Blockchain-based systems and applications: a survey
Currently, many efforts have been done towards secure data privacy protection and reliable
information trace, however the conventional solutions are still vulnerable to information loss …
information trace, however the conventional solutions are still vulnerable to information loss …
[PDF][PDF] TinyML-Based Classification in an ECG Monitoring Embedded System
Recently, the development of the Internet of Things (IoT) has enabled continuous and
personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification …
personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification …
Block5GIntell: Blockchain for AI-enabled 5G networks
Nowadays, 5G network is considered to be one of the main pillars of various industries,
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …
including the Internet of Things (IoT), smart cities, virtual reality, and many more. Unlike …
Parameterized algorithms of fundamental NP-hard problems: a survey
Parameterized computation theory has developed rapidly over the last two decades. In
theoretical computer science, it has attracted considerable attention for its theoretical value …
theoretical computer science, it has attracted considerable attention for its theoretical value …
[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.
JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
When sensor-cloud meets mobile edge computing
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing.
The emergence of sensor-clouds has greatly enhanced the computing power and storage …
The emergence of sensor-clouds has greatly enhanced the computing power and storage …
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost
D Tang, L Tang, R Dai, J Chen, X Li… - Future Generation …, 2020 - Elsevier
A low-rate denial of service (LDoS) attack is a precise network attack that aims at reducing
the quality of the network service. Many networks do not have an effective mechanism for …
the quality of the network service. Many networks do not have an effective mechanism for …
Retracted: Multiscale fast correlation filtering tracking algorithm based on a feature fusion model
Y Chen, J Wang, S Liu, X Chen, J Xiong… - Concurrency and …, 2021 - Wiley Online Library
<i>Retracted:</i> Multiscale fast correlation filtering tracking algorithm based on a feature
fusion model Page 1 Received: 25 June 2019 Revised: 10 August 2019 Accepted: 26 August …
fusion model Page 1 Received: 25 June 2019 Revised: 10 August 2019 Accepted: 26 August …
ECaD: Energy‐efficient routing in flying ad hoc networks
Much progress can be expected in the domain of unmanned aerial vehicle (UAV)
communication by the next decade. The cooperation between multiple UAVs in the air …
communication by the next decade. The cooperation between multiple UAVs in the air …
[PDF][PDF] Idle slots skipped mechanism based tag identification algorithm with enhanced collision detection
J Su, R Xu, SM Yu, BW Wang, J Wang - KSII Transactions on Internet and …, 2020 - itiis.org
In this article, a new Aloha-based tag identification protocol is presented to improve the
reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) …
reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) …