Blockchain-based systems and applications: a survey

J Zhang, S Zhong, T Wang, HC Chao… - Journal of Internet …, 2020 - jit.ndhu.edu.tw
Currently, many efforts have been done towards secure data privacy protection and reliable
information trace, however the conventional solutions are still vulnerable to information loss …

[PDF][PDF] TinyML-Based Classification in an ECG Monitoring Embedded System

E Kim, J Kim, J Park, H Ko… - Computers, Materials and …, 2023 - cdn.techscience.cn
Recently, the development of the Internet of Things (IoT) has enabled continuous and
personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification …

Block5GIntell: Blockchain for AI-enabled 5G networks

A El Azzaoui, SK Singh, Y Pan, JH Park - IEEE Access, 2020 - ieeexplore.ieee.org
Nowadays, 5G network is considered to be one of the main pillars of various industries,
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …

Parameterized algorithms of fundamental NP-hard problems: a survey

W Li, Y Ding, Y Yang, RS Sherratt, JH Park… - … -centric Computing and …, 2020 - Springer
Parameterized computation theory has developed rapidly over the last two decades. In
theoretical computer science, it has attracted considerable attention for its theoretical value …

[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.

JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …

When sensor-cloud meets mobile edge computing

T Wang, Y Lu, Z Cao, L Shu, X Zheng, A Liu, M Xie - Sensors, 2019 - mdpi.com
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing.
The emergence of sensor-clouds has greatly enhanced the computing power and storage …

MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost

D Tang, L Tang, R Dai, J Chen, X Li… - Future Generation …, 2020 - Elsevier
A low-rate denial of service (LDoS) attack is a precise network attack that aims at reducing
the quality of the network service. Many networks do not have an effective mechanism for …

Retracted: Multiscale fast correlation filtering tracking algorithm based on a feature fusion model

Y Chen, J Wang, S Liu, X Chen, J Xiong… - Concurrency and …, 2021 - Wiley Online Library
<i>Retracted:</i> Multiscale fast correlation filtering tracking algorithm based on a feature
fusion model Page 1 Received: 25 June 2019 Revised: 10 August 2019 Accepted: 26 August …

ECaD: Energy‐efficient routing in flying ad hoc networks

OS Oubbati, M Mozaffari, N Chaib… - International Journal …, 2019 - Wiley Online Library
Much progress can be expected in the domain of unmanned aerial vehicle (UAV)
communication by the next decade. The cooperation between multiple UAVs in the air …

[PDF][PDF] Idle slots skipped mechanism based tag identification algorithm with enhanced collision detection

J Su, R Xu, SM Yu, BW Wang, J Wang - KSII Transactions on Internet and …, 2020 - itiis.org
In this article, a new Aloha-based tag identification protocol is presented to improve the
reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) …