Results 11 to 20 of about 661,032 (306)

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Adaptive Intelligent Super-Twisting Control of Dynamic System

open access: yesIEEE Access, 2022
This study develops an adaptive Super-Twisting sliding mode control (STSMC) approach using an output feedback fuzzy neural network (OFFNN) for dynamic systems.
Qi Pan, Juntao Fei, Yuncan Xue
doaj   +1 more source

Anomaly Detection and Classification in Predictive Maintenance Tasks with Zero Initial Training

open access: yesIoT, 2021
The Fourth Industrial Revolution has led to the adoption of novel technologies and methodologies in factories, making these more efficient and productive.
Filippo Morselli   +4 more
doaj   +1 more source

Enabling IoT ecosystems through platform interoperability [PDF]

open access: yes, 2017
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models.
Anicic, Darko   +9 more
core   +2 more sources

Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT

open access: yesIoT, 2022
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network ...
Rubayyi Alghamdi, Martine Bellaiche
doaj   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Tinier-YOLO: A Real-Time Object Detection Method for Constrained Environments

open access: yesIEEE Access, 2020
Deep neural networks (DNNs) have shown prominent performance in the field of object detection. However, DNNs usually run on powerful devices with high computational ability and sufficient memory, which have greatly limited their deployment for ...
Wei Fang, Lin Wang, Peiming Ren
doaj   +1 more source

An Improved Cooperative Control Method for Hybrid Unmanned Aerial-Ground System in Multitasks

open access: yesInternational Journal of Aerospace Engineering, 2020
The cooperative control in complex multitasks using unmanned aerial vehicle and unmanned ground vehicle (UAV/UGV) is an important and challenging issue in the multirobot cooperative field.
Jianjun Ni   +3 more
doaj   +1 more source

Parameter Optimization of Support Vector Regression Using Henry Gas Solubility Optimization Algorithm

open access: yesIEEE Access, 2020
Support vector regression (SVR) is one of the most powerful and widely used machine learning algorithms regarding prediction. The kernel type, penalty factor and other parameters influence the efficiency and performance of SVR deeply. The optimization of
Weidong Cao, Xin Liu, Jianjun Ni
doaj   +1 more source

Home - About - Disclaimer - Privacy