Change search
Refine search result
1234 101 - 150 of 198
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Perera, Charith
    et al.
    Centre for Research in Computing, The Open University, Milton Keynes.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Knowledge-Based Resource Discovery for Internet of Things2016In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 109, p. 122-136Article in journal (Refereed)
    Abstract [en]

    In the sensing as a service paradigm, Internet of Things (IoT) Middleware platforms allow data consumers to retrieve the data they want without knowing the underlying technical details of IoT resources (i.e. sensors and data processing components). However, configuring an IoT middleware platform and retrieving data is a significant challenge for data consumers as it requires both technical knowledge and domain expertise. In this paper, we propose a knowledge driven approach called Context Aware Sensor Configuration Model (CASCOM) to simplify the process of configuring IoT middleware platforms, so the data consumers, specifically non-technical personnel, can easily retrieve the data they required. In this paper, we demonstrate how IoT resources can be described using semantics in such away that they can later be used to compose service work-flows. Such automated semantic-knowledge-based IoT resource composition approach advances the current research. We demonstrate the feasibility and the usability of our approach through a prototype implementation based on an IoT middleware called Global Sensor Networks (GSN), though our model can be generalized to any other middleware platform.

  • 102.
    Perera, Charith
    et al.
    IEEE.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Privacy Mindset for Developing Internet of Things Applicationsfor Social Sensing: Software Engineering Challenges2017In: SocialSens'17: Proceedings of the 2nd International Workshop on Social Sensing, Pittsburgh, PA, USA — April 18 - 21, 2017, New York: ACM Digital Library, 2017, p. 103-Conference paper (Refereed)
    Abstract [en]

    Social sensing aims to collect sensory data by using human population as sensor carriers (e.g., location), sensor operators (e.g., taking photos), and sensors themselves (e.g., Twitter). The Internet of Things (IoT) applications facilitate social sensing tasks. However, designing and developing IoT applications is much more complicated than designing and developing desktop, mobile, or web applications. The IoT applications require both software and hardware (e.g., sensors and actuators) to work together on multiple different type of nodes (e.g., micro-controllers, system-on-chips, mobile phones, single-board computers, cloud platforms) with different capabilities under different conditions.

  • 103.
    Perera, Charith
    et al.
    School of Computing Science, Newcastle University, Newcastle, UK.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Calikli, Gul
    Chalmers University, Gothenburg, Sweden.
    Sheng, Quan Z.
    Department of Computing, Macquarie University, Sydney, Australia.
    Li, Kuan-Ching
    Department of Computer Science and Information Engineering (CSIE), Providence University, Taichung City, Taiwan.
    Guest Editorial Special Section on Engineering Industrial Big Data Analytics Platforms for Internet of Things2018In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 14, no 2, p. 744-747Article in journal (Refereed)
  • 104.
    Porambage, Pawani
    et al.
    University of Oulu.
    Ylianttila, Mika
    University of Oulu.
    Schmitt, Corinne
    University of Zürich.
    Kumar, Pardeep
    UiT, The Arctic University of Norway, Narvik.
    Gurtov, Andrei
    Aalto University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Quest for Privacy in the Internet of Things2016In: I E E E Cloud Computing, ISSN 2325-6095, Vol. 3, no 2, p. 36-45Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is the current evolutionary paradigm of networking and the key driving force toward a smart world. Although privacy in the IoT is highly regarded to ensure the protection of users and personal information from the perspective of individual or cooperative users, it's insufficiently studied. As members of the always-connected paradigm of the massive IoT world, people can scarcely control the disclosure of their personal information. The biggest challenge is to allow users to experience the best utilization of IoT-based products and services with the fewest privacy threats and failures. This article provides a holistic view of the challenges of and issues related to preserving IoT privacy, as well as the existing solutions. Privacy by design (PbD) is identified as the key solution for many IoT privacy issues. The article also discusses hot topics in IoT privacy and future research directions.

  • 105.
    Rahimi, M. Reza
    et al.
    Huawei Innovation Center, US R&D Storage Lab, Santa Clara.
    Venkatasubramanian, Nalini
    School of Information and Computer Science, University of California, Irvine.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Mehrotra, Sharad
    School of Information and Computer Science, University of California, Irvine.
    On Optimal and Fair Service Allocation in Mobile Cloud Computing2018In: I E E E Transactions on Cloud Computing, ISSN 2168-7161, Vol. 6, no 3, p. 815-828Article in journal (Refereed)
    Abstract [en]

    This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile applications as a location-time workflows (LTW) of tasks; here users mobility patterns are translated to mobile service usage patterns. We show that an optimal mapping of LTWs to tiered cloud resources considering multiple QoS goals such application delay, device power consumption and user cost/price is an NP-hard problem for both single and group-based applications. We propose an efficient heuristic algorithm called MuSIC that is able to perform well (73% of optimal, 30% better than simple strategies), and scale well to a large number of users while ensuring high mobile application QoS. We evaluate MuSIC and the 2-tier mobile cloud approach via implementation (on real world clouds) and extensive simulations using rich mobile applications like intensive signal processing, video streaming and multimedia file sharing applications. We observe about 25% lower delays and power (under fixed price constraints) and about 35% decrease in price (considering fixed delay) in comparison to only using the public cloud. Our studies also show that MuSIC performs quite well under different mobility patterns, e.g. random waypoint and Manhattan models.

  • 106.
    Ramadan, Rabie A.
    et al.
    Department of Computer Engineering, Cairo University, Egypt and Hail University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Brain Computer Interface: control Signals Review2017In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 223, p. 26-44Article in journal (Refereed)
    Abstract [en]

    Brain Computer Interface (BCI) is defined as a combination of hardware and software that allows brain activities to control external devices or even computers. The research in this field has attracted academia and industry alike. The objective is to help severely disabled people to live their life as regular persons as much as possible. Some of these disabilities are categorized as neurological neuromuscular disorders. A BCI system goes through many phases including preprocessing, feature extraction, signal classifications, and finally control. Large body of research are found at each phase and this might confuse researchers and BCI developers. This article is a review to the state-of-the-art work in the field of BCI. The main focus of this review is on the Brain control signals, their types and classifications. In addition, this survey reviews the current BCI technology in terms of hardware and software where the most used BCI devices are described as well as the most utilized software platforms are explained. Finally, BCI challenges and future directions are stated. Due to the limited space and large body of literature in the field of BCI, another two review articles are planned. One of these articles reviews the up-to-date BCI algorithms and techniques for signal processing, feature extraction, signals classification, and control. Another article will be dedicated to BCI systems and applications. The three articles are written as base and guidelines for researchers and developers pursue the work in the field of BCI.

  • 107.
    Rasheed, Muhammad Babar
    et al.
    COMSATS Institute of Information Technology, Islamabad.
    Javaid, Nadeem
    COMSATS Institute of Information Technology, Islamabad.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Khaan, Zahoorali
    Faculty of Engineering, Dalhousie University, Halifax, NS.
    Qasim, Umar
    University of Alberta, Edmonton.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Delay and energy consumption analysis of priority guaranteed MAC protocol for wireless body area networks2017In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 23, no 4, p. 1249-1266Article in journal (Refereed)
    Abstract [en]

    Wireless body area networks are captivating growing interest because of their suitability for wide range of applications. However, network lifetime is one of the most prominent barriers in deploying these networks for most applications. Moreover, most of these applications have stringent QoS requirements such as delay and throughput. In this paper, the modified superframe structure of IEEE 802.15.4 based MAC protocol is proposed which addresses the aforementioned problems and improves the energy consumption efficiency. Moreover, priority guaranteed CSMA/CA mechanism is used where different priorities are assigned to body nodes by adjusting the data type and size. In order to save energy, a wake-up radio based mechanism to control sleep and active modes of body sensors are used. Furthermore, a discrete time finite state Markov model to find the node states is used. Analytical expressions are derived to model and analyze the behavior of average energy consumption, throughput, packet drop probability, and average delay during normal and emergency data. Extensive simulations are conducted for analysis and validation of the proposed mechanism. Results show that the average energy consumption and delay are relatively higher during emergency data transmission with acknowledgment mode due to data collision and retransmission.

  • 108.
    Revadigar, Girish
    et al.
    School of Computer Science and Engineering, UNSW Australia.
    Javali, Chitra
    School of Computer Science and Engineering, UNSW Australia.
    Xu, Weitao
    School of Information Technology and Electrical Engineering, University of Queensland, Brisbane.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hu, Wen
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Jha, Sanjay
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables2017In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, no 10, p. 2467-2482Article in journal (Refereed)
    Abstract [en]

    The increased usage of smart wearables in various applications, specifically in health-care, emphasizes the need for secure communication to transmit sensitive health-data. In a practical scenario, where multiple devices are carried by a person, a common secret key is essential for secure group communication. Group key generation and sharing among wearables has received very little attention in the literature due to the underlying challenges: (i) difficulty in obtaining a good source of randomness to generate strong cryptographic keys, and (ii) finding a common feature among all the devices to share the key. In this paper, we present a novel solution to generate and distribute group secret keys by exploiting on-board accelerometer sensor and the unique walking style of the user, i.e., gait. We propose a method to identify the suitable samples of accelerometer data during all routine activities of a subject to generate the keys with high entropy. In our scheme, the smartphone placed on waist employs fuzzy vault, a cryptographic construct, and utilizes the acceleration due to gait, a common characteristic extracted on all wearable devices to share the secret key. We implement our solution on commercially available off-the-shelf smart wearables, measure the system performance, and conduct experiments with multiple subjects. Our results demonstrate that the proposed solution has a bit rate of 750 bps, low system overhead, distributes the key securely and quickly to all legitimate devices, and is suitable for practical applications.

  • 109.
    Rho, Seungmin
    et al.
    Department of Media Software at Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Intelligent collaborative system and service in value network for enterprise computing2018In: Enterprise Information Systems, ISSN 1751-7575, E-ISSN 1751-7583, Vol. 12, no 1, p. 1-3Article in journal (Refereed)
  • 110.
    Rho, Seungmin
    et al.
    Department of Multimedia, Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Chen, Weifeng
    Department of Math, Computer Science and Information Systems, California University of Pennsylvania.
    Cyber physical systems technologies and applications2016In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 56, p. 436-437Article in journal (Other academic)
    Abstract [en]

    With the rapid progresses in ICT (Information Communication Technology), multidisciplinary research fields such as Internet of Things (IoT), Cyber-Physical System (CPS), and Social Computing have been widely explored in recent years. These research and application have been speeded up the formation of cyberspace, which will further lead to a subversive change for information science development as well as human production and living (Ma and Yang, 2015 [1]). Cyberspace is being linked to versatile individuals in physical space and social space — Cyber-Physical Society (CPSoc) (Zhuge, 2014 [2]). This special issue on new technologies and research trends for cyber physical systems technologies and application provides high quality contributions addressing related theoretical and practical aspects of CPS technologies and their applications. We have selected five research papers whose topics are strongly related to this special issue.

  • 111.
    Rho, Seungmin
    et al.
    Department of Multimedia, Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Chen, Weifeng
    Department of Math, Computer Science and Information Systems, California University of Pennsylvania.
    Cyber physical systems technologies and applications: Part II2016In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 61, p. 83-84Article in journal (Other academic)
    Abstract [en]

    The second part of the special issue presents more practical issues on cyber physical systems technologies and application. We have selected five research papers whose topics are strongly related to this special issue. As continued from the part 1, we have selected 5 additional papers

  • 112.
    Sakai, Kazuya
    et al.
    Department of Information and Communication Systems, Tokyo Metropolitan University.
    Sun, Min-Te
    Department of Computer Science and Information Engineering, National Central University, Taoyuan.
    Ku, Wei-Shinn
    Department of Computer Science and Software Engineering, Auburn University.
    Lai, Ten H.
    Department of Computer Science and Engineering, The Ohio State University, Columbus.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Framework for the Optimal k-Coverage Deployment Patterns of Wireless Sensors2015In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 15, no 12, p. 7273-7283Article in journal (Refereed)
    Abstract [en]

    The strategy for node deployment to achieve multiple connectivity and coverage plays an important role in various wireless senor network applications. To alleviate the operational cost, the number of nodes to be deployed needs to be reduced. While the optimal k-connectivity deployment patterns (k <= 6) and the multiple k-coverage problem (k <= 3) have been extensively studied for 2-D networks, a general method to identify the optimal deployment pattern for any given sensor coverage requirement has yet to be found. Considering the ease of sensor deployment and operation, the deployment patterns should be identical and symmetric in the deployment region. This implies that the Voronoi diagram of the optimal deployment is a regular tessellation. Based on the fact that there exist only three regular tessellations, we propose a framework, namely, range elimination scheme (RES), to compute the optimal k-coverage deployment pattern for any given k value to accommodate various wireless sensor application requirements. We apply RES to show the optimal k-coverage deployment patterns for 4 <= k <= 9. Our analytical and simulation results show that our proposed framework successfully identifies the optimal deployment patterns and significantly reduces the number of sensors to be deployed

  • 113.
    Sarkar, Chayan
    et al.
    Delft University of Technology.
    Rao, Vijay S.
    Delft University of Technology.
    Prasad, R. Venkatesha
    Delft University of Technology.
    Das, Sankar Narayan
    IIT Kanpur.
    Misra, Sudip
    IIT Kharagpur.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    VSF: An Energy-Efficient Sensing Framework Using Virtual Sensors2016In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 16, no 12, p. 5046-5059, article id 7440786Article in journal (Refereed)
    Abstract [en]

    this paper, we describe virtual sensing framework (VSF), which reduces sensing and data transmission activities of nodes in a sensor network without compromising on either the sensing interval or data quality. VSF creates virtual sensors (VSs) at the sink to exploit the temporal and spatial correlations amongst sensed data. Using an adaptive model at every sensing iteration, the VSs can predict multiple consecutive sensed data for all the nodes with the help of sensed data from a few active nodes. We show that even when the sensed data represent different physical parameters (e.g., temperature and humidity), our proposed technique still works making it independent of physical parameter sensed. Applying our technique can substantially reduce data communication among the nodes leading to reduced energy consumption per node yet maintaining high accuracy of the sensed data. In particular, using VSF on the temperature data from IntelLab and GreenOrb data set, we have reduced the total data traffic within the network up to 98% and 79%, respectively. Corresponding average root mean squared error of the predicted data per node is as low as 0.36 degrees C and 0.71 degrees C, respectively. This paper is expected to support deployment of many sensors as part of Internet of Things in large scales.

  • 114.
    Saxena, Neetesh
    et al.
    Georgia Institute of Technology.
    Grijalva, Santiago
    Georgia Institute of Technology.
    Chukwuka, Victor
    Georgia Institute of Technology.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Network Security and Privacy Challenges in Smart Vehicle-to-Grid2017In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 24, no 4, p. 88-98Article in journal (Refereed)
    Abstract [en]

    Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on user operational energy requirements, such as desired levels of charging and waiting time. V2G is also supported by information management capabilities enabled by a secure network, such as a reliable privacy-preserving payment system. In this article, we describe the network security and privacy requirements and challenges of V2G applications. We present a new network security architecture to support V2G. We propose a scheme with the following security and privacy-preserving features: anonymous authentication, fine-grained access control, anonymous signatures, information confidentiality, message integrity, remote attestation, and a payment system. This article is oriented toward practitioners interested in designing and implementing secure and privacy-preserving networks for smart V2G applications.

  • 115.
    Shakir, Muhammad Zeeshan
    et al.
    Department of Systems and Computer Carleton University, Ottawa.
    Imran, Muhammad AliCenter for Communication, University of Surrey.Qaraqe, Khalid A,Department of Electrical and Computer, Texas A&M University.Alouini, Mohamed-SlimScience and Technology, King Abdallah University.Vasilakos, AthanasiosLuleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Energy Management in Wireless Cellular and Ad-hoc Networks2016Collection (editor) (Refereed)
  • 116.
    Sheng, Quan Z.
    et al.
    University of Adelaide.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Yu, Qi
    Rochester Institute of Technology, Rochester, NY.
    Yao, Lina
    UNSW, Sydney.
    Guest Editorial: Big Data Analytics and the Web2015In: IEEE Transactions on Big Data, ISSN 2332-7790, Vol. 1, no 4, p. 123-124Article in journal (Other academic)
  • 117.
    Shitiri, Ethungshan
    et al.
    School of Electronics, Kyungpook National University, Korea.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cho, Ho-Shin
    School of Electronics, Kyungpook National University, Korea.
    Biological Oscillators in Nanonetworks-Opportunities and Challenges2018In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, no 5, article id 1544Article in journal (Refereed)
    Abstract [en]

    One of the major issues in molecular communication-based nanonetworks is the provision and maintenance of a common time knowledge. To stay true to the definition of molecular communication, biological oscillators are the potential solutions to achieve that goal as they generate oscillations through periodic fluctuations in the concentrations of molecules. Through the lens of a communication systems engineer, the scope of this survey is to explicitly classify, for the first time, existing biological oscillators based on whether they are found in nature or not, to discuss, in a tutorial fashion, the main principles that govern the oscillations in each oscillator, and to analyze oscillator parameters that are most relevant to communication engineer researchers. In addition, the survey highlights and addresses the key open research issues pertaining to several physical aspects of the oscillators and the adoption and implementation of the oscillators to nanonetworks. Moreover, key research directions are discussed.

  • 118.
    Shu, Zhaogang
    et al.
    Fujian Agriculture and Forestry University, Fuzhou, China.
    Wan, Jiafu
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou , South China University of Technology, Guangzhou.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou , South China University of Technology, Guangzhou.
    Lin, Jiaxiang
    Fujian Agriculture and Forestry University, Fuzhou, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Security in Software-Defined Networking: Threats and Countermeasures2016In: Journal on spesial topics in mobile networks and applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 21, no 5, p. 764-776Article in journal (Refereed)
    Abstract [en]

    In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted.

  • 119.
    Socievole, Annalisa
    et al.
    DIMES, Ponte P. Bucci, University of Calabria.
    Zivani, Artur
    National Laboratory for Scientific Computing (LNCC).
    de Rango, Floriano
    DIMES, Ponte P. Bucci, University of Calabria.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Yoneki, Eiko
    University of Cambridge Computer Laboratory, JJ Thomson Avenue Cambridge.
    Cyber-physical systems for Mobile Opportunistic Networking in Proximity (MNP)2016In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 111, p. 1-5Article in journal (Refereed)
  • 120.
    Song, Qiang
    et al.
    Henan University of Technology, College of Electrical Engineering, Zhengzhou, China.
    Liu, Fang
    Huanghuai University, Zhumadian, China.
    Cao, Jinde
    Southeast University, Research Center for Complex Systems and Network Sciences, Nanjing, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Tang, Yang
    East China University of Science and Technology, Institute of Physics, Berlin, Germany.
    Leader-following synchronization of coupled homogeneous and heterogeneous harmonic oscillators based on relative position measurements2018In: IEEE Transactions on Control of Network Systems, ISSN 2325-5870Article in journal (Refereed)
    Abstract [en]

    This paper considers the leader-following synchronization problem for a network of coupled harmonic oscillators by utilizing the relative position measurements between neighboring nodes, where the node dynamics can be either identical or nonidentical. For a homogeneous network with the same node dynamics, two types of first-order observer-based protocols are proposed to achieve leader-following synchronization in the network under some necessary and sufficient conditions, including some synchronization criteria for the homogeneous network subject to parameter uncertainty. For a heterogeneous network with different node dynamics, an output regulation approach is applied to solve the leader-following synchronization problem for the nominal network, based on which the robust synchronization of the uncertain network is investigated with an allowable bound being estimated for parameter uncertainties. Numerical examples are given to illustrate the correctness and the feasibility of the theoretical analysis. 

  • 121.
    Song, Qiang
    et al.
    College of Electrical Engineering, Henan University of Technology, Zhengzhou.
    Liu, Fang
    School of Information Engineering, Huanghuai University, Henan.
    Su, Housheng
    School of Automation, Huazhong University of Science and Technology, Wuhan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Semi-global and global containment control of multi-agent systems with second-order dynamics and input saturation2016In: International Journal of Robust and Nonlinear Control, ISSN 1049-8923, E-ISSN 1099-1239, Vol. 36, no 16, p. 3460-3480Article in journal (Refereed)
    Abstract [en]

    This paper considers both semi-global and global containment control for a second-order multi-agent system that is composed by a network of identical harmonic oscillators or double integrators with multiple leaders and input saturation. A distributed low gain feedback algorithm is proposed to solve the semi-global containment control problem for the network whose topology is directed and initial condition is taken from any a priori given bounded set. In particular, by using a parametric Lyapunov equation approach, M-matrix properties and algebraic graph theory, an upper bound of the low gain parameter is estimated such that the low gain feedback matrix can be analytically determined without involving numerical computation. Furthermore, under the assumption that the induced subgraph formed by the followers is strongly connected and detail balanced, two linear feedback protocols are designed for coupled harmonic oscillators and coupled double integrators, respectively, to asymptotically achieve the global containment control of the network with any initial condition. Finally, numerical examples are given to illustrate the effectiveness of the theoretical results

  • 122.
    Su, Guanming
    et al.
    Dolby Labs, Sunnyvale, CA.
    Su, Xiao
    Computer Engineering, San José State University.
    Bai, Yan
    Institute of Technology, University of Washington Tacoma.
    Wang, Mea
    Department of Computer Science, University of Calgary.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Wang, Haohong
    TCL Research America, San Jose.
    QoE in video streaming over wireless networks: perspectives and research challenges2016In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 22, no 5, p. 1571-1593Article in journal (Refereed)
    Abstract [en]

    The deployment of 3G/LTE networks and advancements in smart mobile devices had led to high demand for multimedia streaming over wireless network. The rapid increasing demand for multimedia content poses challenges for all parties in a multimedia streaming system, namely, content providers, wireless network service providers, and smart device makers. Content providers and mobile network service providers are both striving to improve their streaming services while utilizing advancing technologies. Smart device makers endeavor to improve processing power and displays for better viewing experience. Ultimately, the common goal shared by content providers, network service providers, and smart device manufactures is to improve the QoE for users. QoE is both an objective and a subjective metric measuring the streaming quality experience by end users. It may be measured by streaming bitrate, playback smoothness, video quality metrics like Peak to Signal Noise Ratio, and other user satisfaction factors. There have been efforts made to improve the streaming experiences in all these aspects. In this paper, we conducted a survey on existing literatures on QoE of video streaming to gain a deeper and more complete understanding of QoE quality metrics. The goal is to inspire new research directions in defining better QoE and improving QoE in existing and new streaming services such as adaptive streaming and 3D video streaming

  • 123.
    Sun, Gang
    et al.
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China; Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Li, Yayu
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Yu, Hongfang
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China; Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Du, Xiaojiang
    Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA.
    Guizani, Mohsen
    Department of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA.
    Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks2019In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, p. 347-360Article in journal (Refereed)
    Abstract [en]

    Service function chaining (SFC) provisioning is helpful not only for saving the capital expenditure (CAPEX) and operational expenditure (OPEX) of a network provider but also for reducing energy consumption in the substrate network. However, to the best of our knowledge, there has been little research on the problem of energy consumption for orchestrating online SFC requests in multi-domain networks. In this paper, we first formulate the problem of an energy-efficient online SFC request that is orchestrated across multiple clouds as an integer linear programming (ILP) model to find an optimal solution. Then, we analyze the complexity of this ILP model and prove that the problem is NP-hard. Additionally, we propose a low-complexity heuristic algorithm named energy-efficient online SFC request orchestration across multiple domains (EE-SFCO-MD) for near-optimally solving the mentioned problem. Finally, we conduct simulation experiments to evaluate the performance of our algorithm. Simulation results show that EE-SFCO-MD consumes less energy than existing approaches while the online SFC’s requirements are met and the privacy of each cloud is effectively guaranteed. The low computational complexity of the heuristic approach makes it applicable for quickly responding to online SFC requests.

  • 124.
    Sun, Jian
    et al.
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Liu, Tong
    Department of Information and Communication Engineering, Harbin Engineering University, Harbin.
    Wang, Xianxian
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Xing, Chengwen
    School of Information and Electronics, Beijing Institute of Technology, Beijing.
    Xiao, Hailin
    Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Zhang, Zhogshan
    Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology.
    Optimal mode selection with uplink data rate maximization for D2D-aided underlaying cellular networks2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 8844-8856, article id 7762100Article in journal (Refereed)
    Abstract [en]

    The device-to-device (D2D) communication has been regarded as an effective technique for complementing and enhancing the conventional cellular systems owing to its capability of substantially improving both the spectral and power efficiencies of wireless networks. However, the severe interference imposed on the conventional cellular users (CUs) by the geographically close-by D2D pairs may cause a significant performance erosion in the D2D-aided underlaying cellular networks (CNs). In this paper, performance analysis for the D2D-aided underlaying CNs in terms of throughput is provided. We first derive the closed-form expressions of the coverage probability for both the conventional cellular links and the D2D links, followed by giving out the approximated expressions of the ergodic data rate for both an individual cellular/D2D link and the whole underlaying network. Furthermore, the key parameters (e.g., the density of D2D users (DUs) or CUs, and the average geographical distance between a pair of D2D peers) significantly impacting the channel capacity are adaptively adjusted for maximizing the sum data rate of the proposed underlaying networks. In addition, both theoretical analysis and simulation results reveal the attainability of the maximal throughput by optimizing the critical parameters, such as the density of DUs, provided that the scale factor between the DUs and sum users (i.e., comprising both conventional CUs and DUs) can be effectively balanced subject to the constraints specified in the proposed scheme

  • 125.
    Sun, Min-Te
    et al.
    Department of Computer Science and Information Engineering, National Central University, Taoyuan 320, Taiwan.
    Sakai, Kazuya
    Department of Information and Communication Systems, Tokyo Metropolitan University, 6-6 Asahigaoka, Hino, Tokyo.
    Ku, Wei-Shinn
    Department of Computer Science and Software Engineering, Auburn University, Auburn,.
    Lai, Ten H.
    Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Private and Secure Tag Access for Large-Scale RFID Systems2016In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 13, no 6, p. 657-671Article in journal (Refereed)
    Abstract [en]

    The performance of key authentication and the degree of privacy in large-scale RFID systems are considered by manyresearchers as tradeoffs. Based on how keys are managed in the system, the privacy preserving tag authentications proposed in thepast can be categorized into tree-based and group-based approaches. While a tree-based approach achieves high performance in keyauthentication, it suffers from the issue of low privacy should a fraction of tags be compromised. On the contrary, while group-based keyauthentication is relatively invulnerable to compromise attacks, it is not scalable to a large number of tags. In this paper, we propose anew private tag authentication protocol based on skip lists, named randomized skip lists-based authentication (RSLA). Withoutsacrificing the authentication performance, RSLA provides a high privacy preserving mechanism. While RSLA provides the same levelof unpredictability-based-privacy and indistinguishability-based privacy compared with other structured key management approaches,our scheme achieves the highest system anonymity with good performance in key look up and update. In addition, the simulationresults match our analyses closely.

  • 126.
    Tahira, Shireen
    et al.
    Department of Computer Science and Software Engineering, International Islamic University, Islamabad.
    Sher, Muhammad
    Department of Computer Science and Software Engineering, International Islamic University, Islamabad.
    Ullah, Ata
    Department of Computer Science, National University of Modern Languages, Islamabad .
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Handover Based IMS Registration Scheme for Next Generation Mobile Networks2017In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2017, article id 8789513Article in journal (Refereed)
    Abstract [en]

    Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming andmassive data sharing in social and communication networks. In these networks, user equipment has to register with IPMultimedia Subsystem (IMS) which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM) registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  • 127.
    Tang, Rui
    et al.
    Department of Computer and Information Science, University of Macau.
    Fong, Simon
    Department of Computer and Information Science, University of Macau.
    Deb, Suash
    INNS India Regional Chapter.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Millham, Richard C.
    Department of Information Technology, Durban University of Technology.
    Dynamic Group Optimisation Algorithm for Training Feed-Forward Neural Networks2018In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 314, p. 1-19Article in journal (Refereed)
    Abstract [en]

    Feed-forward neural networks are efficient at solving various types of problems. However, finding efficient training algorithms for feed-forward neural networks is challenging. The dynamic group optimisation (DGO) algorithm is a recently proposed half-swarm half-evolutionary algorithm, which exhibits a rapid convergence rate and good performance in searching and avoiding local optima. In this paper, we propose a new hybrid algorithm, FNNDGO that integrates the DGO algorithm into a feed-forward neural network. DGO plays an optimisation role in training the neural network, by tuning parameters to their optimal values and configuring the structure of feed-forward neural networks. The performance of the proposed algorithm was determined by comparing its performance with those of other training methods in solving two types of problems. The experimental results show that our proposed algorithm exhibits promising performance for solving real-world problems.

  • 128.
    Tang, Yang
    et al.
    Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai.
    Gao, Huijun
    Research Institute of Intelligent Control and Systems, Harbin Institute of Technology.
    Du, Wei
    Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai , Institute of Textiles and Clothing, The Hong Kong Polytechnic University.
    Lu, Jianquan
    Department of Mathematics, Southeast University Nanjing.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Kurths, Jûrgen
    Potsdam Institute for Climate Impact Research.
    Robust Multiobjective Controllability of Complex Neuronal Networks2016In: IEEE/ACM Transactions on Computational Biology & Bioinformatics, ISSN 1545-5963, E-ISSN 1557-9964, Vol. 13, no 4, p. 778-791Article in journal (Refereed)
    Abstract [en]

    This paper addresses robust multiobjective identification of driver nodes in the neuronal network of a cat’s brain, in which uncertainties in determination of driver nodes and control gains are considered. A framework for robust multiobjective controllability is proposed by introducing interval uncertainties and optimization algorithms. By appropriate definitions of robust multiobjective controllability, a robust nondominated sorting adaptive differential evolution (NSJaDE) is presented by means of the nondominated sorting mechanism and the adaptive differential evolution (JaDE). The simulation experimental results illustrate the satisfactory performance of NSJaDE for robust multiobjective controllability, in comparison with six statistical methods and two multiobjective evolutionary algorithms (MOEAs): nondominated sorting genetic algorithms II (NSGA-II) and nondominated sorting composite differential evolution (NSCDE). It is revealed that the existence of uncertainties in choosing driver nodes and designing control gains heavily affect the controllability of neuronal networks. We also unveil that driver nodes play a more drastic role than control gains in robust controllability. The developed NSJaDE and obtained results will shed light on the understanding of robustness in controlling realistic complex networks such as transportation networks, power grid networks and biological networks, etc.

  • 129.
    Ten, Chee-Wooi
    et al.
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Yamashita, Koji
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Yang, Zhiyuan
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Ginter, Andrew
    Waterfall Security Solutions.
    Impact Assessment of Hypothesized Cyberattackson Interconnected Bulk Power Systems2018In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 9, no 5, p. 4405-4425Article in journal (Refereed)
    Abstract [en]

    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/ local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of “nightmare” scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies

  • 130.
    Tong, Guoxiang
    et al.
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Wu, Guanning
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Tan, Jian
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Xiong, Naixue
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A digital noise reduction scheme in communication systems for internet of things2016In: Journal of Internet Technology, ISSN 1607-9264, E-ISSN 2079-4029, Vol. 17, no 5, p. 879-887Article in journal (Refereed)
    Abstract [en]

    Data-driven computing and using data for strategic advantages are exemplified by communication systems, and the speech intelligibility in communication systems is generally interrupted by interfering noise. This interference comes from the environmental noise, so it can reduce them intelligibility by masking the interested signal. An important work in communication systems is to extract speech from noisy speech and inhibiting background noise. The primary purpose of speech noise reduction system is to extract pure speech from speech signal with noise. The focus of this paper is to build a new noise reduction system on the basis of the optimization of digital noise reduction algorithms. According to the program simulation results based on MATLAB, the digital noise reduction system has many improved performances in the low SNR and achieves more than 5dB-15dB on noise reduction. The combined algorithm was tested under different noise conditions, and data display that the optimize performance of algorithm achieve the best. The simulation results demonstrate that it can get nearly three times better than the other two algorithms. The output signal of combined algorithm are very close to the pure speech signal, the performance of restore the voice signal is better than the other two algorithms

  • 131.
    Tsai, Chun-Wei
    et al.
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Lai, Chin-Feng
    Institute of Computer Science and Information Engineering, National Chung Cheng University, Chia-Yi.
    Chao, Han-Chieh
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Big Data Analytics2016In: Big Data Technologies and Applications, Springer International Publishing , 2016, p. 13-52Chapter in book (Refereed)
    Abstract [en]

    The age of big data is now coming. But the traditional data analytics may not be able to handle such large quantities of data. The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. To deeply discuss this issue, this paper begins with a brief introduction to data analytics, followed by the discussions of big data analytics. Some important open issues and further research directions will also be presented for the next step of big data analytics.

  • 132.
    Tsai, Chun-Wei
    et al.
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Lai, Chin-Feng
    Institute of Computer Science and Information Engineering, National Chung Cheng University, Chia-Yi.
    Chao, Han-Chieh
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Big data analytics: a survey2015In: Journal of Big Data, ISSN 2196-1115, Vol. 2, article id 21Article in journal (Refereed)
    Abstract [en]

    The age of big data is now coming. But the traditional data analytics may not be able to handle such large quantities of data. The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. To deeply discuss this issue, this paper begins with a brief introduction to data analytics, followed by the discussions of big data analytics. Some important open issues and further research directions will also be presented for the next step of big data analytics.

  • 133.
    Valenza, Gaetano
    et al.
    University of Pisa.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Perspective: It's All About Time2017In: IEEE Transactions on Nanobioscience, ISSN 1536-1241, E-ISSN 1558-2639, Vol. 16, no 4, p. 309-310Article in journal (Refereed)
    Abstract [en]

    New knowledge on multi-scale temporal dynamics linking nanobio-time series, seasonal changes, immune response, and gut mictobiota can milestone (neuro) science soon.

  • 134.
    Vasilakos, Athanasios
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Duan, Qiang
    Pennsylvania State University.
    Federated selection of network and cloud services for high-performance software-defined cloud computing2016In: International Journal of High Performance Computing and Networking, ISSN 1740-0562, E-ISSN 1740-0570, Vol. 9, no 4, p. 316-327Article in journal (Refereed)
    Abstract [en]

    The crucial role of networking in cloud service provisioning calls for federated selection of network and cloud services in order to guarantee the service performance required by diverse applications. In order to address the new challenges brought in by the software-defined cloud environment (SDCE) to service selection, we develop an approach for performance-based federated selection of network and cloud services in this paper. The main contributions we make in this paper include an abstract profile for network/cloud service capability that is agnostic to service implementations, a general demand profile applicable to diverse applications, an analysis technique for evaluating achievable performance of composite network-cloud services, and a scheme for federated selection of network and cloud services based on performance evaluation. The technique and method developed in this paper enable service selection with a holistic vision across the networking and computing domains, which may greatly facilitate high-performance cloud service provisioning

  • 135.
    Vasilakos, Athanasios
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Li, Zhe
    Institut Mine Telecom - Telecom Bretagne, France.
    Simon, Gwendal
    Institut Mine Telecom - Telecom Bretagne, France.
    You, Wei
    Orange, France.
    Information centric network: Research challenges and opportunities2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 52, p. 1-10Article in journal (Refereed)
    Abstract [en]

    For more than a decade, the inherent drawbacks of current Internet have been calling for its revolutionary designs. The end-to-end model, which was designed for special data transmission in the early age of Internet, is causing troubles everywhere in nowadays content based web services. Consequently, Information Centric Network (ICN) is proposed to solve these problems. As the most permanent clean-slate approach for next generation Internet, ICN has attracted much attention from network researchers in the passed few years. This survey focuses on the current progress of the research work in ICN. It investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this domain.

  • 136.
    Vinel, Alexey
    et al.
    School of Information Technology, Halmstad University.
    Chen, Wen-Shyen Eric
    ProphetStor.
    Xiong, Neal N.
    Department of Business and Computer Science, Southwestern Oklahoma State University.
    Rho, Seungmin
    Department of Media Software at Sungkyul University.
    Chilamkurti, Naveen
    Department of Computer Science and Telecommunications, La Trobe University, Melbourne.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Enabling wireless communication and networking technologies for the internet of things: Guest editorial2016In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 23, no 5, p. 8-9Article in journal (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is enabling ubiquitous computing with a novel design paradigm to integrate global physical objects, cyber and social spaces, and machines. It may be envisaged as a web of trillions of machines that will communicate with each other. The major enabling technologies that are giving a flying kickstart to IoT are ad hoc and wireless sensor networks, short-range wireless communications, real-time systems, low power and energy harvesting, radio frequency identification, machine type communication, resource-constrained networks, and embedded software.

  • 137.
    Viriyasitavat, Wantanee
    et al.
    Information and Communication Technology, Mahidol University, Bangkok.
    Boban, Mate
    NEC Laboratories Europe, NEC Europe Ltd., Heidelberg.
    Tsai, Hsinmu
    Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Vehicular communications: Survey and challenges of channel and propagation models2015In: IEEE Vehicular Technology Magazine, ISSN 1556-6072, E-ISSN 1556-6080, Vol. 10, no 2, p. 55-66, article id 7108160Article in journal (Refereed)
    Abstract [en]

    Vehicular communication is characterized by a dynamic environment, high mobility, and comparatively low antenna heights on the communicating entities (vehicles and roadside units). These characteristics make vehicular propagation and channel modeling particularly challenging. In this article, we classify and describe the most relevant vehicular propagation and channel models, with a particular focus on the usability of the models for the evaluation of protocols and applications. We first classify the models based on the propagation mechanisms they employ and their implementation approach. We also classify the models based on the channel properties they implement and pay special attention to the usability of the models, including the complexity of implementation, scalability, and the input requirements (e.g., geographical data input). We also discuss the less-explored aspects in vehicular channel modeling, including modeling specific environments (e.g., tunnels, overpasses, and parking lots) and types of communicating vehicles (e.g., scooters and public transportation vehicles). We conclude by identifying the underresearched aspects of vehicular propagation and channel modeling that require further modeling and measurement studies

  • 138.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Liu, Jianqi
    School of Information Engineering, Guangdong Mechanical & Electrical College, Guangzhou.
    Shao, Zehio
    School of Information Science and Technology, Chengdu University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Zhou, Keliang
    School of Electrical Engineering and Automation, Jiangxi University of Science and Technology, Ganzhou.
    Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles2016In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 16, no 1, article id 88Article in journal (Refereed)
    Abstract [en]

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.

  • 139.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Tang, Shenglog
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Shu, Zhaogang
    Fujian Agriculture and Forestry University, Fuzhou, China, College of Computer and Information Sciences, Fujian Agriculture and Forestry University.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Wang, Shiyong
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Software-Defined Industrial Internet of Things in the Context of Industry 4.02016In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 16, no 20, p. 7373-7380Article in journal (Refereed)
  • 140.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Tang, Shenglong
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cloud Robotics: Current Status and Open Issues2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 2797-2807Article in journal (Refereed)
    Abstract [en]

    With the development of cloud computing, big data and other emerging technologies, the integration of cloud technology and multi-robot systems makes it possible to design multi-robot systems with improved energy efficiency, high real-time performance and low cost. In order to address the potential of clouds in enhancing robotics for industrial systems, this paper describes the basic concepts and development process of cloud robotics and the overall architecture of these systems. Then, the major driving forces behind the development of cloud robotics are carefully analyzed from the point of view of cloud computing, big data, open source resources, robot cooperative learning, and network connectivity. Subsequently, the key issues and challenges in the current cloud robotic systems are proposed, and some possible solutions are also given. Finally, the potential value of cloud robotic systems in different practical applications is discussed.

  • 141.
    Wan, Jiafu
    et al.
    Guangdong Provincial Key Laboratory of Precision Equipment and Manufacturing Technology, South China University of Technology.
    Tang, Shenglong
    School of Mechanical and Automotive Engineering, South China University of Technology.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology.
    Wang, Shiyong
    School of Mechanical and Automotive Engineering, South China University of Technology.
    Liu, Chengliang
    School of Mechanical Engineering, Shanghai Jiao Tong University.
    Abbas, Haider
    Center of Excellence in Information Assurance, King Saud University.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Manufacturing Big Data Solution for Active Preventive Maintenance2017In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 13, no 4, p. 2039-2047, article id 7857790Article in journal (Refereed)
    Abstract [en]

    Industry 4.0 has become more popular due to recent developments in Cyber-Physical Systems (CPS), big data, cloud computing, and industrial wireless networks. Intelligent manufacturing has produced a revolutionary change, and evolving applications such as product lifecycle management are becoming a reality. In this paper, we propose and implement a manufacturing big data solution for active preventive maintenance in manufacturing environments. First, we provide the system architecture that is used for active preventive maintenance. Then, we analyze the method used for collection of manufacturing big data according to the data characteristics. Subsequently, we perform data processing in the cloud, including the cloud layer architecture, the real-time active maintenance mechanism, and the off-line prediction and analysis method. Finally, we analyze a prototype platform and implement experiments to compare the traditionally-used method with the proposed active preventive maintenance method. The manufacturing big data method used for active preventive maintenance has the potential to accelerate implementation of Industry 4.0.

  • 142.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Zhang, Daqiang
    School of Software Engineering, Tongji University, Shanghai.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Lloret, Jaime
    Department of Communications Polytechnic University of Valencia.
    Guest Editorial Special Issue on Cloud-Integrated Cyber-Physical Systems2017In: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 11, no 1, p. 84-87Article in journal (Other academic)
    Abstract [en]

    The advances in wireless sensor devices, big data, mobile computing, and cloud computing offer tremendous opportunities to realize the seamless integration between the physical world and the cyber space. The cloud-integrated cyberphysical system (CCPS) refers to virtually representing physical system components, such as sensors, actuators, robots, and other devices in clouds, accessing (e.g., monitoring, actuating and navigating) those physical components through their virtual representations, and processing/managing/controlling the large amount of data collected from physical components in clouds in a scalable, real-time, efficient, and reliable manner. Particularly, integrating cloud computing techniques (e.g., virtualization, elastic re-configuration, and multi-tenancy of resources) with CPS techniques (e.g., real-time scheduling, adaptive resource management and control, and embedded system design) will bring hope to advance the state of the art, and allow previously unachievable systems such as cloud-integrated internet of vehicles to be built, deployed, managed, and controlled effectively. This Special Issue on CCPS solicits the manuscripts on rigorous research on theories, methodologies, tools, and testbeds for CCPS. In this special issue, we selected ten papers. Each paper was carefully reviewed by peer review and guest editors. In the following, we will overview the accepted papers that reflect recent advances.

  • 143.
    Wang, Bin
    et al.
    School of Software, Shanghai Jiao Tong University.
    Qi, Zhengwei
    School of Software, Shanghai Jiao Tong University.
    Ma, Ruhui
    School of Software, Shanghai Jiao Tong University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Guan, Haibing
    School of Software, Shanghai Jiao Tong University.
    A survey on data center networking for cloud computing2015In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 91, p. 528-547Article in journal (Refereed)
    Abstract [en]

    Data Center Networks (DCNs) are an essential infrastructure that impact the success of cloud computing. A scalable and efficient data center is crucial in both the construction and operation of stable cloud services. In recent years, the growing importance of data center networking has drawn much attention to related issues including connective simplification and service stability. However, existing DCNs lack the necessary agility for multi-tenant demands in the cloud, creating poor responsiveness and limited scalability. In this paper, we present an overview of data center networks for cloud computing and evaluate construction prototypes based on these issues. We provide, specifically, detailed descriptions of several important aspects: the physical architecture, virtualized infrastructure, and DCN routing. Each section of this work discusses and evaluates resolution approaches, and presents the use cases for cloud computing service. In our attempt to build insight relevant to future research, we also present some open research issues. Based on experience gained in both research and industrial trials, the future of data center networking must include careful consideration of the interactions between the important aspects mentioned above

  • 144.
    Wang, Chihyu
    et al.
    Research Center for Information Technology Innovation, Academia Sinica, Taipei.
    Wei, Hungyu Hung-Yu
    National Taiwan University.
    Bennis, Mehdi
    University of Oulu.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Game-theoretic approaches in heterogeneous networks2015In: Game Theory Framework Applied to Wireless Communication Networks, Hershey, PA: IGI Global, 2015, p. 88-102Chapter in book (Refereed)
    Abstract [en]

    Improving capacity and coverage is one of the main issues in next-generation wireless communication. Heterogeneous networks (HetNets), which is currently investigated in LTE-Advanced standard, is a promising solution to enhance capacity and eliminate coverage holes in a cost-efficient manner. A HetNet is composed of existing macrocells and various types of small cells. By deploying small cells into the existing network, operators enhance the users' quality of service which are suffering from severe signal degradation at cell edges or coverage holes. Nevertheless, there are numerous challenges in integrating small cells into the existing cellular network due to the characteristics: unplanned deployment, intercell interference, economic potential, etc. Recently, game theory has been shown to be a powerful tool for investigating the challenges in HetNets. Several game-theoretic approaches have been proposed to model the distributed deployment and self-organization feature of HetNets. In this chapter, the authors first give an overview of the challenges in HetNets. Subsequently, the authors illustrate how game theory can be applied to solve issues related to HetNets.

  • 145.
    Wang, Qiu
    et al.
    Faculty of Information Technology, Macau University of Science and Technology, Macau.
    Dai, Hong-Ning
    Faculty of Information Technology, Macau University of Science and Technology, Macau.
    Zheng, Zibin
    School of Data and Computer Science, Sun Yat-Sen University, Guangzhou .
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    On Connectivity of Wireless Sensor Networks with Directional Antennas2017In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 17, no 1, article id E134Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the network connectivity of wireless sensor networks with directional antennas. In particular, we establish a general framework to analyze the network connectivity while considering various antenna models and the channel randomness. Since existing directional antenna models have their pros and cons in the accuracy of reflecting realistic antennas and the computational complexity, we propose a new analytical directional antenna model called the iris model to balance the accuracy against the complexity. We conduct extensive simulations to evaluate the analytical framework. Our results show that our proposed analytical model on the network connectivity is accurate, and our iris antenna model can provide a better approximation to realistic directional antennas than other existing antenna models.

  • 146.
    Wang, Sen
    et al.
    School of Software Engineering, Chongqing University, and Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing.
    Bi, Jun
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Wu, Jianping
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    CPHR: In-Network Caching for Information-Centric Networking With Partitioning and Hash-Routing2016In: IEEE/ACM Transactions on Networking, ISSN 1063-6692, E-ISSN 1558-2566, Vol. 24, no 5, p. 2742-2755Article in journal (Refereed)
    Abstract [en]

    Recently, research on Information-Centric Networking (ICN) has flourished, which attempts to shift from the current host-oriented Internet architecture to an information-oriented one. The built-in caching capability is a typical feature of ICN. In this paper, in order to fully exploit the built-in caching capability of ICN, we propose a collaborative in-network caching scheme with Content-space Partitioning and Hash-Routing, which is named as CPHR. By intelligently partitioning the content space and assigning partitions to caches, CPHR is able to constrain the path stretch incurred by hash-routing. We formulate the problem of assigning partitions to caches into an optimization problem of maximizing the overall hit ratio and propose a heuristic algorithm to solve it. We also formulate the partitioning proportion problem into a min-max linear optimization problem to balance cache workloads. By simulations with both the characteristics of real Internet traffic and traces of peer-to-peer (P2P) traffic, we show the necessity of collaborative caching since the en-route caching mode cannot yield a considerable overall hit ratio with practical cache size. It is shown as well that CPHR can significantly increase the overall hit ratio by up to about 100% with the practical cache policy Least Recently Used (LRU) while the overhead incurred is acceptable in terms of propagation latency and load on links.

  • 147.
    Wang, You
    et al.
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Bi, Jun
    Institute for Network Sciences and Cyberspace, Tsinghua University.
    Vasilakos, Athanasios
    University of Western Macedonia.
    An Identifier-Based Approach to Internet Mobility:: A Survey2016In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 1, p. 72-79Article in journal (Refereed)
  • 148.
    Wang, Yufeng
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing.
    Bu, Yuanting
    Nanjing University of Posts and Telecommunications, Nanjing.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Jin, Qun
    Waseda University.
    Energy-Efficient Localization and Tracking on Smartphones: Design Principle and Solutions2016In: CFI '16: Proceedings of the 11th International Conference on Future Internet Technologies, New York: ACM Digital Library, 2016, p. 29-35Conference paper (Refereed)
    Abstract [en]

    In recent years, various location based services (LBS) have witnessed great development and are being prevalently used in our life. However, as the foundation of various LBS applications, localization consumes large energy of resource-constraint mobile terminals, especially on smartphones. This paper explicitly proposes three technical principles, substitution, adaption and collaboration to guide energy-efficient localization and tracking schemes on smartphones. Then several typical schemes in indoor or outdoor environments are respectively summarized and compared under the umbrella of those three principles. Moreover, the context-assisting techniques are also discussed to design energy-efficient LBS applications. Finally, the quantitative metrics to measure the tradeoff between energy and localization performance are summarized. The primary goal of this paper is to comprehensively classify and provide a summary on the sporadic localization schemes (with energy-efficiency as main concern), possible solutions and tradeoffs, and facilitate to develop and deploy the energy-efficient LBS applications.

  • 149.
    Wang, Yufeng
    et al.
    Nanjing University of Posts and Telecommunications.
    Dai, Wei
    Nanjing University of Posts and Telecommunications.
    Zhang, Bo
    Nanjing University of Posts and Telecommunications.
    Ma, Jianhua
    Hosei University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Word of Mouth Mobile Crowdsourcing: Increasing Awareness of Physical, Cyber, and Social Interactions2017In: IEEE MultiMedia, E-ISSN 1070-986X, Vol. 24, no 4, p. 26-37Article in journal (Refereed)
    Abstract [en]

    By fully exploring various sensing capabilities and multiple wireless interfaces of mobile devices and integrating them with human power and intelligence, mobile crowdsourcing (MCS) is emerging as an effective paradigm for large-scale multimedia-related applications. However, most MCS schemes use a direct mode, in which crowdworkers passively or actively select tasks and contribute without interacting and collaborating with each other; such a mode can hamper some time-constrained crowdsourced tasks. This article explores a different approach: MCS based on word of mouth (WoM), in which crowdworkers, apart from executing tasks, exploit their mobile social networks and/or physical encounters to actively recruit other appropriate individuals to work on the task. The authors describe a WoM-based MCS architecture and typical applications, which they divide into Internet-scale and local scale. They then systematically summarize the main technical challenges, including crowdworker recruitment, incentive design, security and privacy, and data quality control, and they compare typical solutions. Finally, from a systems-level viewpoint, they discuss several practical issues that must be resolved. This article is part of a special issue on cybersecurity.

  • 150.
    Wang, Yufeng
    et al.
    Media Lab, Waseda University, Tokyo.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Jin, Qun
    Faculty of Human Sciences, Waseda University, Tokyo.
    Device-to-device based proximity service: Architecture, issues, and applications2017Book (Refereed)
    Abstract [en]

    Abstract View references (360)

    D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.

1234 101 - 150 of 198
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf