Results 111 to 120 of about 1,666,651 (370)
In this paper, a terminal sliding mode control strategy with projection operator adaptive law is proposed in a hybrid energy storage system (HESS). The objective of the proposed control strategy is to provide power for load in time, get good tracking ...
Dezhi Xu+3 more
doaj +1 more source
Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method
Bank customer validation is carried out with the aim of providing a series of services to users of a bank and financial institutions. It is necessary to perform various analytical methods for user’s accounts due to the high volume of banking data.
Xiaorong Qiu+4 more
doaj +1 more source
This study investigates optoelectronic PUFs that improve on traditional optical and electrical PUFs. The absorber materials are randomly coated through spray coating, ligand exchange, and dynamic spin coating. Incident light generates wavelength‐dependent binary multikey and enhances security ternary keys, approaching near‐ideal inter‐ and intra ...
Hanseok Seo+6 more
wiley +1 more source
Cognitive Radio Network With Energy-Harvesting Based on Primary and Secondary User Signals
Cognitive radio (CR) provides a radio-access method for unlicensed/secondary users to share the spectrum of licensed/primary users. To improve the energy efficiency of CR networks, we propose an energy-harvesting-aided spectrum sensing and data ...
Yuan Gao+3 more
doaj +1 more source
High-Fidelity Router Emulation Technologies Based on Multi-Scale Virtualization
Virtualization has the advantages of strong scalability and high fidelity in host node emulation. It can effectively meet the requirements of network emulation, including large scale, high fidelity, and flexible construction.
He Song+3 more
doaj +1 more source
Mobile edge computing has been developed as a promising technology to extend diverse services to the edge of the Internet of Things system. Motivated by the high flexibility and controllability of unmanned aerial vehicles (UAVs), a multi‐UAVs‐assisted ...
Shanxin Zhang, Runyu Cao, Zefeng Jiang
doaj +1 more source
Machine Learning DDoS Detection for Consumer Internet of Things Devices [PDF]
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Rohan Doshi+2 more
semanticscholar +1 more source
This study presents a Ti3C2Tx MXene/WPU nacre‐mimetic nanomaterial as a printable ink for direct‐write printing onto textiles‐based sensors. The resulting wearable device demonstrates high sensitivity, biocompatibility, and mechanical strength. Furthermore, NFC‐enabled humidity sensor produces time‐series data, which informs a machine learning ...
Lulu Xu+6 more
wiley +1 more source
A Survey on the Edge Computing for the Internet of Things
The Internet of Things (IoT) now permeates our daily lives, providing important measurement and collection tools to inform our every decision. Millions of sensors and devices are continuously producing data and exchanging important messages via complex ...
Wei Yu+6 more
semanticscholar +1 more source
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [PDF]
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the ...
M. Al-garadi+5 more
semanticscholar +1 more source