An Environment-Aware Adaptive Data-Gathering Method for Packet-Level Index Modulation in LPWA

O Takyu, K Takeda, R Miyamoto, K Adachi, M Ohta… - Sensors, 2024 - mdpi.com
Low-power wide-area (LPWA) is a communication technology for the IoT that allows low
power consumption and long-range communication. Additionally, packet-level index …

IoT emergency healthcare system using ML-based triage

AM Said, A Yahyaoui… - International Journal of …, 2024 - inderscienceonline.com
To develop effective IoT-based e-health systems for alerting purposes, two critical
requirements must be met: 1) precise classification of alerts based on their severity levels; 2) …

Intelligent fire information system based on 3D GIS

J Hu, Z Lv, D Yuan, B He, D Yan - Virtual Reality & Intelligent Hardware, 2023 - Elsevier
Background This work aims to build a comprehensive and effective fire emergency
management system based on the Internet of Things (IoT) and achieve an actual intelligent …

Adaptive reinforcement learning with Dij-Huff method to secure optimal route in smart healthcare system

KS Madhuri, J Mungara - Cardiometry, 2022 - search.proquest.com
Abstract The Wireless Sensor Network (WSN) is a multi-hop wireless network that contains
multiple sensor nodes agreed in a self-organized mode. The significant advancement in the …

[PDF][PDF] Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud.

S Priya, RS Ponmagal - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
Handling service access in a cloud environment has been identified as a critical challenge
in the modern internet world due to the increased rate of intrusion attacks. To address such …

Action Localization and Recognition through Unsupervised I3D and TSN

M Umran, K Muchtar, TF Abidin… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Since CCTV technology was widely introduced as a video surveillance system, it has
become very popular due to increased security concerns. However, detecting suspicious …

The Development of the Integrated System Failure Analysis and Its Applications

C Smidts, X Diao - Advances in Risk-Informed Technologies: Keynote …, 2024 - Springer
This paper reviews the development and applications of the Integrated System Failure
Analysis approach. The Integrated System Failure Analysis integrates multiple existing …

[PDF][PDF] Testbeds and evaluation frameworks for anomaly detection within built environments: A systematic review

M Alosaimi, O Rana, C Perera - 2023 - orca.cardiff.ac.uk
ABSTRACT active in exchanging communication and data. IoT devices cannot enforce
advanced security mechanisms to protect themselves from cyberattacks. Furthermore, IoT …

SibProMQTT: Protection of the MQTT Communication Protocol Against Sybil Attacks Applied for IoT Devices

F Dewantaz, I Wahidah, SN Hertiana… - … Conference on IC …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) devices require lightweight and fast communication protocol to
exchange messages among entities involved in the system. Among several well-known …

A Multi-layer Security Scheme (MLSS) for Digital Images Contents

FAF Alyaqobi, NA Yahaya - Turkish Journal of Computer and …, 2023 - turcomat.org
Digital images and their contents are increasingly being utilized in numerous applications,
especially in the context of the Internet of Things (IoT). The rapid growth of IoT has facilitated …