Loading [MathJax]/extensions/MathMenu.js
Kaihao Lou - IEEE Xplore Author Profile

Showing 1-7 of 7 results

Filter Results

Show

Results

Radio Access Network (RAN) slicing enables resource sharing among multiple tenants and is an essential feature for next-generation mobile networks. Usually, a centralized controller aggregates available resource pools from multiple tenants to increase spectrum availability. In dynamic resource allocation, a tenant could behave strategically by adjusting its preferences based on perceived condition...Show More
With the proliferation of smart mobile devices, there is now an ever increasing craving for higher bandwidth for end user satisfaction. Increasing mobile traffic leads to congestion of backhaul networks. One promising solution to this problem is the mobile edge network and consequently mobile edge caching. There is an emerging paradigm shift toward the use of unmanned aerial vehicles (UAVs) to ass...Show More
In the fifth-generation (5G) wireless networks, Edge-Internet-of-Things (EIoT) devices are envisioned to generate huge amounts of data. Due to the limitation of computation capacity and battery life of devices, all tasks cannot be processed by these devices. However, mobile-edge computing (MEC) is a very promising solution enabling offloading of tasks to nearby MEC servers to improve quality of se...Show More
The paper reports on the design, construction, and pilot implementation of an intelligent controller for Airconditioners (ACs), to conserve energy. The intelligent controller is named Airro. Airro employs a pyroelectric infrared (PIR) sensor and a microcontroller to detect occupancy and determine whether the controlled AC should be turned off or on. A mobile application has also been developed to ...Show More
Bitcoin ecosystem is supposed to be anonymous and untraceable. Nonetheless, Bitcoin offers weak anonymity in practice. The linkable pseudonymity of Bitcoin system raises privacy concerns for users. There are inputs and outputs of cryptocurrencies that link to Bitcoin public addresses. This is vulnerable to possible linkability and traceability of users’ identity, that can lead to information leaka...Show More
With the proliferation of wireless sensor networks, it has become expedient to secure the communication links between two sensor nodes. Due to the resource constraints of wireless sensor networks, traditional key management schemes such as the Diffie-Hellman and public key schemes are not applicable in wireless sensor networks. Our work seeks to improve on the pairwise scheme and the random pairwi...Show More
Energy consumption is a key design criterion for the routing protocols in wireless sensor networks (WSN). It is very important when designing a WSN to think of a routing protocol that makes the best use of the severely limited resources. Some of the conventional single path routing schemes may not be optimal to maximize the network lifetime and connectivity. This paper proposes a routing protocol ...Show More