Results 91 to 100 of about 4,569 (223)

Resource design in constrained networks for network lifetime increase [PDF]

open access: yes, 2017
As constrained "things" become increasingly integrated with the Internet and accessible for interactive communication, energy efficient ways to collect, aggregate, and share data over such constrained networks are needed.
A. Martins, J.   +4 more
core   +1 more source

Investigation and analysis of demand response approaches, bottlenecks, and future potential capabilities for IoT‐enabled smart grid

open access: yesIET Renewable Power Generation, Volume 18, Issue 15, Page 3509-3535, 16 November 2024.
In this study, the framework and architecture of smart grids that are enabled by the IoT, are first examined. Then the role of IoT for DR in smart grids and different approaches adopted worldwide to make DR schemes more effective, have been discussed in detail.
Muhammad Adnan Khan   +5 more
wiley   +1 more source

Transport and Application Layer Protocols for IoT: Comprehensive Review

open access: yesTechnologies
The Internet of Things (IoT) connects billions of heterogeneous devices, necessitating lightweight, efficient, and secure communication protocols to support a diverse range of use cases.
Ionel Petrescu   +4 more
doaj   +1 more source

An Automatic Instrument Integration Scheme for Interoperable Ocean Observatories

open access: yesSensors, 2020
Due to the heterogeneity, high cost, and harsh environment, ocean observatories demand a flexible, robust, and capable scheme to integrate science instruments.
Shijun Lin, Feng Lyu, Huixin Nie
doaj   +1 more source

Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges

open access: yesIET Networks, Volume 13, Issue 5-6, Page 339-376, September-November 2024.
The authors offer a systematic meta‐analysis of AI applications in network intrusion detection systems (NIDS) with a specific focus on deep learning (DL) and machine learning (ML) techniques within the domain of network security. Through a comprehensive meta‐analysis and rigorous evaluation of the effectiveness, dataset utilisation, attack detection ...
Ziadoon K. Maseer   +4 more
wiley   +1 more source

Improving Service Management in the Internet of Things

open access: yesSensors, 2012
In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for ...
Antonio Iera, Chiara Sammarco
doaj   +1 more source

Interoperability in IoT through the semantic profiling of objects [PDF]

open access: yes, 2018
The emergence of smarter and broader people-oriented IoT applications and services requires interoperability at both data and knowledge levels.
Correia, Noélia   +2 more
core   +1 more source

Flexible Unicast-Based Group Communication for CoAP-Enabled Devices

open access: yesSensors, 2014
Smart embedded objects will become an important part of what is called the Internet of Things. Applications often require concurrent interactions with several of these objects and their resources.
Isam Ishaq   +5 more
doaj   +1 more source

Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services [PDF]

open access: yes, 2013
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication
Duquennoy, Simon   +6 more
core   +1 more source

Performance Evaluation of CoAP and MQTT_SN in an IoT Environment

open access: yesProceedings, 2019
The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things.
Mónica Martí   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy