Search

Showing total 32 results
32 results

Search Results

1. Deep Learning System for User Identification Using Sensors on Doorknobs.

2. A Novel Design for Joint Collaborative NOMA Transmission with a Two–Hop Multi–Path UE Aggregation Mechanism.

3. An Enhanced Active Access-Point Configuration Algorithm Using the Throughput Request Satisfaction Method for an Energy-Efficient Wireless Local-Area Network.

4. Survey on Multi-Objective Task Allocation Algorithms for IoT Networks.

5. A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection.

6. Improved Secure Encryption with Energy Optimization Using Random Permutation Pseudo Algorithm Based on Internet of Thing in Wireless Sensor Networks.

7. Squeeze-MNet: Precise Skin Cancer Detection Model for Low Computing IoT Devices Using Transfer Learning.

8. Fault Diagnosis Algorithm of Transformer and Circuit Breaker in Traction Power Supply System Based on IoT †.

9. Investigation of Energy Cost of Data Compression Algorithms in WSN for IoT Applications.

10. Development of a Model for Spoofing Attacks in Internet of Things.

11. NetDAO: Toward Trustful and Secure IoT Networks without Central Gateways.

12. Re-Learning EXP3 Multi-Armed Bandit Algorithm for Enhancing the Massive IoT-LoRaWAN Network Performance.

13. The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities.

14. Model of a Device-Level Combined Wireless Network Based on NB-IoT and IEEE 802.15.4 Standards for Low-Power Applications in a Diverse IoT Framework.

15. IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model.

16. Energy Efficient SWIPT Based Mobile Edge Computing Framework for WSN-Assisted IoT.

17. Computing Resource Allocation Scheme for DAG-Based IOTA Nodes.

18. Towards 6G IoT: Tracing Mobile Sensor Nodes with Deep Learning Clustering in UAV Networks.

19. SDN-Based Network Slicing Mechanism for a Scalable 4G/5G Core Network: A Kubernetes Approach †.

20. A Practical Privacy-Preserving Publishing Mechanism Based on Personalized k-Anonymity and Temporal Differential Privacy for Wearable IoT Applications.

21. Horizontal Review on Video Surveillance for Smart Cities: Edge Devices, Applications, Datasets, and Future Trends.

22. Distributed Algorithm for Base Station Assignment in 4G/5G Machine-Type Communication Scenarios with Backhaul Limited Conditions.

23. Performance Analysis of IoT-Based Health and Environment WSN Deployment.

24. MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.

25. A New Stability Criterion for IoT Systems in Smart Buildings: Temperature Case Study.

26. An Edge Based Multi-Agent Auto Communication Method for Traffic Light Control.

27. A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments.

28. JLVEA: Lightweight Real-Time Video Stream Encryption Algorithm for Internet of Things.

29. Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems.

30. An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.

31. Simulation Tool for the Analysis of Cooperative Localization Algorithms for Wireless Sensor Networks.

32. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices.