression Recognition
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Wireless Body Area Networks
- Image and Video Quality Assessment
- Machine Learning and ELM
- Cooperative Communication and Network Coding
- Software-Defined Networks and 5G
- Video Coding and Compression Technologies
Khon Kaen University
2015-2024
Burapha University
2021
ORCID
2019
Taiwan Semiconductor Manufacturing Company (Taiwan)
2014
Washington University in St. Louis
2008-2012
IBM Research - India
2009
Interest in broadband wireless access (BWA) has been growing due to increased user mobility and the need for data at all times. IEEE 802.16e based WiMAX networks promise best available quality of experience mobile service users. Unlike LANs, incorporate several (QoS) mechanisms Media Access Control (MAC) level guaranteed services data, voice video. The problem assuring QoS is basically that how allocate resources among users order meet criteria such as delay, delay jitter throughput...
The explosive rise of intelligent devices with ubiquitous connectivity have dramatically increased Internet Things (IoT) traffic in the cloud environment and created potential attack surfaces for cyber-attacks. Traditional security approaches are insufficient inefficient to address threats cloud-based IoT networks. In this vein, software defined networking (SDN), network function virtualization (NFV), machine learning techniques introduce numerous advantages that can effectively resolve...
This paper proposes a novel traffic monitoring framework, namely, DeepMonitor, for SDN-based IoT networks to provide fine-grained analysis capability different types at the network edges. Specifically, we first develop an intelligent flow rule match-field control system, called DeepMonitor agent, edge nodes, taking granularity-level requirements and their maximum flow-table capacity into consideration. We then formulate optimization problem each node employing Markov decision process (MDP)....
We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the are explained and methods to reduce these also presented. The advantage model is effect each decision sensitivity various parameters can be seen easily. illustrate by estimating three sample applications—Mobile TV, VoIP, data. analysis process helps explain features WiMAX. It shown proper use overhead reducing mechanisms scheduling make an order magnitude...
Android-based mobile devices have attracted a large number of users because they are easy to use and possess wide range capabilities. Because its popularity, Android has become one the most important platforms for attackers launch their nefarious schemes. Due rising sophistication malware obfuscation detection avoidance tactics, many traditional approaches impractical due limited representation Inspired by success deep learning in learning, this article presents an effective improved neural...
In this paper, we study the system performance of mobile edge computing (MEC) wireless sensor networks (WSNs) using a multiantenna access point (AP) and two clusters based on uplink nonorthogonal multiple (NOMA). Due to limited computation energy resources, cluster heads (CHs) offload their tasks AP over Nakagami-m fading. We proposed combination protocol for NOMA-MEC-WSNs in which selects either selection combining (SC) or maximal ratio (MRC) each CH participate communication process by...
The broadcast nature of energy harvesting wireless sensor networks (EH-WSNs) allows nodes (SNs) within the coverage range a transmitter to capture its signals. However, an EH-WSN is vulnerable eavesdropping and signal interception; therefore, security in EH-WSNs significant interest, this issue has been addressed over many years. no work studied existence friendly jammer mitigate impact. Thus, paper proposes model optimization scheme that uses wirelessly powered improve secrecy EH-WSNs....
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network the presence of multiple eavesdroppers (EAVs). Specifically, source and relays harvest from power transfer stations (PTSs), then, uses harvested to transmit information base station (BS) with help relays. During transmission information, BS typically faces risk losing due EAVs. Thus, enhance secrecy considered system, one acts as jammer, using generate interference We propose...
Due to their low cost, various range-free localization techniques are widely applied estimate device locations in wireless sensor networks (WSNs), especially where other communication signals, such as those from a global positioning system, absent. Among techniques, the centroid algorithm has gained popularity because of its simplicity and computational rendering it suitable for power-sensitive nodes or nodes. WSN topologies unpredictable often deployed at arbitrary locations, making...
Mobile WiMAX systems based on the IEEE 802.16e standard require all downlink allocations to be mapped a rectangular region in two dimensional subcarrier-time map. Many published resource allocation schemes ignore this requirement. It is possible that when regions may exceed capacity of frame, and QoS some flows violated. The rectangle mapping problem variation bin or strip packing problem, which known NP-complete. In previous paper, an algorithm called OCSA (One Column Striping with...
WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers, and service providers. Numerous papers have been published on various design issues networks. Since being discussed are usually ahead availability, most these studies require simulation. It is important to some common features among models so that their results can be compared. Therefore, Application Working Group Forum developed standard simulation methodology...
Many challenges to the Internet including global routing scalability have drawn significant attention from both industry and academia, generated several new ideas for next generation. MILSA (Mobility Multihoming supporting Identifier Locator Split Architecture) related enhancements are designed address naming, addressing, challenges, provide mobility multihoming support, easy transition current Internet. In this paper, we synthesize our research into a multiple-tier realm-based framework...
Energy efficiency in data collection and transmission is always a crucial factor wireless sensor networks (WSN). Thus, minimizing energy dissipation maximizing network life-time are key factors the design of routing protocols for WSNs. In this paper, based on Low Adaptive Clustering Hierarchy (LEACH) protocols, we propose two new distance-based clustering which call DB-LEACH DBEA-LEACH. The first approach (distance-based) selects cluster head node by considering geometric distance between...
This paper studies unmanned aerial vehicle (UAV)-aided nonorthogonal multiple access (NOMA)-based mobile-edge computing (MEC) in Internet of Things (IoT) systems which the uav acts as a relay (UR). Specifically, we consider scenario with two clusters IoT devices (IDs) (i.e., high-priority cluster IA and low-priority IB) limited resources, so these IDs cannot compute their tasks must offload them to base station (BS) through UR. We propose protocol named time switching - radio frequency (RF)...
The key to proper resource allocation for mobile video on wireless networks is have a good model the demands. In this paper, we present results of analysis number streams and show that simple seasonal ARIMA (SAM) can provide very representation both MPEG4-Part2 MPEG4-Part10 videos, formats are commonly used videos. has been implemented frame RTP packet generators. be represent different movies easily adjusted produce workloads simulation studies. We use SAM generator compare performance...