[HTML][HTML] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

G Abbas, M Tanveer, ZH Abbas, M Waqas, T Baker… - PloS one, 2021 - journals.plos.org
One of the significant challenges in the Internet of Things (IoT) is the provisioning of
guaranteed security and privacy, considering the fact that IoT devices are resource-limited …

CMAKM-FIoT: centralised mutual authentication and key management scheme for fog computing-enabled IoT network

U Verma, D Bhardwaj - International Journal of Electronic …, 2022 - inderscienceonline.com
Nowadays, fog computing plays an indispensable role in delay-sensitive internet of things
(IoT) applications. However, openness and lack of human intervention make fog computing …

Smart hat: design and implementation of a wearable learning device for kids using AI and IoTs techniques

IH Chang, HC Keh, B Dande, DS Roy - Journal of Internet …, 2020 - jit.ndhu.edu.tw
Abstract Internet of Things (IoT) and Artificial Intelligence (AI) have received much attention
in recent years. Embedded with sensors and connected to the Internet, the IoT device can …

CBLM: Cluster-based location management for 5G small cell network under stochastic environment

S Chakraborty, K Mazumdar, D De - Journal of Circuits, Systems …, 2021 - World Scientific
Internet of Things (IoT) applications are connecting several Mobile Stations (MSs) to form the
Mobile Communication Network (MCN). MSs are moving through macrocell and picocell …

Optimization smart classroom using feature selection in ACO algorithm

DAUA Abd Ali - 2022 - openaccess.altinbas.edu.tr
Artificial intelligence, as we know it, is the ability of digital devices and computers to mimic
and resemble the actions of intelligent individuals in several ways. One of its most important …

[PDF][PDF] Implementation of RFID with Internet of Things

AS Kumar, S Brittoraj, M Rajesh - no, 2019 - researchgate.net
Internet of Things (IOT) can be defined as a thing or device, physical and virtual, connected
and communicating together, and integrated to a network for a specific purpose. The IoT …

Implementación de una red de sensores inalámbricos utilizando estrategias de FOG Computing en sistemas de reconocimiento de voz

KD Patiño Sosa - repositorio.unal.edu.co
En el contexto de control inteligente de hogares, el reconocimiento de voz se postula como
tema de investigación porque representa un claro desafı́o en términos de la definición de …