<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://hdl.handle.net/10386/2796">
<title>Computer Science</title>
<link>http://hdl.handle.net/10386/2796</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://hdl.handle.net/10386/4255"/>
<rdf:li rdf:resource="http://hdl.handle.net/10386/3087"/>
<rdf:li rdf:resource="http://hdl.handle.net/10386/2966"/>
</rdf:Seq>
</items>
<dc:date>2026-04-12T15:03:47Z</dc:date>
</channel>
<item rdf:about="http://hdl.handle.net/10386/4255">
<title>A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network</title>
<link>http://hdl.handle.net/10386/4255</link>
<description>A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network
Foko Sindjoung, Miguel Landry; Velempini, Mthulisi; Djamegni, Clémentin Tayou
Cloud computing has widely been used for applications that require huge computational and data storage&#13;
resources. Unfortunately, with the advent of new technologies such as fifth generation of cellular networks&#13;
that provide new applications like IoT, cloud computing presents many limits among which the End-To-End&#13;
(E2E) latency is the main challenge. These applications generally degrade scenarios that require low latency.&#13;
Mobile Edge Computing (MEC) has been proposed to solve this issue. MEC brings computing and storage&#13;
resources from cloud data center to edge data center, closer to end-user equipment to reduce the E2E latency&#13;
for request processing. However, MEC is vulnerable to security, data privacy, and authentication that affect&#13;
the end-user Quality of Experience (QoE). It is therefore fundamental that these challenges are addressed to&#13;
avoid poor user experience due to the lack of security or data privacy. In this paper, we propose a hybrid&#13;
cryptographic system that uses the symmetric and asymmetric cryptographic systems, to improve data security,&#13;
privacy, and user authentication in a MEC-based network. We show that our proposed scheme is secured by&#13;
validating it with the Automated Validation of Internet Security Protocol and Application tool. Simulation&#13;
results show that our solution consumes less computing resources.
Journal article published in the journal of Array 19 (2023) 100304
</description>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10386/3087">
<title>Unsteady MHD Flow of Non-Newtonian Fluid in a Channel Filled with a Saturated Porous Medium with Asymmetric Navier Slip and Convective Heating</title>
<link>http://hdl.handle.net/10386/3087</link>
<description>Unsteady MHD Flow of Non-Newtonian Fluid in a Channel Filled with a Saturated Porous Medium with Asymmetric Navier Slip and Convective Heating
Rundora, L; Makinde, O. D
This paper aims to computationally study the effects of Navier slip on an unsteady hydromagnetic ﬂow of a pressure driven, reactive, variable viscosity, electrically conducting third-grade ﬂuid through a porous saturated medium with asymmetrical convective boundary conditions. It is assumed that the chemical kinetics in the ﬂow system is exothermic and that the asymmetric convective heat exchange with the surrounding medium at the surfaces follows Newtons law of cooling. The coupled nonlinear partial differential equations governing the ﬂow and heat transfer are derived and solved numerically using a semi-implicit ﬁnite difference scheme. The ﬂow and heat transfer characteristics are analyzed graphically and discussed for different values of the parameters embedded in the system. It is observed that the lower wall slip parameter increases the ﬂuid velocity proﬁles. The upper wall slip parameter is seen to retard the velocity proﬁles while it increases the ﬂuid temperature proﬁles. The wall slip parameters increase the skin friction and the Nusselt number. The wall slip parameters as well as the variable viscosity parameter, the viscous heating parameter and the numerical exponent m reduce the thermal criticality values of the reaction parameter.
Article published in the Applied Mathematics &amp; Information Sciences
</description>
<dc:date>2018-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/10386/2966">
<title>The Design and Implementation of the XWCETT Routing Algorithm in Cognitive Radio Based Wireless Mesh Networks</title>
<link>http://hdl.handle.net/10386/2966</link>
<description>The Design and Implementation of the XWCETT Routing Algorithm in Cognitive Radio Based Wireless Mesh Networks
Velempini, M.; Kola, L. M.
The Wireless Mesh Networks (WMNs) technology has recently emerged as a promising high-speed broadband communication. In a multi hop ad hoc cognitive radio network(CRN)environment, the performance of the network is degraded by the routing protocols, which are adapted from the traditional wireless networks. In an endeavor to optimize the performance of the CRNs, existing routing protocols can be adapted and optimized. Secondly, new dynamic routing protocols can be designed to meet the requirements of CRNs. This paper investigates the existing routing protocols in WMNs and proposes a new routing protocol called extended Weighted Cumulative Expected Transmission Time(xWCETT). .The xWCETT routing protocol was evaluated through network simulations using the NS2.Its performance was evaluated with respect to the end-to-end average latency, and the normalized routing load. The comparative evaluation results show that the xWCETT achieves superior results in terms of average throughput, latency, and the normalized routing load.
Article published in the Hindawi Wireless Communications and Mobile Computing Volume 2018
</description>
<dc:date>2018-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
