Deng, Jing

uncg

There are 11 item/s.

TitleDateViewsBrief Description
Optimizing frequency domain contention in wireless network 2014 1529 Wireless communication became popular in the last decades, giving the mobility to the users. However with increased number of users and contention, network efficiency can hardly keep up with user needs. This thesis focuses on a new frequency domain c...
A method of determining culture related users using computation of correlation 2015 643 The provision of security on most of computer networks is based on the obtaining and exchange of a unique key between the communicating parties. It is, however, difficult to come up with a truly unique and random secret between two parties with the h...
Efficient link cuts in online social networks 2015 2123 Due to the huge popularity of online social networks, many researchers focus on adding links, e.g., link prediction to help friend recommendation. So far, no research has been performed on link cuts. However, the spread of malware and misinformation ...
Information distribution and recharging dispatch strategy in large wireless networks 2017 266 Large wireless networks are envisioned to play increasingly important roles as more and more mobile wireless devices and Internet of Things (IoT) devices are put in use. In these networks, it is often the case that some critical information needs to ...
A Distributed Public Key Caching Scheme in Large Wireless Networks. 2010 2643 When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However, the existence of a single CA in large wireless networks such as mob...
Multiple Bridge Secret Delivery in Wireless Sensor Networks 2010 2068 Achieving security in wireless sensor networks is a challenging problem due to the inherent resource and computing constraints. Several key distribution techniques have been proposed in the technical literature for efficient distribution of keys to t...
Ant-based evidence distribution with periodic broadcast in attacked wireless network 2011 5322 In order to establish trust among nodes in large wireless networks, the trust certicates need to be distributed and be readily accessible. However, even so, searching for trust certicates will still become highly cost and delay especially when wirele...
Sentiment analysis and review ranking using Naïve Bayes with weights in online social networks 2019 592 Online reviews are critical in many aspects, for business as well as customers. Yet the accuracy and trustworthiness of these reviews are usually unsubstantiated and little research has been performed to investigate them. For the 2016 US Presidential...
Improving federated learning in heterogeneous wireless networks 2022 197 The next era of privacy preserving machine learning is built upon the basic principle centered around data privacy. Due to data privacy being the primary concern among data owners, there is an increasing interest in a fast-growing machine learning te...
Estimating sentiment in social media : a case study of the migrant caravans news on Twitter 2021 987 Social media has empowered us to gain immense knowledge, criticism, and positivity from every corner of the world. Accessing social network sites like Twitter and Facebook has slowly become the norm, as people are now inclined towards social media fo...
Enhancing federated learning efficiency through dynamic model adaptation and optimization 2024 8 Federated learning (FL) in cloud computing has emerged as a groundbreaking paradigm, revolutionizing data processing and machine learning through decentralized and scalable systems. However, the integration of these technologies faces challenges in c...