Jonathan Loo
YOU?
Author Swipe
View article: Guided Acquisition of High-Quality Echocardiogram Using Deep Neural Networks
Guided Acquisition of High-Quality Echocardiogram Using Deep Neural Networks Open
Objective: The quality of echocardiographic image acquisition is vital for precise quantifications and diagnostic accuracy. However, ultrasound equipment is limited in performance throughput and image quality. It is also governed by the op…
View article: A GenAI Competence Framework for Engineering Curriculum Enhancement in Higher Education
A GenAI Competence Framework for Engineering Curriculum Enhancement in Higher Education Open
This paper proposes a Generative Artificial Intelligence (GenAI) Competence Framework for Engineering Curriculum Enhancement, designed to leverage GenAI’s potential to enrich teaching and learning, address challenges arising from misuse or…
View article: Joint Task Offloading and Channel Allocation in Spatial-Temporal Dynamic for MEC Networks
Joint Task Offloading and Channel Allocation in Spatial-Temporal Dynamic for MEC Networks Open
Computation offloading and resource allocation are critical in mobile edge computing (MEC) systems to handle the massive and complex requirements of applications restricted by limited resources. In a multi-user multi-server MEC network, th…
View article: "What's Happening"- A Human-centered Multimodal Interpreter Explaining the Actions of Autonomous Vehicles
"What's Happening"- A Human-centered Multimodal Interpreter Explaining the Actions of Autonomous Vehicles Open
Public distrust of self-driving cars is growing. Studies emphasize the need for interpreting the behavior of these vehicles to passengers to promote trust in autonomous systems. Interpreters can enhance trust by improving transparency and …
View article: SenseRAG: Constructing Environmental Knowledge Bases with Proactive Querying for LLM-Based Autonomous Driving
SenseRAG: Constructing Environmental Knowledge Bases with Proactive Querying for LLM-Based Autonomous Driving Open
This study addresses the critical need for enhanced situational awareness in autonomous driving (AD) by leveraging the contextual reasoning capabilities of large language models (LLMs). Unlike traditional perception systems that rely on ri…
View article: London street crime analysis and prediction using crowdsourced dataset
London street crime analysis and prediction using crowdsourced dataset Open
To effectively prevent crimes, it's vital to anticipate their patterns and likely occurrences. Our efforts focused on analyzing diverse open-source datasets related to London, such as the Met police records, public social media posts, data…
View article: Hierarchical, Attribute and Hash-Based Naming and Forwarding Aided Smart Campus of Things
Hierarchical, Attribute and Hash-Based Naming and Forwarding Aided Smart Campus of Things Open
In order to provide universal ability to access information and communication among Internet-connected devices, the Sustainable Internet of Things (IoT) is on a mission to bring all objects or devices under one roof. Future Internet archit…
View article: Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain Open
The development of cryptographic protocols goes through two stages, namely, security verification and performance analysis. The verification of the protocol's security properties could be analytically achieved using threat modelling, or fo…
View article: Joint Computing Offloading and Resource Allocation for Classification Intelligent Tasks in MEC Systems
Joint Computing Offloading and Resource Allocation for Classification Intelligent Tasks in MEC Systems Open
Mobile edge computing (MEC) enables low-latency and high-bandwidth applications by bringing computation and data storage closer to end-users. Intelligent computing is an important application of MEC, where computing resources are used to s…
View article: Dynamic Multi-Time Scale User Admission and Resource Allocation for Semantic Extraction in MEC Systems
Dynamic Multi-Time Scale User Admission and Resource Allocation for Semantic Extraction in MEC Systems Open
This paper investigates the semantic extraction task-oriented dynamic\nmulti-time scale user admission and resourceallocation in mobile edge computing\n(MEC) systems. Amid prevalence artifi cial intelligence applications in various\nindust…
View article: Distributed Acoustic Sensor Systems for Vehicle Detection and Classification
Distributed Acoustic Sensor Systems for Vehicle Detection and Classification Open
Intelligent transport systems (ITS) are pivotal in the development of sustainable and green urban living. ITS is data-driven and enabled by the profusion of sensors ranging from pneumatic tubes to smart cameras which are used to detect and…
View article: Novel multi-objective optimisation for maintenance activities of floating production storage and offloading facilities
Novel multi-objective optimisation for maintenance activities of floating production storage and offloading facilities Open
An investigation of the recent advancements in modelling and optimisation techniques to develop maintenance strategies for offshore floating systems have been carried out in this paper and identified that the impact of time required to car…
View article: An Introduction of a Modular Framework for Securing 5G Networks and Beyond
An Introduction of a Modular Framework for Securing 5G Networks and Beyond Open
Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This wi…
View article: Recent advances and future trends on maintenance strategies and optimisation solution techniques for offshore sector
Recent advances and future trends on maintenance strategies and optimisation solution techniques for offshore sector Open
Maintenance planning program of offshore assets is a complex activity due to its impact on the operational and safety risks and consequences, dependence on personnel resource availabilities, site constraints due to operational requirements…
View article: DCSS Protocol for Data Caching and Sharing Security in a 5G Network
DCSS Protocol for Data Caching and Sharing Security in a 5G Network Open
Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equi…
View article: Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif
Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif Open
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed…
View article: A survey on blockchain‐enabled smart grids: Advances, applications and challenges
A survey on blockchain‐enabled smart grids: Advances, applications and challenges Open
Electric power grid infrastructure has revolutionized our world and changed the way of living. So has blockchain technology. The hierarchical electric power grid has been shifting from a centralized structure to a decentralized structure t…
View article: Network Representation Learning Enhanced by Partial Community Information That Is Found Using Game Theory
Network Representation Learning Enhanced by Partial Community Information That Is Found Using Game Theory Open
Presently, data that are collected from real systems and organized as information networks are universal. Mining hidden information from these data is generally helpful to understand and benefit the corresponding systems. The challenges of…
View article: Efficient Resource Allocation Using Distributed Edge Computing in D2D Based 5G-HCN With Network Slicing
Efficient Resource Allocation Using Distributed Edge Computing in D2D Based 5G-HCN With Network Slicing Open
Fifth Generation (5G) cellular networks aim to overcome the pressing demands posed by dynamic Quality of Service (QoS) constraints, which have primarily remained unaddressed using conventional network infrastructure. Cellular networks of t…
View article: Proactive Edge Caching in Content-Centric Networks With Massive Dynamic Content Requests
Proactive Edge Caching in Content-Centric Networks With Massive Dynamic Content Requests Open
Edge computing is a promising infrastructure evolution to reduce traffic loads and support low-latency communications. Furthermore, content-centric networks provide a natural solution to cache contents at edge nodes. However, it is a chall…
View article: Chipless RFID Tag for Touch Event Sensing and Localization
Chipless RFID Tag for Touch Event Sensing and Localization Open
A novel Radio Frequency Identification (RFID) based sensor supporting touch detection and localization features is proposed in this work. The formulated sensor leverages chipless variant of RFID technology for the design of a passive fully…
View article: Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT
Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT Open
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system is\na prominent concept, where a UAV equipped with a MEC server is deployed to\nserve a number of terminal devices (TDs) of Internet of Things (IoT) in a\nfinite per…
View article: Texture Representation Through Overlapped Multi-Oriented Tri-Scale Local Binary Pattern
Texture Representation Through Overlapped Multi-Oriented Tri-Scale Local Binary Pattern Open
This paper ideates a novel texture descriptor that retains its classification accuracy under varying conditions of image orientation, scale, and illumination. The proposed Overlapped Multi-oriented Tri-scale Local Binary Pattern (OMTLBP) t…
View article: Buffer-Aided Successive Relay Selection Scheme for Energy Harvesting IoT Networks
Buffer-Aided Successive Relay Selection Scheme for Energy Harvesting IoT Networks Open
In this paper, we analyze the impact of buffer-aided full-duplex successive relay selection schemes with energy harvesting capability of relay nodes in amplifying and forward (AF) and decode and forward (DF) relaying environments for the I…
View article: Proactive Caching Placement for Arbitrary Topology With Multi-Hop Forwarding in ICN
Proactive Caching Placement for Arbitrary Topology With Multi-Hop Forwarding in ICN Open
With the rapid growth of network traffic and the enhancement of the quality of experiences of users, Information-Centric Networking (ICN), which is a content-centric network architecture with named data caching and routing, is proposed to …