Results 81 to 90 of about 23,318 (265)

acoupi: An open‐source Python framework for deploying bioacoustic AI models on edge devices

open access: yesMethods in Ecology and Evolution, Volume 17, Issue 1, Page 67-76, January 2026.
Abstract Passive acoustic monitoring (PAM) coupled with artificial intelligence (AI) is becoming an essential tool for biodiversity monitoring. Traditional PAM systems require manual data offloading and impose substantial demands on data storage and computing infrastructure. The combination of on‐device AI processing and network connectivity enables to
Aude Vuilliomenet   +4 more
wiley   +1 more source

Virtualized Fog Network with Load Balancing for IoT based Fog-to-Cloud

open access: yesJOIV: International Journal on Informatics Visualization, 2020
Fog Computing is a new concept made by Cisco to provide same functionalities of Cloud Computing but near to Things to enhance performance such as reduce delay and response time.
Istabraq M. Al-Joboury   +1 more
doaj   +1 more source

MQTT DATA PROTOCOL IN REMOTE ACCESS CONTROL MANAGEMENT MODEL FOR INTERNET NETWORKS [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2019
The paper deals with security issues in the environment of "Internet of things" and, in particular, the management of safety access control at MQTT protocol application.
D. I. Dikiy , V. D. Artemeva
doaj   +1 more source

A Blockchain‐Driven Approach to Enhancing Transparency and Traceability in Organic Food Supply Chain Management

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
This paper proposes a novel blockchain‐based system designed to revolutionize transparency, traceability, and reliability within the organic food supply chain. Addressing persistent challenges such as certification fraud, opaque supply chains, and the high costs associated with organic food production, stakeholders including farmers, processors ...
Youness Riouali   +2 more
wiley   +1 more source

MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities

open access: yesJournal of Communications Software and Systems, 2018
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more ...
Marco Calabretta   +3 more
doaj  

SGANFuzz: A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks

open access: yesIEEE Access
As the Internet of Things (IoT) industry grows, the risk of network protocol security threats has also increased. One protocol that has come under scrutiny for its security vulnerabilities is MQTT (Message Queuing Telemetry Transport), which is widely ...
Zhiqiang Wei   +4 more
doaj   +1 more source

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

Security model design and formal verification of MQTT protocol

open access: yesDiscover Applied Sciences
As a lightweight message transmission protocol, MQTT protocol has been widely used in various application scenarios of the IoT due to its high efficiency and flexibility.
Chengtai Gao, Xiaohui Xi, Chunyan Zhang
doaj   +1 more source

MQTT Messages-An Overview

open access: yesINTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER RESEARCH, 2021
This research work greatly concerning the trending Protocol known as Message Queue Telemetry Transport (MQTT) which is used by Internet of Things (IoT) to pass messages by both ends. The communication between the huge amounts of devices is enabled by IPv6 and light weight communication protocols such as MQTT. The goal was to develop a protocol which is
openaire   +2 more sources

Review of artificial intelligence applications in geothermal energy extraction from hot dry rock

open access: yesDeep Underground Science and Engineering, Volume 4, Issue 4, Page 651-672, December 2025.
This paper systematically summarized the applications of artificial intelligence (AI) in hot dry rock (HDR) geothermal exploitation and discussed the limitations and opportunities. A novel intelligent HDR exploitation system was proposed to promote the development of HDR toward more efficiency, economy, and intelligence.
Kun Ji   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy