- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Mobile Ad Hoc Networks
- Indoor and Outdoor Localization Technologies
- Quantum Computing Algorithms and Architecture
- Software-Defined Networks and 5G
- Advanced Malware Detection Techniques
- Machine Fault Diagnosis Techniques
- IoT Networks and Protocols
- Quantum Information and Cryptography
- Advanced Wireless Communication Technologies
- Internet Traffic Analysis and Secure E-voting
- Full-Duplex Wireless Communications
- Anomaly Detection Techniques and Applications
- UAV Applications and Optimization
- Advanced Text Analysis Techniques
- Security in Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Gear and Bearing Dynamics Analysis
- Opportunistic and Delay-Tolerant Networks
- Complex Network Analysis Techniques
- Distributed Control Multi-Agent Systems
- Digital Transformation in Industry
Kennesaw State University
2021-2025
Purdue University Fort Wayne
2019-2024
Ho Chi Minh City University of Technology
2010-2024
Vietnam National University Ho Chi Minh City
2023-2024
Hohai University
2023-2024
National Center for Technological Progress
2023
FPT University
2022
VNU University of Science
2021
University of Milan
2021
National Institute of Technology Kurukshetra
2021
The common modeling of digital twins uses an information model to describe the physical machines. integration into productive cyber-physical cloud manufacturing (CPCM) systems imposes strong demands such as reducing overhead and saving resources. In this paper, we develop investigate a new method for building cloud-based (CBDT), which can be adapted CPCM platform. Our helps reduce computing resources in processing center efficient interactions between human users We introduce knowledge...
Internet of Things (IoT) and named data network (NDN) are innovative technologies to meet up the future requirements. NDN is considered as an enabling approach improving dissemination in IoT scenarios. delivers in-network caching, which most prominent feature provide fast compared protocol (IP)-based communication. The proper integration caching placement strategies replacement policies suitable support networks. It can improve multicast communication minimizes delay responding IoT-based...
The usage of cloud services is growing exponentially with the recent advancement Internet Things (IoT)-based applications. Advanced scheduling approaches are needed to successfully meet application demands while harnessing computing's potential effectively schedule IoT onto resources optimally. This article proposes an alternative task scheduler approach for organizing tasks over CCE. In particular, a novel hybrid swarm intelligence method, using modified Manta ray foraging optimization...
Automotive-Industry 5.0 will use emerging 6G communications to provide robust, computationally intelligent, and energy-efficient data sharing among various onboard sensors, vehicles, other intelligent transportation system entities. Nonorthogonal multiple access (NOMA) backscatter are two key techniques of for enhanced spectrum energy efficiency. In this article, we an introduction green also discuss the advantages using NOMA in Automotive Industry 5.0. We briefly review recent work area...
With the increasingly humanized and intelligent operation of Industrial Internet Things (IIoT) systems in Industry 5.0, delay-sensitive compute-intensive (DSCI) devices have proliferated, their demand for low latency power consumption has become more eager. In order to extend battery life improve quality user experience, we can offload DSCI-type workloads mobile edge computing (MEC) servers processing. However, offloading massive amounts tasks will incur higher energy consumption, which is a...
Along with the development of Information Technology, Online Social Networks (OSN) are constantly developing and have become popular media in world. Besides communication enhancement benefits, OSN such limitations on rapid spread false information as rumors, fake news, contradictory news. False is collectively referred to misinformation which has significant social communities. The more sources topics are, greater number users affected. Therefore, it necessary prevent multiple within a given...
Summary In wireless rechargeable sensor networks, sensors are responsible for sensing environment and generating sensed data, mobile devices recharging and/or collecting data to the sink. Because of rapid development charging technology, can be recharged when they within limited ranges devices. addition, because sensors' electric capacity memory storage often limited, must recharged, their generated collected by periodically, or network cannot provide adequate quality services. Therefore,...
Recently, the problem of scheduling mobile sensors to cover all targets and maintain network connectivity such that total movement distance is minimized, termed sensor deployment (MSD) problem, has received a great deal attention. However, complexity MSD remains unknown because no exact proof been provided before. In this paper, we show not only but also its special case, target coverage are NP-hard.
In this study, the performance of a secondary network in cognitive radio (CR) is studied context vehicle-to-everything (V2X). The non-orthogonal multiple access (NOMA) effectively applied new system model, namely CR-assisted NOMA-V2X, and it beneficial to serve group vehicles. our proposed system, two schemes related vehicle-to-vehicle (V2V) transmissions are further considered enhance vehicle that needs higher quality service (QoS). However, degradation can be predicted by evaluating...
Most of today's infrastructure systems can be efficiently operated thanks to the intelligent power supply smart grids. However, grids are highly vulnerable malicious attacks, that is, because interplay between components in grids, failure some critical may result cascading and breakdown whole system. Therefore, question how identify most protect grid system is first challenge operators. To enable system's robustness, there has been a lot effort aimed at analysis, designing new architectures,...
The integration of Ambient Backscatter Communication (AmBC) with Non-Orthogonal Multiple Access (NOMA) is expected to support connectivity low-powered Internet-of-Vehicles (IoVs) in the upcoming Sixth-Generation (6G) transportation systems. This paper proposes an energy-efficient resource allocation framework for AmBC-enabled NOMA IoV network under imperfect Successive Interference Cancellation (SIC) decoding. In particular, multiple Road-Side Units (RSUs) transmit superimposed signals their...
Fingerprint image enhancement is a key aspect of an automated fingerprint identification system. This paper describes effective algorithm based on novel lighting compensation scheme. The scheme involves the use adaptive higher-order singular value decomposition tensor wavelet subbands (AHTWF) to enhance quality image. consists three stages. first stage input size <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math...
Data collection is one of the most important operations in applications wireless sensor networks (WSNs). In many emerging WSN applications, it urgent to achieve a guarantee for latency involved collecting data. Many researchers have studied data WSNs with minimum but without collision while assuming that any (or no) are allowed be aggregated into packet. addition, tree structures often used solutions. However, some cases, fixed number This motivates us study problem minimizing aggregation...
Cow behavior recognition systems support the assessment of cows' condition by providing their information. Accelerometers are particularly suited for a non-invasive solution development these monitoring systems. They cheap and simple in setting up high-performance when using machine learning algorithms. The activity complexity animals brings challenges real context applications because different behaviors may have similar acceleration data. reason is that they contain gestures, example,...
In wireless sensor networks (WSNs), the sensed data by sensors need to be gathered, so that one very important application is periodical collection. There much effort which aimed at collection scheduling algorithm development minimize latency. Most of previous works investigating minimum latency issue have an ideal assumption network a centralized system, in entire completely synchronized with full knowledge components. addition, most existing often assume any (or no) are allowed aggregated...
Abstract Modern malware evolves various detection avoidance techniques to bypass the state‐of‐the‐art methods. An emerging trend deal with this issue is combination of image transformation and machine learning models classify detect malware. However, existing works in field only perform simple These transformations have not considered color encoding pixel rendering on performance classifiers. In article, we propose a novel approach arranging bytes from binary files into images. developed...
Most of today's smart grids are highly vulnerable to cascading failure attacks in which the one or more critical components may trigger sequential other components, resulting eventual breakdown whole system. Existing works design different ranking methods for node link identifications that fail identify potential attacks. In this work, we first consider system from attacker's point view with a limited attack budget study grid vulnerability, referred as Maximum-Impact through Critical-Line...
This paper proposes a novel traffic monitoring framework, namely, DeepMonitor, for SDN-based IoT networks to provide fine-grained analysis capability different types at the network edges. Specifically, we first develop an intelligent flow rule match-field control system, called DeepMonitor agent, edge nodes, taking granularity-level requirements and their maximum flow-table capacity into consideration. We then formulate optimization problem each node employing Markov decision process (MDP)....