Results 91 to 100 of about 14,625 (213)
This review proposes using machine learning (ML) and large language models (LLMs) to circumvent performance variabilities in chemical vapour deposition graphene coatings for corrosion resistance. ML optimises synthesis parameters, predicting quality metrics, for example, defect density and layer count, and LLMs structure complex literature data via a ...
Pragyan Goswami +2 more
wiley +1 more source
DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices ...
Jun-Hong Park +2 more
doaj +1 more source
Internet of Things (IoT) Platform for Multi-Topic Messaging
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks ...
Mahmoud Hussein +3 more
doaj +1 more source
This article proposes an integrated design method for a 12 kV intelligent ring main unit and constructs a fault diagnosis and isolation model. Firstly, building an integrated hardware platform can significantly improve perception speed and fusion potential.
Rongrong Shan, Jieyun Qiu, Dong Han
wiley +1 more source
A Critical Review on the Application and Innovation in Smart Fisheries
Smart fisheries powered by Artificial Intelligence (AI), Internet of Things (IoT), and machine learning can spot diseases early, monitor water in real time, and identify fish automatically, helping farmers boost yields, cut losses, and protect sustainability in countries like Bangladesh.
Shahim Uddin Saba +6 more
wiley +1 more source
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges
Service virtualization is an approach that uses virtualized environments to automatically test enterprise services in production-like conditions. Many techniques have been proposed to provide such a realistic environment for enterprise services.
Farahmandpour, Zeinab +3 more
core +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source
This study presents a hierarchical optimisation strategy combining an improved genetic algorithm with model predictive control, validated through a digital twin framework. The method improves convergence accuracy, computational efficiency and response speed, while demonstrating robustness across complex multiscenario conditions.
Xiaoguang Zhang +4 more
wiley +1 more source
Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study
Most industrial and SCADA-like (supervisory control and data acquisition) systems use proprietary communication protocols, and hence interoperability is not fulfilled.
Samer Jaloudi
doaj +1 more source
Implementasi Mqtt Protocol Pada Smart Home Security Berbasis Web [PDF]
Penggunaan IoT semakin berkembang dalam waktu singkat, hal ini dikarenakan oleh semakin berkembangnya teknologi informasi. Hal ini menyebabkan keterlibatan banyak device yang saling terkoneksi dengan sensor yang terpasang pada lingkungan. Sehingga dengan
Atmadji, E. S. (Ery) +2 more
core

