- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Wireless Networks and Protocols
- Energy Efficient Wireless Sensor Networks
- Engineering Applied Research
- Refrigeration and Air Conditioning Technologies
- Evacuation and Crowd Dynamics
- Advanced Wireless Network Optimization
- Caching and Content Delivery
- Energy and Environmental Systems
- User Authentication and Security Systems
- Energy Harvesting in Wireless Networks
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Coding theory and cryptography
- Traffic control and management
- QR Code Applications and Technologies
- Biometric Identification and Security
- Cryptographic Implementations and Security
- RFID technology advancements
- Transportation Planning and Optimization
- Cryptography and Residue Arithmetic
- Blockchain Technology Applications and Security
- Data Management and Algorithms
Louisiana Tech University
2018-2024
Lyell Immunopharma (United States)
2024
South Dakota State University
2008-2017
University of Florida
2005-2008
University of Minnesota
2002-2006
Korea University
2001
A critical aspect of applications with wireless sensor networks is network lifetime. Battery-powered sensors are usable as long they can communicate captured data to a processing node. Sensing and communications consume energy, therefore judicious power management scheduling effectively extend the operational time. One important class deployment large number in an area for environmental monitoring. The collected by sent central node processing. In this paper we propose efficient method...
Given a transportation network having source nodes with evacuees and destination nodes, we want to find contraflow configuration, i.e., ideal direction for each edge, minimize evacuation time. Contraflow is considered potential remedy reduce congestion during evacuations in the context of homeland security natural disasters (e.g., hurricanes). This problem computationally challenging because very large search space expensive calculation time on given network. To our knowledge, this paper...
This research was conducted as a preliminary step toward developing real-time spectral-based nitrogen sensorfor citrus trees. Diffuse reflectance of leaf samples, with five application rates (0, 112, 168, 224, and 280 kg ha-1),was measured from 400 to 2500 nm using spectrophotometer in laboratory environment. A correlation coefficientspectrum, stepwise multiple linear regression (SMLR) procedure, the B-matrix partial least squares (PLS) regressionwere used determine important wavelengths....
This paper considers the problem of broadcasting in large ad hoc wireless networks. We focus on energy-efficient broadcast routing stationary networks and consider case where nodes can dynamically control their transmission power for each session. The minimum spanning tree (MST) has property that longest edge is shortest among all trees, introduce a new algorithm called (MLE) constructs using MST. provides scheme to balance energy consumption nodes. simulation results show MLE improves...
In wireless ad-hoc networks, hosts communicate with each other without help of any physical infrastructure. Inevitably, the communication tends to be inefficient in terms computational and network resources. Study on virtual infrastructures or backbones networks gets more attention hope reducing overhead. But backbone structure is very vulnerable due various factors like node mobility, unstable links, so on. So a new scheme which reliable efficient both construct maintain needed. We present...
Abstract This paper addresses the problem of broadcasting and multicasting in large scale multihop ad hoc wireless networks. We focus on energy‐efficient broadcast routing stationary networks consider case where nodes can dynamically control their transmission power for each session. Minimum spanning tree (MST) has property that longest edge is shortest among all trees. introduce a new algorithm called minimum (MLE) constructs based MST, have different energy reserves, we weight incremental...
Energy harvesting motivated networks (EHNets) are rapidly emerging as a major part of ubiquitous computing and communication infrastructure in the presence Internet-of-Things (IoT). A set self-sustainable nodes equipped with energy capabilities can effectively exploit ambient convert it into electric energy, but is admittedly vulnerable to Denial-of-Service (DoS) attack that primarily targets service availability, often witnessed wireless multi-hop networks. In this paper, we propose an...
Due to the unavoidable battery replacement or replenishment, diverse energy harvesting techniques have been integrated with Wireless Sensor Networks (WSNs) overcome limited power and extend network lifetime. However, variable transmission levels based on non-uniform rates can incur asymmetric links. In this paper, we propose light-weight forwarding protocols reliably deliver sensory data a sink over time-varying links in WSNs. A Weighted Confirmation (WCFM) scheme is proposed differentiate...
In this paper, we present the idea of proof sincerity for a new consensus method mobile-user-friendly blockchains. Ever since birth Bitcoin, there have been many distributed methods studied to replace central (or third-party) trusts protect integrity ledgers. Existing show pros and cons but none them showed proper balance between imbalance wealth security sincerity, by allowing each every entity even with smaller computing power get rewarded mining, can effectively prevent extreme (often...
Today, digital information decisively permeates all aspects of modern society. In such a connected world, one the critical factors in maintaining security transmitted data is user authentication, which establishes confidence identities presented to an system. Over time, definition authentication has not changed; however, simple password no longer only factor used for authenticating user. Two-factor Authentication (2FA) and Multi-factor (MFA) were proposed provide high level by adding more...
In mobile ad-hoc networks, hosts communicate with each other without the help of any physical infrastructure. Inevitably, communication tends to be less efficient in terms computational and communicational overhead. Recent studies have shown that virtual backbone can reduce However, structure is very vulnerable due several reasons, e.g., node mobility unstable links, etc. this paper, we introduce a localized construction scheme, connected maximal independent set multiple initiators (MCMIS),...
With the combination of vehicular networks and a scalable algorithm, we can expect an effective real-time contraflow evacuation routing. In this paper define maximum throughput flow propose routing algorithm based on reverse shortest paths flows that be used for The proposed computes scheme by finding minimal number hence its computation is highly efficient scalable. addition, time computed better than or same as CCRP++ with help (or at least higher) flows. computational results confirm...
In this paper, we explore the usage of printed tags to authenticate products. Printed are a cheap alternative RFID and other tag based systems do not require specialized equipment. Due simplistic nature such codes, many security issues like impersonation, server reader replay attacks denial service present in solutions need be handled differently. We propose cost-efficient scheme on static hash chains address these threats. analyze characteristics compare it product authentication schemes...
In this paper, we present an evacuation planner algorithm that does not use the time-expanded graphs. Given a transportation network with nodes and edges, where have capacity/occupancy edges capacity/travel time, proposed can be used to plan routing minimizes time. order avoid of graphs, are using quickest paths instead shortest construct routing. By combining paths, get scheme has short time is scalable increase number evacuees. The simulation results show our found routes
More and more natural disasters are happening around the globe in such urgent situations, effective evacuation planning is one of most critical tools for human safety. Evacuation algorithms different from traditional network routing sense that objective to minimize time when last evacuee arrives at destination. Among existing algorithms, CCRP++ finds good solutions but its computation not scalable terms number evacuees. In addition, order improve base algorithm CCRP, makes non-global up-date...
For scalable information routing and dissemination, broadcast has been gaining tremendous interests of research in Wireless Sensor Networks (WSNs), where each sensor node inherent resource constraints terms battery energy, computing communication capabilities. Since a blind can cause the storm problem, diverse strategies have explored to increase network coverage but minimize redundant rebroadcasts. In this paper, we propose geometric scheme dense WSNs. This deploys sender-initiated...
We are living in the 21st century which technological advances have greatly improved quality of human lives. However nature keeps presenting its challenges form tsunamis, floods, wild fires, hurricanes, volcanoes, etc. Excellent evacuation route planning is paramount importance to reduce loss lives during such disasters. The parameters finite time lined capacity paths and thousands millions evacuees for problem makes it more complex than finding shortest path has been studied extensively...