Results 71 to 80 of about 4,597 (215)
An information interaction method for smart mine
In view of 'information island' problem which is common in coal mines, a smart mine information interaction method based on resource model and constrained application protocol (CoAP) was proposed from practical point of view.
HU Wentao +3 more
doaj +1 more source
Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet +4 more
core +1 more source
Effective resource allocation is a fundamental challenge for software systems in Internet of Things (IoT) networks, influencing their performance, energy consumption, and scalability in dynamic environments. This study introduces a new framework, DRANet–graph convolutional network (GCN)+, which integrates GCNs, transformer architectures, and ...
Kiran Rao P. +7 more
wiley +1 more source
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise.
Algimantas Venčkauskas +5 more
doaj +1 more source
An Architecture and Realisation of a Smart City Digital Twin With eHealth Case Studies
This paper presents a simplified layered architecture for smart city digital twins, encompassing essential operations such as data transfer, synthesis, big data streaming and analytics. It also introduces a realisation of the proposed architecture using an open‐source software tool designed with independent Python modules for easy integration and ...
Nandana Jayachandran +3 more
wiley +1 more source
Win CoAP: A Window-Based Congestion Control Approach for Burst Traffic in IoT Networks
Constrained Application Protocol (CoAP) is a widely used communication protocol in Internet of Things (IoT) networks. Congestion is a major concern in IoT networks because it affects the performance of applications and network reliability.
Archana K. Rajan, Masaki Bandai
doaj +1 more source
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi +4 more
doaj
A role-based software architecture to support mobile service computing in IoT scenarios [PDF]
The interaction among components of an IoT-based system usually requires using low latency or real time for message delivery, depending on the application needs and the quality of the communication links among the components.
Eggly, Gabriel +5 more
core +3 more sources
Requirements Evaluation Framework for a Phase‐Driven AIoT Architecture for Remote Patient Monitoring
This research is significant because it addresses a critical gap in the management of chronic diseases, particularly for elderly populations. Chronic conditions often require frequent medical visits, which can be challenging. The study introduces an innovative architecture using Artificial Intelligence (AI) and Internet of Things (IoT) technologies to ...
Sajid Shah +6 more
wiley +1 more source
Minimizing IoT Energy Consumption Using BLE and Metaprotocol Architecture
The Internet of Things is a very fast‐growing industry thanks to the increasing availability of cheap microcontrollers, which are its main component. However, the commonly used cloud technologies are not best suited for resource‐constrained devices, so energy optimization is needed to extend their battery life.
L. Milić +3 more
wiley +1 more source

