Results 31 to 40 of about 206,924 (277)

Efficient and Accurate Target Localization in Underwater Environment

open access: yesIEEE Access, 2019
Localization is the basic feature of wireless sensor networks (WSN) and estimating the time difference of arrival (TDoA), and angle of arrival (AoA) is the most used schemes for localization.
Inam Ullah   +3 more
doaj   +1 more source

LoRa: A Proposed Connectivity Technology for Internet of Things Applications in the Kurdistan Region of Iraq

open access: yesKurdistan Journal of Applied Research, 2021
The Internet of Things (IoT) has become one of the most important trends of this century. Recent advances in many different communication technologies and protocols, and access to low-cost and low-power microcontrollers and sensors have made it more ...
Sarko Salahadin Ahmad   +1 more
doaj   +1 more source

A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare

open access: yesIEEE Access, 2021
Smart health care is an important aspect of connected living. Health care is one of the basic pillars of human need, and smart health care is projected to produce several billion dollars in revenue in the near future.
Fatima Alshehri, G. Muhammad
semanticscholar   +1 more source

Internet of Things (IoT): A Literature Review

open access: yes, 2015
One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects.
Somayya Madakam   +2 more
semanticscholar   +1 more source

Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies

open access: yesFuture Internet, 2019
The Internet of Things (IoT), being a “network of networks„, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on mesh topologies is very ...
Antonio Cilfone   +3 more
doaj   +1 more source

A Novel Data Integrity Attack Detection Algorithm Based on Improved Grey Relational Analysis

open access: yesIEEE Access, 2018
False data injection (FDI) attack is the most common data integrity attack, and it is also one of the most serious threats in industrial control systems (ICSs).
Zhengdao Zhang, Yunfei Wang, Linbo Xie
doaj   +1 more source

Notice of Violation of IEEE Publication Principles: Clustering Schemes in MANETs: Performance Evaluation, Open Challenges, and Proposed Solutions

open access: yesIEEE Access, 2020
Mobile ad hoc networks (MANETs) have recently received a lot of attention from researchers due to their ease of deployment and versatility. Clustering is one of the most efficient ways to coordinate routing in MANETs to improve network performance using ...
Taj Rahman   +3 more
doaj   +1 more source

On Driver Behavior Recognition for Increased Safety: A Roadmap

open access: yesSafety, 2020
Advanced Driver-Assistance Systems (ADASs) are used for increasing safety in the automotive domain, yet current ADASs notably operate without taking into account drivers’ states, e.g., whether she/he is emotionally apt to drive.
Luca Davoli   +14 more
doaj   +1 more source

Extended incremental fuzzy clustering algorithm for sparse high-dimensional big data [PDF]

open access: yesJisuanji gongcheng, 2019
Fuzzy C-Means(FCM) clustering algorithm can only deal with low-dimensional data and is sensitive to the initial center,without considering the interactions between class centers.For this reason,an improved method of initial center selection is designed ...
QIAN Xuezhong,YAO Linya
doaj   +1 more source

AIoT with I4.0: the effect of Internet of Things and Artificial Intelligence technologies on the industry 4.0 [PDF]

open access: yesITM Web of Conferences, 2022
The Internet of Things (IoT) extend the connectivity into billions of IoT devices around the world. Artificial Intelligence (AI) is the best solution to manage huge data flow and storage in IoT network.
Haqiq Nasreddine   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy