Results 111 to 120 of about 1,666,651 (370)

Adaptive Terminal Sliding Mode Control for Hybrid Energy Storage Systems of Fuel Cell, Battery and Supercapacitor

open access: yesIEEE Access, 2019
In this paper, a terminal sliding mode control strategy with projection operator adaptive law is proposed in a hybrid energy storage system (HESS). The objective of the proposed control strategy is to provide power for load in time, get good tracking ...
Dezhi Xu   +3 more
doaj   +1 more source

Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method

open access: yesJournal of Computer Networks and Communications, 2023
Bank customer validation is carried out with the aim of providing a series of services to users of a bank and financial institutions. It is necessary to perform various analytical methods for user’s accounts due to the high volume of banking data.
Xiaorong Qiu   +4 more
doaj   +1 more source

Quantum Dots and Perovskites‐Based Physically Unclonable Functions for Binary and Ternary Keys via Optical‐to‐Electrical Conversion

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo   +6 more
wiley   +1 more source

Cognitive Radio Network With Energy-Harvesting Based on Primary and Secondary User Signals

open access: yesIEEE Access, 2018
Cognitive radio (CR) provides a radio-access method for unlicensed/secondary users to share the spectrum of licensed/primary users. To improve the energy efficiency of CR networks, we propose an energy-harvesting-aided spectrum sensing and data ...
Yuan Gao   +3 more
doaj   +1 more source

High-Fidelity Router Emulation Technologies Based on Multi-Scale Virtualization

open access: yesInformation, 2020
Virtualization has the advantages of strong scalability and high fidelity in host node emulation. It can effectively meet the requirements of network emulation, including large scale, high fidelity, and flexible construction.
He Song   +3 more
doaj   +1 more source

Cooperative optimisation strategy of computation offloading in multi‐UAVs‐assisted edge computing networks

open access: yesIET Communications, 2022
Mobile edge computing has been developed as a promising technology to extend diverse services to the edge of the Internet of Things system. Motivated by the high flexibility and controllability of unmanned aerial vehicles (UAVs), a multi‐UAVs‐assisted ...
Shanxin Zhang, Runyu Cao, Zefeng Jiang
doaj   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices [PDF]

open access: yes2018 IEEE Security and Privacy Workshops (SPW), 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Rohan Doshi   +2 more
semanticscholar   +1 more source

Printing Nacre‐Mimetic MXene‐Based E‐Textile Devices for Sensing and Breathing‐Pattern Recognition Using Machine Learning

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a Ti3C2Tx MXene/WPU nacre‐mimetic nanomaterial as a printable ink for direct‐write printing onto textiles‐based sensors. The resulting wearable device demonstrates high sensitivity, biocompatibility, and mechanical strength. Furthermore, NFC‐enabled humidity sensor produces time‐series data, which informs a machine learning ...
Lulu Xu   +6 more
wiley   +1 more source

A Survey on the Edge Computing for the Internet of Things

open access: yesIEEE Access, 2018
The Internet of Things (IoT) now permeates our daily lives, providing important measurement and collection tools to inform our every decision. Millions of sensors and devices are continuously producing data and exchanging important messages via complex ...
Wei Yu   +6 more
semanticscholar   +1 more source

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2018
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the ...
M. Al-garadi   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy