Zobrazeno 1 - 10
of 101
pro vyhledávání: '"Vasos Vassiliou"'
Autor:
Iacovos I. Ioannou, Marios Raspopoulos, Prabagarane Nagaradjane, Christophoros Christophorou, Waqar Ali Aziz, Vasos Vassiliou, Andreas Pitsillides
Publikováno v:
IEEE Access, Vol 12, Pp 81646-81681 (2024)
In the rapidly developing field of wireless communication, the control of beams in Reconfigurable Intelligent Surfaces (RISs) has emerged as a promising element beyond 5G wireless communication systems. Due to their distinctive reflecting elements, R
Externí odkaz:
https://doaj.org/article/8da4112120e74fd2860a4e73c33c05e5
Autor:
Iacovos I. Ioannou, Saher Javaid, Christophoros Christophorou, Vasos Vassiliou, Andreas Pitsillides, Yasuo Tan
Publikováno v:
IEEE Access, Vol 12, Pp 43350-43377 (2024)
Due to their minimal environmental impact, green energy sources like wind turbines and solar panels are increasingly utilized in power systems. However, the power they generate is highly variable, leading to unpredictable fluctuations in power supply
Externí odkaz:
https://doaj.org/article/4aef9ec8a57d4046a8f4390fc5a23ecb
Publikováno v:
Informatics in Medicine Unlocked, Vol 47, Iss , Pp 101471- (2024)
Pneumonia, a severe respiratory infection characterized by a significant morbidity and fatality rate, afflicts many individuals globally. The demand for highly effective antiviral medications has experienced a surge because of the emergence of novel
Externí odkaz:
https://doaj.org/article/e179022a69e94c7f8cf1bbd1275cc365
Autor:
Waqar Ali Aziz, Iacovos I. Ioannou, Marios Lestas, Hassaan Khaliq Qureshi, Adnan Iqbal, Vasos Vassiliou
Publikováno v:
IEEE Access, Vol 11, Pp 99716-99733 (2023)
Next-generation mobile networks, such as Fifth-Generation (5G), and Sixth-Generation (6G) are envisioned to undergo an unprecedented transformation from connected things to connected intelligence with more stringent characteristics, i.e., low end-to-
Externí odkaz:
https://doaj.org/article/9ec1ed9d76e94b1dac49e59f7860d8c6
Autor:
S. V. Jansi Rani, Iacovos I. Ioannou, Prabagarane Nagaradjane, Christophoros Christophorou, Vasos Vassiliou, Harshitaa Yarramsetti, Sai Shridhar, L. Mukund Balaji, Andreas Pitsillides
Publikováno v:
IEEE Access, Vol 11, Pp 95161-95194 (2023)
Intrusion Detection Systems (IDSs) have played a crucial role in identifying cyber threats for a very long time. Still, their significance has increased significantly with the advent of 5G/6G technologies, particularly Device-to-Device (D2D) communic
Externí odkaz:
https://doaj.org/article/4398cde656b44163a97f126aa29bf19a
Autor:
Iacovos I. Ioannou, Christophoros Christophorou, Vasos Vassiliou, Marios Lestas, Andreas Pitsillides
Publikováno v:
IEEE Access, Vol 10, Pp 62772-62799 (2022)
This paper focuses on D2D communication for 5G/6G in dynamic environments where the D2D network topology changes through time due to D2D Devices’ mobility. Specifically, we consider a scenario within the coverage area of a Base Station (BS) serving
Externí odkaz:
https://doaj.org/article/c5330616ce314e5f92cc68a6cffd723b
Publikováno v:
Telecom, Vol 3, Iss 1, Pp 17-51 (2022)
The operation of the Internet of Things (IoT) networks and Wireless Sensor Networks (WSN) is often disrupted by a number of problems, such as path disconnections, network segmentation, node faults, and security attacks. A method that gains momentum i
Externí odkaz:
https://doaj.org/article/a72eb6166ada4ccb9380ebd138abd5ff
Autor:
Christiana Ioannou, Vasos Vassiliou
Publikováno v:
IEEE Access, Vol 7, Pp 95844-95856 (2019)
The Internet of Things (IoT) provides the ability to extend the Internet into devices and everyday objects, in a way that they are uniquely addressable. Sensors, actuators, as well as everyday devices and objects, such as cellphones, cars, and homes,
Externí odkaz:
https://doaj.org/article/b3180c3b6cfd472d82b3c4c257365222
Publikováno v:
Sensors, Vol 21, Iss 19, p 6488 (2021)
The remarkable evolution of the IoT raised the need for an efficient way to update the device’s firmware. Recently, a new process was released summarizing the steps for firmware updates over the air (FUOTA) on top of the LoRaWAN protocol. The FUOTA
Externí odkaz:
https://doaj.org/article/3a5612f1c4f846b0b0437d8632f82a14
Autor:
Christiana Ioannou, Vasos Vassiliou
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 10, Iss 3, p 58 (2021)
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the network define what is expected of the network’s operation. It is for this reason that ML techniques are used in the computer network security field to d
Externí odkaz:
https://doaj.org/article/906fe675c4b94623b56d52be5a377ae2