13 results

KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data

Journal Article
Zhu, R., Ji, X., Yu, D., Tan, Z., Zhao, L., Li, J., & Xia, X. (2020)
KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data. IEEE Access, 8, 42749-42759. https://doi.org/10.1109/access.2020.2977114
KNN-Based outlier detection over IoT streaming data is a fundamental problem, which has many applications. However, due to its computational complexity, existing efforts canno...

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network

Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019)
Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), https://doi.org/10.3390/s19224930
The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink...

A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles

Journal Article
Yao, W., Yahya, A., Khan, F., Tan, Z., Rehman, A. U., Chuma, J. M., …Babar, M. (2019)
A Secured and Efficient Communication Scheme for Decentralized Cognitive Radio-Based Internet of Vehicles. IEEE Access, 7, 160889-160900. https://doi.org/10.1109/ACCESS.2019.2945610
The advancements in hardware technologies have driven the evolution of vehicular ad hoc networks into the Internet of Vehicles (IoV). The IoV is a decentralized network of IoT...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...

Vehicular Computation Offloading for Industrial Mobile Edge Computing

Journal Article
Zhao, L., Yang, K., Tan, Z., Song, H., Al-Dubai, A., & Zomaya, A. (2021)
Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Transactions on Industrial Informatics, 17(11), 7871-7881. https://doi.org/10.1109/TII.2021.3059640
Due to the limited local computation resource, industrial vehicular computation requires offloading the computation tasks with time-delay sensitive and complex demands to othe...

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...

Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop

Journal Article
Babar, M., Arif, F., Jan, M. A., Tan, Z., & Khan, F. (2019)
Urban data management system: Towards Big Data analytics for Internet of Things based smart urban environment using customized Hadoop. Future Generation Computer Systems, 96, 398-409. https://doi.org/10.1016/j.future.2019.02.035
The unbroken amplfi cation of a versatile urban setup is challenged by huge Big Data processing. Understanding the voluminous data generated in a smart urban environment for d...

Decrypting Live SSH Traffic in Virtual Environments

Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...

A VMD and LSTM based hybrid model of load forecasting for power grid security

Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (2022)
A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474-6482. https://doi.org/10.1109/tii.2021.3130237
As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy...

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait

Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018)
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4
The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the tradi...