Results 41 to 50 of about 8,077 (231)

Design Considerations for Low Power Internet Protocols

open access: yes, 2020
Over the past 10 years, low-power wireless networks have transitioned to supporting IPv6 connectivity through 6LoWPAN, a set of standards which specify how to aggressively compress IPv6 packets over low-power wireless links such as 802.15.4.
Ayers, Hudson   +5 more
core   +1 more source

Routing Attacs pada Internet Of Things Berbasis Smart Intrution Detecion System

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2020
Internet of Things (IoT) telah memasuki berbagai aspek kehidupan manusia, diantaranya smart city, smart home, smart street, dan smart industry yang memanfaatkan internet untuk memantau informasi yang dibutuhkan.
Eka Lailatus Sofa, Subiyanto Subiyanto
doaj   +1 more source

Evaluation of RPL’s Single Metric Objective Functions [PDF]

open access: yes, 2017
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa   +2 more
core   +1 more source

IETF standardization in the field of the Internet of Things (IoT): a survey [PDF]

open access: yes, 2013
Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols ...
Carels, David   +7 more
core   +2 more sources

MONICA in Hamburg: Towards Large-Scale IoT Deployments in a Smart City

open access: yes, 2018
Modern cities and metropolitan areas all over the world face new management challenges in the 21st century primarily due to increasing demands on living standards by the urban population.
Fischer, Michael   +4 more
core   +1 more source

Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication [PDF]

open access: yesJournal of Universal Computer Science
The importance of the topic under investigation stems from the burgeoning prominence of the Internet of Things (IoT) paradigm and the consequent imperative to devise and institute an efficacious methodology for neighbour detection that facilitates ...
Shanshan Jia   +2 more
doaj   +3 more sources

Design and Implementation of IPv6 and ZigBee Internet Gateway [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problem that ZigBee wireless sensor network and IPv6 network cannot be directly interconnected,an embedded internet gateway based on Contiki operating system and cc2530 hardware platform is proposed.The gateway architecture is innovatively ...
HE Xiangfu, FAN Zhihui, WANG Hui, ZHAI Zhibo, LI Jing
doaj   +1 more source

Queue‐Aware Congestion Avoidance in IoHT: Enabling Future Integration With Large Models for Transmission Optimization

open access: yesInternet Technology Letters, Volume 8, Issue 6, November/December 2025.
ABSTRACT The internet of healthcare things (IoHT) has advanced considerably, improving healthcare operations and patient monitoring by continuously collecting data from health sensors attached to patients. Current congestion detection techniques are insufficient for early detection since senders often remain unaware of the size of the residual queue ...
Muhammad Zafarullah   +5 more
wiley   +1 more source

Enhancing Cardiovascular Disease Analysis in Healthcare Systems With Hybrid Random Forest and Neural Network Algorithm

open access: yesEngineering Reports, Volume 7, Issue 9, September 2025.
Enhancing Cardiovascular Disease Analysis in Healthcare Systems ABSTRACT Cardiovascular diseases (CVDs) remain a critical challenge in healthcare, requiring advanced analytical solutions for improved diagnosis and risk management. This study proposes a hybrid machine learning framework combining Random Forest (RF) and Neural Network (NN) algorithms to ...
M. Chandraman   +10 more
wiley   +1 more source

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy