Routing in Mobile Ad-Hoc Networks using Social Tie Strengths and Mobility Plans

Routing in Mobile Ad-Hoc Networks using Social Tie Strengths and Mobility Plans

ABSTRACT We consider the problem of routing in a mobile ad-hoc network (MANET) for which the planned mobilities of the nodes are partially known a priori and the nodes travel in groups. This situation arises commonly in military and emergency response scenarios. Optimal routes are computed using the most reliable path principle in which the […]

Using Semantic Similarity in Crawling-based Web Application Testing (IEEE 2017).

Using Semantic Similarity in Crawling-based Web Application Testing (IEEE 2017).

ABSTRACT: To automatically test web applications, crawlingbased techniques are usually adopted to mine the behavior models, explore the state spaces or detect the violated invariants of the applications. However, their broad use is limited by the required manual configurations for input value selection, GUI state comparison and clickable detection. In existing crawlers, the configurations are […]

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback (IEEE 2017).

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback (IEEE 2017).

ABSTRACT: Getting back to previously viewed web pages is a common yet uneasy task for users due to the large volume of personally accessed information on the web. This paper leverages human’s natural recall process of using episodic and semantic memory cues to facilitate recall, and presents a personal web revisitation technique called WebPagePrev through […]

Multiple Instance Learning for Behavioral Coding (IEEE 2017).

Multiple Instance Learning for Behavioral Coding (IEEE 2017).

ABSTRACT: We propose a computational methodology for automatically estimating human behavioral patterns using the multiple instance learning (MIL) paradigm. We describe the incremental diverse density algorithm, a particular formulation of multiple instance learning, and discuss its suitability for behavioral coding. We use a rich multi-modal corpus comprised of chronically distressed married couples having problem-solving discussions […]

Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases (IEEE 2017).

Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases (IEEE 2017).

ABSTRACT: In this paper we present an efficient method for visual descriptors retrieval based on compact hash codes computed using a multiple k-means assignment. The method has been applied to the problem of approximate nearest neighbor (ANN) search of local and global visual content descriptors, and it has been tested on different datasets: three large […]

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF Security (IEEE 2017).

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF Security (IEEE 2017).

ABSTRACT: The introduction of fast-response battery energy storage system (BESS) provides a number of advantages to address the new challenges of smart grids, including improving the reliability and security of the power grids. This paper proposes a real-time distributed control algorithm to the corrective security-constrained DC optimal power flow problem for transmission network. The objective […]

On the Security of a Class of Diffusion Mechanisms for Image Encryption Risk (IEEE 2017).

On the Security of a Class of Diffusion Mechanisms for Image Encryption Risk (IEEE 2017).

ABSTRACT: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required […]

Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures (IEEE 2017).

Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures (IEEE 2017).

ABSTRACT: In this paper, we propose new location privacy preserving schemes for database-driven cognitive radio networks (CRN s) that protect secondary users’ (SU s) location privacy while allowing them to learn spectrum availability in their vicinity. Our schemes harness probabilistic set membership data structures to exploit the structured nature of spectrum databases (DBs) and SU […]

Quality of Service for MANET based Smart cities

Quality of Service for MANET based Smart cities

ABSTRACT In the past decade’s digital revolution has caused major breakthroughs in integrated communication technologies field and has changed the way people work, communicate and live. Cities are moving from static infrastructure and buildings to dynamic smart ecosystems known as smart cities. Smart city refers to urban development in various domains of the city like […]

Low Power Wide Area Network Analysis: Can LoRa Scale

Low Power Wide Area Network Analysis: Can LoRa Scale

ABSTRACT Low Power Wide Area (LPWA) networks are making spectacular progress from design, standardisation, to commercialisation. At this time of fast-paced adoption, it is of utmost importance to analyse how well these technologies will scale as the number of devices connected to the Internet of Things (IoT) inevitably grows. In this letter, we provide a […]