Results 41 to 50 of about 35,554 (200)

Conceptualizing IIoT Platform Ecosystem Verticalization

open access: yes2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 2022
In this paper, a research gap at the interface of ecosystem theory, platforms and market segmentation strategies is addressed by conceptualizing the verticalization of Industrial Internet of Things (IIoT) platforms and their surrounding ecosystems.
Dietlmeier, Simon F   +3 more
openaire   +1 more source

Geological and geotechnical challenges on the Great Dyke of Zimbabwe and their impact on hardrock pillar design

open access: yesDeep Underground Science and Engineering, EarlyView.
The Great Dyke of Zimbabwe is notable for its rich platinum group metal deposits but poses significant geological and geotechnical challenges due to its complex rock types and structural features. Traditional pillar design methods are insufficient for addressing these complexities; the study suggests incorporating advanced techniques such as machine ...
Tawanda Zvarivadza   +3 more
wiley   +1 more source

Evaluation of Cognitive Architectures for Cyber-Physical Production Systems

open access: yes, 2019
Cyber-physical production systems (CPPS) integrate physical and computational resources due to increasingly available sensors and processing power. This enables the usage of data, to create additional benefit, such as condition monitoring or optimization.
Bartz-Beielstein, Thomas   +5 more
core   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Original scientific paper optimization of ventilation using IIOT methodology in Serbian coal mines [PDF]

open access: yesPodzemni Radovi
The application of information technologies in the optimization of ventilation contributes significantly to the improvement of all aspects of mine operations.
Ilić Aleksandra, Petrović Dejan
doaj   +1 more source

Isolating SDN Control Traffic with Layer-2 Slicing in 6TiSCH Industrial IoT Networks [PDF]

open access: yes, 2017
Recent standardization efforts in IEEE 802.15.4-2015 Time Scheduled Channel Hopping (TSCH) and the IETF 6TiSCH Working Group (WG), aim to provide deterministic communications and efficient allocation of resources across constrained Internet of Things ...
Baddeley, Michael   +5 more
core   +3 more sources

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Online non-intrusive load monitoring: A review

open access: yesEnergy Nexus
Significant progress has been achieved in managing energy consumption in the residential sector in recent years. However, the industrial sector requires better coverage due to its substantial challenges.
David Cruz-Rangel   +2 more
doaj   +1 more source

An Approach for Designing and Developing Microservices-enabled Manufacturing Operations Management in Greenfield Environments

open access: yesProceedings of the Conference on Production Systems and Logistics, 2022
Microservices are a special type of service-oriented architecture that promises flexibility through the encapsulation of functionality and lose coupling.
Oberle, Michael   +6 more
doaj   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy