Results 31 to 40 of about 548,723 (329)
Overview of Trusted Authentication and Incentive Mechanisms in Blockchain-Based Internet of Vehicles [PDF]
With the increasing demand for data sharing in the Internet of vehicles, reliable identity authentication protocols and scientifically rational incentive mechanisms have become the primary conditions for ensuring the stable operation of the Internet of ...
GAO Chunqi, LI Leixiao, SHI Jianping
doaj +1 more source
Multiple Internet of Robotic Things robots based on LiDAR and camera sensors
A combination of Internet of Things and multiple robots with sensors has been an attractive research topic over the past years. This article proposes an Internet of Robotic Things system structure to monitor events, fuse sensor data, use local robots to ...
Yanyan Dai, Suk Gyu Lee
doaj +1 more source
Resource-constrained classification using a cascade of neural network layers [PDF]
Deep neural networks are the state of the art technique for a wide variety of classification problems. Although deeper networks are able to make more accurate classifications, the value brought by an additional hidden layer diminishes rapidly.
Bohez, Steven +5 more
core +1 more source
A novel middleware for the mobility management over the Internet [PDF]
The features of mobility, which enormously impact on how communication is evolving into the future, represent a particular challenge in today’s wireless networking research. After an identification and evaluation of the gap between the discontinuities of
Diaz, Michel +3 more
core +2 more sources
Decentralized internet infrastructure
Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between ...
Bingyang LIU +6 more
doaj +2 more sources
The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security ...
Hanshu Hong, Bing Hu, Zhixin Sun
doaj +1 more source
A Survey on Handover Management in Mobility Architectures
This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on ...
Ferretti, Stefano +2 more
core +1 more source
Exploring lipid diversity and minimalism to define membrane requirements for synthetic cells
Designing the lipid membrane of synthetic cells is a complex task, in which its various roles (among them solute transport, membrane protein support, and self‐replication) should all be integrated. In this review, we report the latest top‐down and bottom‐up advances and discuss compatibility and complexity issues of current engineering approaches ...
Sergiy Gan +2 more
wiley +1 more source
Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network
The Internet of Things enabled Wireless Sensor Networks (IoT-enabled WSNs) are highly susceptible to a wide range of Distributed Denial of Service (DDoS) attacks.
Kavita S. Kumavat, Joanne Gomes
doaj +1 more source
Decrypting cancer's spatial code: from single cells to tissue niches
Spatial transcriptomics maps gene activity across tissues, offering powerful insights into how cancer cells are organised, switch states and interact with their surroundings. This review outlines emerging computational, artificial intelligence (AI) and geospatial approaches to define cell states, uncover tumour niches and integrate spatial data with ...
Cenk Celik +4 more
wiley +1 more source

