期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Energy efficient indoor localisation for narrowband internet of things
1
作者 Ismail Keshta Mukesh Soni +6 位作者 Mohammed Wasim Bhatt azeem irshad Ali Rizwan Shakir Khan Renato RMaaliw III Arsalan Muhammad Soomar Mohammad Shabaz 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1150-1163,共14页
There are an increasing number of Narrow Band IoT devices being manufactured as the technology behind them develops quickly.The high co‐channel interference and signal attenuation seen in edge Narrow Band IoT devices... There are an increasing number of Narrow Band IoT devices being manufactured as the technology behind them develops quickly.The high co‐channel interference and signal attenuation seen in edge Narrow Band IoT devices make it challenging to guarantee the service quality of these devices.To maximise the data rate fairness of Narrow Band IoT devices,a multi‐dimensional indoor localisation model is devised,consisting of transmission power,data scheduling,and time slot scheduling,based on a network model that employs non‐orthogonal multiple access via a relay.Based on this network model,the optimisation goal of Narrow Band IoT device data rate ratio fairness is first established by the authors,while taking into account the Narrow Band IoT network:The multidimensional indoor localisation optimisation model of equipment tends to minimize data rate,energy constraints and EH relay energy and data buffer constraints,data scheduling and time slot scheduling.As a result,each Narrow Band IoT device's data rate needs are met while the network's overall performance is optimised.We investigate the model's potential for convex optimisation and offer an algorithm for optimising the distribution of multiple resources using the KKT criterion.The current work primarily considers the NOMA Narrow Band IoT network under a single EH relay.However,the growth of Narrow Band IoT devices also leads to a rise in co‐channel interference,which impacts NOMA's performance enhancement.Through simulation,the proposed approach is successfully shown.These improvements have boosted the network's energy efficiency by 44.1%,data rate proportional fairness by 11.9%,and spectrum efficiency by 55.4%. 展开更多
关键词 artificial inteligence detection of moving objects internet of things
下载PDF
Identification and Visualization of Spatial and Temporal Trends in Textile Industry
2
作者 Umair Yousaf Muhammad Asif +6 位作者 Shahbaz Ahmed Noman Tahir azeem irshad Akber Abid Gardezi Muhammad Shafiq Jin-Ghoo Choi Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2023年第2期4165-4181,共17页
The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mi... The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better. 展开更多
关键词 Text mining spatiotemporal trend research collaboration
下载PDF
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
3
作者 Bander Alzahrani Ahmed Barnawi +3 位作者 azeem irshad Areej Alhothali Reem Alotaibi Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2022年第3期6141-6158,共18页
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial applications.For example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider a... Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial applications.For example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time.However,due to the open atmosphere,drones can easily be lost or captured by attackers when reporting information to the crowd management center.In addition,the attackers may initiate malicious detection to disrupt the crowd-sensing communication network.Therefore,security and privacy are one of the most significant challenges faced by drones or the Internet of Drones(IoD)that supports the Internet of Things(IoT).In the literature,we can find some authenticated key agreement(AKA)schemes to protect access control between entities involved in the IoD environment.However,the AKA scheme involves many vulnerabilities in terms of security and privacy.In this paper,we propose an enhancedAKAsolution for crowdmonitoring applications that require secure communication between drones and controlling entities.Our scheme supports key security features,including anti-forgery attacks,and confirms user privacy.The security characteristics of our scheme are analyzed byNS2 simulation and verified by a random oracle model.Our simulation results and proofs show that the proposed scheme sufficiently guarantees the security of crowd-aware communication. 展开更多
关键词 IOT unmanned aerial vehicles AUTHENTICATION crowd monitoring
下载PDF
Spark Spectrum Allocation for D2D Communication in Cellular Networks
4
作者 Tanveer Ahmad Imran Khan +5 位作者 azeem irshad Shafiq Ahmad Ahmed TSoliman Akber Abid Gardezi Muhammad Shafiq Jin-Ghoo Choi 《Computers, Materials & Continua》 SCIE EI 2022年第3期6381-6394,共14页
The device-to-device(D2D)technology performs explicit communication between the terminal and the base station(BS)terminal,so there is no need to transmit data through the BS system.The establishment of a short-distanc... The device-to-device(D2D)technology performs explicit communication between the terminal and the base station(BS)terminal,so there is no need to transmit data through the BS system.The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server.At present,D2D is one of the key technologies in 5G technology and has been studied in depth.D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput.However,repeated use of the spectrum and coexistence of cellular users can cause co-channel interference.Aiming at the interference problem under the constraint of fair resource allocation and improving the system throughput,this paper proposes an effective resource optimization scheme based on the firework method.The main idea is to expand the weighted sum rate and convert the allocated resource expression into fireworks to determine the correlation matrix.The simulation results show that,compared with the existing scheme,this scheme improves system performance by reducing interference. 展开更多
关键词 D2D communication 5G technology spectrum allocation
下载PDF
Industrial Automation Information Analogy for Smart Grid Security
5
作者 Muhammad Asif Ishfaq Ali +5 位作者 Shahbaz Ahmad azeem irshad Akber Abid Gardezi Fawaz Alassery Habib Hamam Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2022年第5期3985-3999,共15页
Industrial automation or assembly automation is a strictly monitored environment,in which changes occur at a good speed.There are many types of entities in the focusing environment,and the data generated by these devi... Industrial automation or assembly automation is a strictly monitored environment,in which changes occur at a good speed.There are many types of entities in the focusing environment,and the data generated by these devices is huge.In addition,because the robustness is achieved by sensing redundant data,the data becomes larger.The data generating device,whether it is a sensing device or a physical device,streams the data to a higher-level deception device for calculation,so that it can be driven and configured according to the updated conditions.With the emergence of the Industry 4.0 concept that includes a variety of automation technologies,various data is generated through numerous devices.Therefore,the data generated for industrial automation requires unique Information Architecture(IA).IA should be able to satisfy hard real-time constraints to spontaneously change the environment and the instantaneous configuration of all participants.To understand its applicability,we used an example smart grid analogy.The smart grid system needs an IA to fulfill the communication requirements to report the hard real-time changes in the power immediately following the system.In addition,in a smart grid system,it needs to report changes on either side of the system,i.e.,consumers and suppliers configure and reconfigure the system according to the changes.In this article,we propose an analogy of a physical phenomenon.A point charge is used as a data generating device,the streamline of electric flux is used as a data flow,and the charge distribution on a closed surface is used as a configuration.Finally,the intensity changes are used in the physical process,e.g.,the smart grid.This analogy is explained by metaphors,and the structural mapping framework is used for its theoretical proof.The proposed analogy provides a theoretical basis for the development of such information architectures that can represent data flows,definition changes(deterministic and non-deterministic),events,and instantaneous configuration definitions of entities in the system.The proposed analogy provides a mechanism to perform calculations during communication, using a simpleconcept on the closed surface to integrate two-layer cyber-physical systems(computation, communication, and physical process). The proposed analogyis a good candidate for implementation in smart grid security. 展开更多
关键词 Industry 4.0 information architecture industrial automation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部