An Environment-Aware Adaptive Data-Gathering Method for Packet-Level Index Modulation in LPWA
O Takyu, K Takeda, R Miyamoto, K Adachi, M Ohta… - Sensors, 2024 - mdpi.com
Low-power wide-area (LPWA) is a communication technology for the IoT that allows low
power consumption and long-range communication. Additionally, packet-level index …
power consumption and long-range communication. Additionally, packet-level index …
IoT emergency healthcare system using ML-based triage
AM Said, A Yahyaoui… - International Journal of …, 2024 - inderscienceonline.com
To develop effective IoT-based e-health systems for alerting purposes, two critical
requirements must be met: 1) precise classification of alerts based on their severity levels; 2) …
requirements must be met: 1) precise classification of alerts based on their severity levels; 2) …
Intelligent fire information system based on 3D GIS
J Hu, Z Lv, D Yuan, B He, D Yan - Virtual Reality & Intelligent Hardware, 2023 - Elsevier
Background This work aims to build a comprehensive and effective fire emergency
management system based on the Internet of Things (IoT) and achieve an actual intelligent …
management system based on the Internet of Things (IoT) and achieve an actual intelligent …
Adaptive reinforcement learning with Dij-Huff method to secure optimal route in smart healthcare system
KS Madhuri, J Mungara - Cardiometry, 2022 - search.proquest.com
Abstract The Wireless Sensor Network (WSN) is a multi-hop wireless network that contains
multiple sensor nodes agreed in a self-organized mode. The significant advancement in the …
multiple sensor nodes agreed in a self-organized mode. The significant advancement in the …
[PDF][PDF] Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud.
S Priya, RS Ponmagal - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
Handling service access in a cloud environment has been identified as a critical challenge
in the modern internet world due to the increased rate of intrusion attacks. To address such …
in the modern internet world due to the increased rate of intrusion attacks. To address such …
Action Localization and Recognition through Unsupervised I3D and TSN
Since CCTV technology was widely introduced as a video surveillance system, it has
become very popular due to increased security concerns. However, detecting suspicious …
become very popular due to increased security concerns. However, detecting suspicious …
The Development of the Integrated System Failure Analysis and Its Applications
This paper reviews the development and applications of the Integrated System Failure
Analysis approach. The Integrated System Failure Analysis integrates multiple existing …
Analysis approach. The Integrated System Failure Analysis integrates multiple existing …
[PDF][PDF] Testbeds and evaluation frameworks for anomaly detection within built environments: A systematic review
ABSTRACT active in exchanging communication and data. IoT devices cannot enforce
advanced security mechanisms to protect themselves from cyberattacks. Furthermore, IoT …
advanced security mechanisms to protect themselves from cyberattacks. Furthermore, IoT …
SibProMQTT: Protection of the MQTT Communication Protocol Against Sybil Attacks Applied for IoT Devices
Internet of Things (IoT) devices require lightweight and fast communication protocol to
exchange messages among entities involved in the system. Among several well-known …
exchange messages among entities involved in the system. Among several well-known …
A Multi-layer Security Scheme (MLSS) for Digital Images Contents
FAF Alyaqobi, NA Yahaya - Turkish Journal of Computer and …, 2023 - turcomat.org
Digital images and their contents are increasingly being utilized in numerous applications,
especially in the context of the Internet of Things (IoT). The rapid growth of IoT has facilitated …
especially in the context of the Internet of Things (IoT). The rapid growth of IoT has facilitated …