[HTML][HTML] CMOS low noise amplifier design trends towards millimeter-wave IoT sensors
Millimeter Wave (mm-wave) technology is a prerequisite to ensure ubiquitous wireless
communication, given the rapid growth of the Internet of Things (IoT) infrastructure that …
communication, given the rapid growth of the Internet of Things (IoT) infrastructure that …
[HTML][HTML] A fixed clustering protocol based on random relay strategy for EHWSN
X Luo, C Zhang, L Bai - Digital Communications and Networks, 2023 - Elsevier
Abstract In Energy Harvesting Wireless Sensor Networks (EHWSN), the communication
protocol will directly affect the final performance of the network, so it is necessary to study the …
protocol will directly affect the final performance of the network, so it is necessary to study the …
HFLFO: Hybrid fuzzy levy flight optimization for improving QoS in wireless sensor network
S Hemavathi, B Latha - Ad Hoc Networks, 2023 - Elsevier
In IoT-based WSN applications, energy is a vital parameter since limited residual energy of a
node often leads to packet loss, diminished network lifetime, and end-to-end delay. IoT …
node often leads to packet loss, diminished network lifetime, and end-to-end delay. IoT …
[HTML][HTML] Acoustic energy harvesting using an array of piezoelectric cantilever plates for railways and highways environmental noise
E Hassan, SA Kouritem, FZ Amer… - Ain Shams Engineering …, 2024 - Elsevier
This paper introduces a model of sound energy harvesting that operates at a low frequency
of less than 200 Hz. This investigation focuses on the produced outcomes when the …
of less than 200 Hz. This investigation focuses on the produced outcomes when the …
An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things
Abstract The Internet of Things (IoT) is rapidly permeating critical domains, enabling the
interconnection and utilization of diverse devices on a large scale while streaming vast …
interconnection and utilization of diverse devices on a large scale while streaming vast …
IoT Sensor Data Retrieval and Analysis in Cloud Environments for Enhanced Power Management
V Arulkumar, F Kavin, B Nagu - Journal of Advanced …, 2024 - semarakilmu.com.my
Abstract The Internet of Things (IoT) brings new products to everyone to improve daily life.
Concurrently other emerging technologies, including Big Data, Cloud Services, and …
Concurrently other emerging technologies, including Big Data, Cloud Services, and …
Enhancing Fault Detection in Wireless Sensor Networks Through Support Vector Machines: A Comprehensive Study
Y Mardenov, A Adamova, T Zhukabayeva… - Journal of Robotics …, 2023 - journal.umy.ac.id
Abstract The Wireless Sensor Network (WSN) consists of many sensors that are distributed
in a specific area for the purpose of monitoring physical conditions. Factors such as …
in a specific area for the purpose of monitoring physical conditions. Factors such as …
[PDF][PDF] Energy Aware Adaptive Sleep Scheduling and Secured Data Transmission Protocol to enhance QoS in IoT Networks using Improvised Firefly Bio-Inspired …
S Nithyanandh, S Omprakash… - Indian Journal …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: To propose a suitable bio-inspired algorithm for energy-aware adaptive sleep
scheduling and secured data transmission in IoT networks. Machine learning with bio …
scheduling and secured data transmission in IoT networks. Machine learning with bio …
[PDF][PDF] Current Security Threats in Applications of Wireless Sensor Network
Wireless Sensor Networks (WSNs) are either homogeneous or heterogeneous, depending
on whether the network is made up of distributed nodes with the same properties; …
on whether the network is made up of distributed nodes with the same properties; …