Results 81 to 90 of about 7,113 (215)

Stellar: Network Attack Mitigation using Advanced Blackholing [PDF]

open access: yes, 2018
© ACM 2018. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings of the 14th International Conference on Emerging Networking EXperiments ...
Dietzel, Christoph   +3 more
core   +1 more source

A Detailed Comprehensive Role of Digital Technologies in Green Finance Initiative for Net‐Zero Energy Transition

open access: yesAdvanced Energy and Sustainability Research, Volume 6, Issue 10, October 2025.
This study aims to provide actionable recommendations for leveraging digital innovation for the achievement of scalable, equitable, and transparent Net Zero Energy Transition by offering actionable recommendations. As a result of this comprehensive analysis, the review highlights the critical interplay between digital technologies and GF as vital ...
Furkan Ahmad   +3 more
wiley   +1 more source

MQTT Broker Architectural Enhancements for High-Performance P2P Messaging: TBMQ Scalability and Reliability in Distributed IoT Systems

open access: yesIoT
The Message Queuing Telemetry Transport (MQTT) protocol remains a key enabler for lightweight and low-latency messaging in Internet of Things (IoT) applications.
Dmytro Shvaika   +2 more
doaj   +1 more source

Challenges of Internet of Things and Big Data Integration

open access: yes, 2018
The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of
C Perera   +8 more
core   +1 more source

Progress in fiber‐shaped zinc batteries: From structure, manufacturing, optimization to application

open access: yesInfoMat, Volume 7, Issue 10, October 2025.
In this review, four aspects of fiber‐shaped zinc batteries (FZBs) are systematically summarized: structure, manufacturing, optimization, and application. The structure of FZBs is first presented, encompassing common electrodes, electrolytes, current collectors, encapsulating materials, and various electrode assembly architectures.
Chongyang Luo   +9 more
wiley   +1 more source

The Impact of Artificial Intelligence (AI)‐Enabled Collaborative Approach: Achieving Sustainable Supply Chain Performance

open access: yesJournal of Business Logistics, Volume 46, Issue 4, October 2025.
ABSTRACT This study investigates the role of artificial intelligence (AI) in enhancing sustainability and efficiency within the fragmented supply chain of the tea industry. Small‐scale tea gardens often face logistical inefficiencies, inconsistent quality control, and economic constraints, limiting their competitiveness.
Tripti Paul   +4 more
wiley   +1 more source

Real-Time Detection and Process Status Integration System for High-Pressure Gas Leakage

open access: yesEngineering Proceedings
This study aims to develop a real-time gas leak detection system for application in gas cylinder filling machines. To promptly recover gas during leakage incidents, the efficiency of the gas filling process was improved by reducing resource wastage.
Nian-Ze Hu   +6 more
doaj   +1 more source

Development of Smart Refrigerator Based on Message Queuing Telemetry Transport [PDF]

open access: yesSensors and Materials, 2020
Chien-Yu Lu   +4 more
openaire   +1 more source

Implementasi Mqtt Protocol Pada Smart Home Security Berbasis Web [PDF]

open access: yes, 2018
Penggunaan IoT semakin berkembang dalam waktu singkat, hal ini dikarenakan oleh semakin berkembangnya teknologi informasi. Hal ini menyebabkan keterlibatan banyak device yang saling terkoneksi dengan sensor yang terpasang pada lingkungan. Sehingga dengan
Atmadji, E. S. (Ery)   +2 more
core  

Designing a Secure and Scalable Service Agent for IoT Transmission through Blockchain and MQTT Fusion

open access: yesApplied Sciences
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and ...
Tse-Chuan Hsu
doaj   +1 more source

Home - About - Disclaimer - Privacy