Results 31 to 40 of about 661,032 (306)

Towards a Hybrid Deep Learning Model for Anomalous Activities Detection in Internet of Things Networks

open access: yesIoT, 2021
The tremendous number of Internet of Things (IoT) applications, with their ubiquity, has provided us with unprecedented productivity and simplified our daily life.
Imtiaz Ullah, Ayaz Ullah, Mazhar Sajjad
doaj   +1 more source

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things

open access: yesIoT, 2021
The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more ...
Claudio Marche   +2 more
doaj   +1 more source

Integration of heterogeneous devices and communication models via the cloud in the constrained internet of things [PDF]

open access: yes, 2015
As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers
Demeester, Piet   +3 more
core   +3 more sources

A Single-Way Ranging Localization of AUVs Based on PSO of Outliers Elimination

open access: yesJournal of Robotics, 2018
Localization of autonomous underwater vehicles (AUVs) is a very important and challenging task for the AUVs applications. In long baseline underwater acoustic localization networks, the accuracy of single-way range measurements is the key factor for the ...
Xinnan Fan   +3 more
doaj   +1 more source

Robust Identification Method for LPV ARX Systems and its Application to a Mechanical Unit

open access: yesIEEE Access, 2019
This paper introduces a robust identification solution for the linear parameter varying Autoregressive Exogenous systems with outlier-contaminated outputs.
Xin Liu, Tingting Zhang, Xiaofeng Liu
doaj   +1 more source

BECA: A Blockchain-Based Edge Computing Architecture for Internet of Things Systems

open access: yesIoT, 2021
The scale of Internet of Things (IoT) systems has expanded in recent times and, in tandem with this, IoT solutions have developed symbiotic relationships with technologies, such as edge Computing.
Oluwashina Joseph Ajayi   +4 more
doaj   +1 more source

Mobile Edge Computing Empowers Internet of Things

open access: yes, 2017
In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework.
Ansari, Nirwan, Sun, Xiang
core   +1 more source

A novel ML DOA estimation algorithm for array signal processing

open access: yesMATEC Web of Conferences, 2018
A novel algorithm for finding the optimal solution of nonlinear function in maximum likelihood DOA estimation is proposed to reduce the calculation in multi-dimensional nonlinear search of the estimation.
Shi Pengfei   +3 more
doaj   +1 more source

Ultra-Low-Power Architecture for the Detection and Notification of Wildfires Using the Internet of Things

open access: yesIoT, 2023
Wildfires kill and injure people, destroy residences, pollute the air, and cause economic loss. In this paper, a low-power Internet of Things (IoT)-based sensor network is developed, which automatically detects fires in forests and sends the location to ...
Tareq Khan
doaj   +1 more source

Home - About - Disclaimer - Privacy