Average Peak Age-of-Information Minimization in UAV-Assisted IoT Networks
نویسندگان
چکیده
منابع مشابه
UAV Offloading: Spectrum Trading Contract Design for UAV Assisted Offloading in Cellular Networks
Unmanned Aerial Vehicle (UAV) has been recognized as a promising way to assist future wireless communications due to its high flexibility of deployment and scheduling. In this paper, we focus on temporarily deployed UAVs that provide downlink data offloading in some regions under a macro base station (MBS). Since the manager of the MBS and the operators of the UAVs could be of different interes...
متن کاملAverage Age of the Classic PKU Detection in Iran
SUMMARY Early detection and prompt diet therapy is essential for normal mental development of the phenylketonurics. In spite of the congenital metabolic defect, patients affected with classic PKU appear normal at birth and will develop serious mental retardation if untreated and cause much emotional, social and financial burdens on their families and the society. For these reasons, in develope...
متن کاملUAV-assisted Cooperative Communications with Wireless Information and Power Transfer
In this paper, we focus on a typical cooperative communication system with one pair of source and destination, where a unmanned aerial vehicle (UAV) flying from a start location to an end location serves as a mobile relay. To efficiently utilize energy in ambient environment, the UAV’s transmission capability is powered exclusively by radio signal transmitted from the source via the power-split...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملFixing the average internet user’s IoT Vulnerabilities
For the last couple of years, the Internet of Things (IoT) has grown rapidly. Often, the objects connected to the IoT contain security vulnerabilities, which can be exploited to perform Distributed Denial of Service (DDoS) attacks. The problem is that most of these devices are owned by non-technical skilled users which do not know their devices are comprised and, if known, do not know how to ac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Vehicular Technology
سال: 2019
ISSN: 0018-9545,1939-9359
DOI: 10.1109/tvt.2018.2885871