Results 21 to 30 of about 279,338 (297)

Enabling IoT ecosystems through platform interoperability [PDF]

open access: yes, 2017
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models.
Anicic, Darko   +9 more
core   +2 more sources

Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies

open access: yesFuture Internet, 2019
The Internet of Things (IoT), being a “network of networks„, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on mesh topologies is very ...
Antonio Cilfone   +3 more
doaj   +1 more source

Notice of Violation of IEEE Publication Principles: Clustering Schemes in MANETs: Performance Evaluation, Open Challenges, and Proposed Solutions

open access: yesIEEE Access, 2020
Mobile ad hoc networks (MANETs) have recently received a lot of attention from researchers due to their ease of deployment and versatility. Clustering is one of the most efficient ways to coordinate routing in MANETs to improve network performance using ...
Taj Rahman   +3 more
doaj   +1 more source

A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis

open access: yesIEEE Access, 2018
False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems (ICSs).
Zhengdao Zhang, Yunfei Wang, Linbo Xie
doaj   +1 more source

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

On Driver Behavior Recognition for Increased Safety: A Roadmap

open access: yesSafety, 2020
Advanced Driver-Assistance Systems (ADASs) are used for increasing safety in the automotive domain, yet current ADASs notably operate without taking into account drivers’ states, e.g., whether she/he is emotionally apt to drive.
Luca Davoli   +14 more
doaj   +1 more source

Extended incremental fuzzy clustering algorithm for sparse high-dimensional big data [PDF]

open access: yesJisuanji gongcheng, 2019
Fuzzy C-Means(FCM) clustering algorithm can only deal with low-dimensional data and is sensitive to the initial center,without considering the interactions between class centers.For this reason,an improved method of initial center selection is designed ...
QIAN Xuezhong,YAO Linya
doaj   +1 more source

AIoT with I4.0: the effect of Internet of Things and Artificial Intelligence technologies on the industry 4.0 [PDF]

open access: yesITM Web of Conferences, 2022
The Internet of Things (IoT) extend the connectivity into billions of IoT devices around the world. Artificial Intelligence (AI) is the best solution to manage huge data flow and storage in IoT network.
Haqiq Nasreddine   +4 more
doaj   +1 more source

DiRPL: A RPL-Based Resource and Service Discovery Algorithm for 6LoWPANs

open access: yesApplied Sciences, 2018
The Internet of Things (IoT) will bring together billions of devices, denoted as Smart Objects (SOs), in an Internet-like architecture. Typically, SOs are embedded devices with severe constraints in terms of processing capabilities, available memory (RAM/
Luca Davoli   +2 more
doaj   +1 more source

Performance Assessment of DL for Network Intrusion Detection on a Constrained IoT Device

open access: yesFuture Internet
This work investigates the deployment of Deep Learning (DL) models for network intrusion detection on resource-constrained IoT devices, using the public CICIoT2023 dataset. In particular, we consider the following DL models: Long Short-Term Memory (LSTM),
Armin Mazinani   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy