Results 11 to 20 of about 83,801 (268)

Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme [PDF]

open access: yesEAI Endorsed Transactions on Internet of Things, 2020
Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station(BS) in a hierarchical
Anubrata Chanda   +2 more
doaj   +1 more source

RLAuth: A Risk-Based Authentication System Using Reinforcement Learning

open access: yesIEEE Access, 2023
Conventional authentication systems, that are used to protect most modern mobile applications, are faced with usability and security problems related to their static and one-shot nature.
Claudy Picard, Samuel Pierre
doaj   +1 more source

Credibility in Online Social Networks: A Survey

open access: yesIEEE Access, 2019
The importance of information credibility in society cannot be underestimated given that it is at the heart of all decision-making. Generally, more information is better; however, knowing the value of this information is essential for the decision-making
Majed Alrubaian   +5 more
doaj   +1 more source

Mitigating Trade-Off in Unlicensed Network Optimization Through Machine Learning and Context Awareness

open access: yesIEEE Access, 2023
Unlicensed cellular networks are being deployed worldwide by cellular operators to meet the rising data demands. However, the unlicensed band has existing incumbents such as Wi-Fi and radar systems.
Srikant Manas Kala   +4 more
doaj   +1 more source

Sybil Defense Techniques in Online Social Networks: A Survey

open access: yesIEEE Access, 2017
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi   +5 more
doaj   +1 more source

Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter

open access: yesIEEE Access, 2020
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj   +1 more source

Smooth Complete Coverage Trajectory Planning Algorithm for a Nonholonomic Robot

open access: yesSensors, 2022
The complete coverage path planning is a process of finding a path which ensures that a mobile robot completely covers the entire environment while following the planned path.
Ana Šelek   +3 more
doaj   +1 more source

Greening emerging IT technologies: techniques and practices

open access: yesJournal of Internet Services and Applications, 2017
The tremendous increase in global industrial activity has resulted in high utilization of natural energy resources and increase in global warming over the last few decades. Meanwhile, computing has become a popular utility of modern human lifestyle. With
Junaid Shuja   +7 more
doaj   +1 more source

Mobile Phone-Based Audio Announcement Detection and Recognition for People with Hearing Impairment

open access: yesAdvances in Multimedia, 2018
Automatic audio announcement systems are widely used in public places such as transportation vehicles and facilities, hospitals, and banks. However, these systems cannot be used by people with hearing impairment.
Yong Ruan, Yueliang Qian, Xiangdong Wang
doaj   +1 more source

A High Quality Task Assignment Mechanism in Vehicle-Based Crowdsourcing Using Predictable Mobility Based on Markov

open access: yesIEEE Access, 2018
In recent years, crowdsourcing has become a research hotspot. How to formulate a reasonable task allocation mechanism to recruit the most suitable participant for the current perceptual task, and maximize the benefits of the platform has become a problem
Bing Jia   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy