Results 81 to 90 of about 7,598 (158)

Understanding the limits of LoRaWAN

open access: yes, 2017
The quick proliferation of LPWAN networks, being LoRaWAN one of the most adopted, raised the interest of the industry, network operators and facilitated the development of novel services based on large scale and simple network structures.
Adelantado, Ferran   +5 more
core   +3 more sources

NB-IoT Coverage : Development of a measuring instrument for NB-IoT

open access: yes, 2021
This report is an exposition of the development of a measuring instrument whosetask is to map the physical coverage of the NB-IoT network. The measuringinstrument was developed on TietoEvry's initiative, as it was in their interest to obtaina measuring instrument that can be used to map the coverage in parts of VarmlandsNB-IoT network.
openaire   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Deep-coverage study of NB-IoT in different network schemes

open access: yes物联网学报, 2017
Deep-coverage enhancement is one of the most important features of NB-IoT network,which allows NB-IoT network meets a large number of application scenarios.This thesis presents the research of NB-IoT deep-coverage enhancement principle,and the ...
Xu-yang ZHANG   +4 more
doaj   +2 more sources

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Are Ecosystems the Missing Link in Circular Transitions? Insights From a Comprehensive Literature Analysis

open access: yesBusiness Strategy and the Environment, Volume 35, Issue 4, Page 5452-5470, May 2026.
ABSTRACT Although recent literature on the circular economy (CE) has highlighted the important role of ecosystems, there is still limited understanding of the main themes that characterize circular ecosystems. This study addresses this gap by combining a comprehensive topic modeling analysis employing latent Dirichlet allocation (LDA) with a systematic
Aline Gabriela Ferrari   +4 more
wiley   +1 more source

NB-IoT via non terrestrial networks [PDF]

open access: yes, 2023
Massive Internet of Things is expected to play a crucial role in Beyond 5G (B5G) wireless communication systems, offering seamless connectivity among heterogeneous devices without human intervention. However, the exponential proliferation of smart devices and IoT networks, relying solely on terrestrial networks, may not fully meet the demanding IoT ...
openaire   +2 more sources

Two‐Dimensional Piezoelectric Nanomaterials for Nanoelectronics and Energy Harvesting

open access: yesENERGY &ENVIRONMENTAL MATERIALS, Volume 9, Issue 3, May 2026.
Two‐Dimensional Piezoelectric Nanomaterials from properties to applications. Smart materials, especially piezoelectric materials, have gained popularity over the last two decades. Two‐dimensional (2D) piezoelectric materials exhibit attributes including great flexibility, ease of workability, extensive surface area, and many active sites, indicating ...
Yujun Cao   +12 more
wiley   +1 more source

Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks

open access: yesIEEE Access, 2019
With the integration of Narrowband Internet of Things (NB-IoT) technology coming into our lives, more and more NB-IoT terminals are connected to the network to meet various requirements of users.
Yinghui Zhang   +5 more
doaj   +1 more source

On the Optimal Selection of Mel‐Frequency Cepstral Coefficients for Voice Deepfake Detection

open access: yesExpert Systems, Volume 43, Issue 5, May 2026.
ABSTRACT The continuous evolution of techniques for generating manipulated audio, known as voice deepfakes, and the widespread availability of tools that produce convincing forgeries have created an urgent need for reliable detection methods. This work considers the dimensionality of Mel‐Frequency Cepstral Coefficients (MFCCs) as a core design variable
Sergio A. Falcón‐López   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy