Results 31 to 40 of about 3,585 (231)

Contiki İşletim Sisteminde Cooja Simulatörü Kullanılarak Örnek Bir Nesnelerin İnterneti Uygulaması

open access: gold, 2020
Low-resource sensor nodes, which are used in many areas today, are a very important part of the internet of things. Especially the use of wireless sensor networks in many sectors such as industry, medicine, establishment of smart production facilities, remote monitoring of patients caused many important developments. Testing these devices in a physical
İbrahim Karataş, Selim Bayraklı
semanticscholar   +4 more sources

Performance analysis of topologies and ratios with machine learning using Cooja simulator [PDF]

open access: hybridDiscover Networks
A. Anu Prithiga   +5 more
openalex   +2 more sources

Priority-based Routing Framework for VANETs [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2021
Vehicular ad hoc Network (VANET) is a collection of vehicles and associated roadside infrastructure which provide mobilewireless communication services.
Emad Felemban, Atif Naseer, Adil Amjad
doaj   +1 more source

AI Routing Energy Optimization Framework for Adaptive WSN by Using Contiki-Cooja [PDF]

open access: green
Abstract This research study introduces AI routing, a symbolic AI-based multi-criteria routing protocol designed for energy optimization in wireless sensor networks (WSNs). AI routing, executed in Contiki-Cooja 2.7 with Sky motes and a mobile sink, has a streamlined fuzzy inference technique that calculates a next-hop score based on residual ...
Binita Kumari, Santosh Soni
openalex   +2 more sources

A Comparative Analysis for Congestion Mechanism in COAP and COCOA [PDF]

open access: yesEngineering and Technology Journal, 2018
Internet of things (IoT) is the paradigm for internetworking devices for data exchange and control. One of the important problems facing the IoT networks is the congestion; many researchers have discussed this problem.
Hamid Hasan, Ahmed Ahmed
doaj   +1 more source

Design and Implementation of an Antenna Model for the Cooja simulator [PDF]

open access: green, 2015
accepted for publication in International Conference on Electronics and Communication Systems (ICECS ...
Vishwesh Rege
openalex   +3 more sources

Scalable Emulated Framework for IoT Devices in Smart Logistics Based Cyber-Physical Systems: Bonded Coverage and Connectivity Analysis

open access: yesIEEE Access, 2020
In this research, scalable framework for Smart Logistics based Cyber-Physical System (SLCPS) is emulated for stable coverage and connectivity of Internet of Things (IoT) devices. This work is modern manifestation of three laws of computing.
Arbab Waseem Abbas   +1 more
doaj   +1 more source

Energy harvesting effect on prolonging low-power lossy networks lifespan

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Low-power lossy networks performance relies heavily on the wireless node battery status. Furthermore, Routing Protocol for Low-Power and Lossy Network routing protocol was not optimally designed with sustainable energy consumption in mind to suit these ...
Mohamed Hadi Habaebi   +6 more
doaj   +1 more source

IGWO-SoE: Improved Grey Wolf Optimization Based Stack of Ensemble Learning Algorithm for Anomaly Detection in Internet of Things Edge Computing

open access: yesIEEE Access, 2023
With the tremendous growth and popularization of the Internet of Things (IoT), the number of attacks targeting such devices has also increased. Therefore, enhancing the anomaly detection model to maximize detection accuracy and mitigate cyber-attacks in ...
J. Manokaran, G. Vairavel
doaj   +1 more source

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 216-234, December 2023., 2023
A mechanism to effectively handle sinkhole attacks in smart homes is presented, addressing existing IDS systems' shortcomings. A formulation for assigning weights to network nodes based on their resources is proposed and an IDS placement strategy to place IDS agents on particular resourceful nodes that extend network lifetime and enhance attack ...
Md. Shafiqul Islam   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy