-
81
An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things
Published 2019-11-01“…Internet of things (IoT) is a complex and massive wireless network, where millions of devices are connected together. …”
Get full text
Article -
82
Retracted: Internet of Things-Based Smart and Connected Supply Chain: A Review
Published 2023-01-01Get full text
Article -
83
Development of unmanned remote smart rescue platform applying Internet of Things technology
Published 2018-06-01“…A new form of network has been created with the communication between objects in the Internet of Things environment. Users began to take interests in outdoor activities such as sports and leisure activities while sharing photographs and videos each other. …”
Get full text
Article -
84
Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things
Published 2015-10-01“…As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. …”
Get full text
Article -
85
Recent advances on federated learning systems and the design for computing power Internet of things
Published 2024-12-01“…Computing power Internet of things (CPIoT) integrates Internet of things (IoT) devices with substantial computational resources to support data-intensive tasks, facilitating intelligent decision-making. …”
Get full text
Article -
86
Controlling Embedded Systems Remotely via Internet-of-Things Based on Emotional Recognition
Published 2020-01-01Get full text
Article -
87
The Impact of the Internet of Things (IoT) on Healthcare Delivery: A Systematic Literature Review
Published 2023-09-01Subjects: Get full text
Article -
88
Enhanced group communication in constrained application protocol–based Internet-of-things networks
Published 2018-04-01Get full text
Article -
89
V-BAG: A virtual bandwidth aggregation scheme for Internet of Things data
Published 2017-04-01“…In order to meet the two crucial requirements of Internet of Things (support of a large number of Internet of Things devices and low power consumption), this article proposes a novel and efficient virtual bandwidth aggregation scheme for Internet of Things data. …”
Get full text
Article -
90
Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things
Published 2016-01-01“…The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. …”
Get full text
Article -
91
Optimal downlink power allocation schemes for OFDM-NOMA-based Internet of things
Published 2022-01-01“…With the continuous development of fifth-generation technology, the number of mobile terminal Internet of Things devices has increased exponentially. …”
Get full text
Article -
92
Construction of Internet of things trusted group based on multidimensional attribute trust model
Published 2021-01-01“…Normal nodes in Internet of things tend to suffer collusion attacks from malicious nodes; thus, the accuracy of the trust measurement decreases. …”
Get full text
Article -
93
A computing allocation strategy for Internet of things’ resources based on edge computing
Published 2021-12-01“…Experiments show that when the number of Internet of Things’ devices is 30, the total energy consumption of Internet of Things’ devices of proposed algorithm is reduced by 24.67% and 19.44%, respectively, compared with other algorithms. …”
Get full text
Article -
94
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things
Published 2013-07-01“…Mobility is a common character of the emerging RFID-based internet-of-things. However, most of prior RFID anticollision algorithms ignore the movement of tags, which can degrade the identification performance seriously and even result in tag starvation problem. …”
Get full text
Article -
95
Retracted: Optimization of Water Microbial Concentration Monitoring System Based on Internet of Things
Published 2024-01-01Get full text
Article -
96
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. …”
Get full text
Article -
97
Adoption Internet of Things on Islamic Boarding School: A Systematic Literature Review
Published 2024-09-01“…Background: Internet of Things in Islamic boarding schools can become an embedded system that aims to expand the use of continuously connected internet connectivity. …”
Get full text
Article -
98
Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications
Published 2024-01-01“…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. In this study, the implementation and analyze the Elliptic Curve Digital Signature Algorithm (ECDSA) with NIST-256 on MicroBlaze processors based on RISC-V architecture. …”
Get full text
Article -
99
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01Subjects: “…Internet of things…”
Get full text
Article -
100
Classification Based on Pruning and Double Covered Rule Sets for the Internet of Things Applications
Published 2014-01-01“…The Internet of things (IOT) is a hot issue in recent years. …”
Get full text
Article