Results 21 to 30 of about 206,539 (199)

Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks

open access: yesIoT, 2021
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life.
Imtiaz Ullah, Ayaz Ullah, Mazhar Sajjad
doaj   +1 more source

IoT or NoT: Identifying IoT Devices in a Short Time Scale [PDF]

open access: yesNOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
In recent years the number of IoT devices in home networks has increased dramatically. Whenever a new device connects to the network, it must be quickly managed and secured using the relevant security mechanism or QoS policy. Thus a key challenge is to distinguish between IoT and NoT devices in a matter of minutes.
Anat Bremler-Barr   +2 more
openaire   +3 more sources

Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things

open access: yesIoT, 2021
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more ...
Claudio Marche   +2 more
doaj   +1 more source

An Improved Cooperative Control Method for Hybrid Unmanned Aerial-Ground System in Multitasks

open access: yesInternational Journal of Aerospace Engineering, 2020
The cooperative control in complex multitasks using unmanned aerial vehicle and unmanned ground vehicle (UAV/UGV) is an important and challenging issue in the multirobot cooperative field.
Jianjun Ni   +3 more
doaj   +1 more source

Guided Waves in a Solid Rod Embedded in Infinite Medium with Weak Interface

open access: yesMATEC Web of Conferences, 2016
The dispersion relation of the infinite long rod model with a weak interface has been deduced via wave equation of the guided waves and boundary spring interface model.
Tong Zi Wei   +5 more
doaj   +1 more source

Taking advantage of motif matrix inference for rotated image indexing and retrieval

open access: yesEURASIP Journal on Advances in Signal Processing, 2018
With the rapid development of information technology, the sizes of digital libraries become larger and larger. How to quickly and effectively search the desired images in huge digital libraries becomes the challenge needed to resolve with high priority ...
Yi Xu   +4 more
doaj   +1 more source

The effect of sediment content to fluid - solid interface time-domain waveform

open access: yesMATEC Web of Conferences, 2016
A model was established for the fluid - solid interface of semi-infinite medium, and the characteristic equation was established using the potential function.
Qi Li Hua   +5 more
doaj   +1 more source

Kernel locality‐constrained sparse coding for head pose estimation

open access: yesIET Computer Vision, 2016
In many situations, it would be practical for a computer system user interface to have a model of where a person is looking and what the user is paying attention to.
Hyunduk Kim   +3 more
doaj   +1 more source

BECA: A Blockchain-Based Edge Computing Architecture for Internet of Things Systems

open access: yesIoT, 2021
The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing.
Oluwashina Joseph Ajayi   +4 more
doaj   +1 more source

Landscape of IoT security

open access: yesComputer Science Review, 2022
Landscape of IoT Security is a survey paper that overviews the IoT security landscape intending to emphasize the demand for secured IoT-related products and applications. Therefore, this paper derives (a) a list of key challenges of securing IoT devices is determined by examining their particular characteristics, (b) major security objectives for ...
Eryk Schiller   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy