Results 81 to 90 of about 23,318 (265)
acoupi: An open‐source Python framework for deploying bioacoustic AI models on edge devices
Abstract Passive acoustic monitoring (PAM) coupled with artificial intelligence (AI) is becoming an essential tool for biodiversity monitoring. Traditional PAM systems require manual data offloading and impose substantial demands on data storage and computing infrastructure. The combination of on‐device AI processing and network connectivity enables to
Aude Vuilliomenet +4 more
wiley +1 more source
Virtualized Fog Network with Load Balancing for IoT based Fog-to-Cloud
Fog Computing is a new concept made by Cisco to provide same functionalities of Cloud Computing but near to Things to enhance performance such as reduce delay and response time.
Istabraq M. Al-Joboury +1 more
doaj +1 more source
MQTT DATA PROTOCOL IN REMOTE ACCESS CONTROL MANAGEMENT MODEL FOR INTERNET NETWORKS [PDF]
The paper deals with security issues in the environment of "Internet of things" and, in particular, the management of safety access control at MQTT protocol application.
D. I. Dikiy , V. D. Artemeva
doaj +1 more source
This paper proposes a novel blockchain‐based system designed to revolutionize transparency, traceability, and reliability within the organic food supply chain. Addressing persistent challenges such as certification fraud, opaque supply chains, and the high costs associated with organic food production, stakeholders including farmers, processors ...
Youness Riouali +2 more
wiley +1 more source
MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more ...
Marco Calabretta +3 more
doaj
SGANFuzz: A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks
As the Internet of Things (IoT) industry grows, the risk of network protocol security threats has also increased. One protocol that has come under scrutiny for its security vulnerabilities is MQTT (Message Queuing Telemetry Transport), which is widely ...
Zhiqiang Wei +4 more
doaj +1 more source
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
Security model design and formal verification of MQTT protocol
As a lightweight message transmission protocol, MQTT protocol has been widely used in various application scenarios of the IoT due to its high efficiency and flexibility.
Chengtai Gao, Xiaohui Xi, Chunyan Zhang
doaj +1 more source
This research work greatly concerning the trending Protocol known as Message Queue Telemetry Transport (MQTT) which is used by Internet of Things (IoT) to pass messages by both ends. The communication between the huge amounts of devices is enabled by IPv6 and light weight communication protocols such as MQTT. The goal was to develop a protocol which is
openaire +2 more sources
Review of artificial intelligence applications in geothermal energy extraction from hot dry rock
This paper systematically summarized the applications of artificial intelligence (AI) in hot dry rock (HDR) geothermal exploitation and discussed the limitations and opportunities. A novel intelligent HDR exploitation system was proposed to promote the development of HDR toward more efficiency, economy, and intelligence.
Kun Ji +5 more
wiley +1 more source

