Zobrazeno 1 - 10
of 1 202
pro vyhledávání: ''
Publikováno v:
IEEE Access, Vol 12, Pp 93568-93579 (2024)
The previous scheme used imitation learning by classification of branching or pruning, combined with Branch and Bound (B&B) algorithm to solve physical-layer-only joint optimal subcarrier and power allocation problem in the device-to-device communica
Externí odkaz:
https://doaj.org/article/d00e9718f68a42849eec57ebe66559c1
Publikováno v:
IEEE Access, Vol 12, Pp 90952-90970 (2024)
Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, low latency, and secure communication. The IPv6 over the TSCH mode of IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these
Externí odkaz:
https://doaj.org/article/36bacb41ad0242c9885bed65b7f7bac5
Autor:
Muhammad Hassan, Ali Hussein, Amr A. Nassr, Raid Karoumi, Usama M. Sayed, Mohamed Abdelraheem
Publikováno v:
IEEE Access, Vol 12, Pp 89628-89646 (2024)
In this paper, we propose the design, operation, and implementation of an Internet of Things-based hybrid structural health monitoring. This innovative system leverages the capabilities of both fog and cloud layers in computing and monitoring. The sy
Externí odkaz:
https://doaj.org/article/7e6e5c2523fb411ab07e385688a5a3e6
Autor:
Batyr Charyyev, Mehmet Hadi Gunes
Publikováno v:
IEEE Access, Vol 12, Pp 89467-89478 (2024)
Internet of Things (IoT) devices introduce new vulnerabilities to the network. These devices are relatively cheap, have simple design yet they can collect private user data, and be employed as botnets to conduct large-scale attacks. In general, IoT d
Externí odkaz:
https://doaj.org/article/c38f9ef58af04fcea7eafa67fcfc2562
Autor:
Faizan Ullah, Abdu Salam, Farhan Amin, Izaz Ahmad Khan, Jamal Ahmed, Shamzash Alam Zaib, Gyu Sang Choi
Publikováno v:
IEEE Access, Vol 12, Pp 87407-87419 (2024)
The Internet of Things (IoT) proliferation has brought unprecedented connectivity, introducing complex trust and reputation management challenges across vast, heterogeneous networks. This paper introduces the DeepTrust framework, a novel approach lev
Externí odkaz:
https://doaj.org/article/3df127c91d11415397cb22b878d0ddb5
Publikováno v:
IEEE Access, Vol 12, Pp 85681-85693 (2024)
With the advance of deep learning techniques, social robots can have more powerful perception and interaction capabilities. However, the problem of finding a socially aware standing location for the robot to join a conversation group is not well addr
Externí odkaz:
https://doaj.org/article/aa8fb3d0e51f425b9806aee5d24c5655
Publikováno v:
IEEE Access, Vol 12, Pp 84752-84762 (2024)
Cybersecurity in the Internet of Things (IoT) ecosystem is vital to protect sensitive data, stop unauthorized access, and mitigate the risk of disruptive cyberattacks. Cyberattack recognition utilizing an intrusion detection system (IDS) is a major i
Externí odkaz:
https://doaj.org/article/eca3a906d4d74d23a2f7b4654421e899
Publikováno v:
IEEE Access, Vol 12, Pp 83285-83298 (2024)
In the recent context of the emergence of smart cities, the massive amount of data generated by connected objects has led to unprecedented demands in terms of data transfer. The various constraints linked to their number, their characteristics, and t
Externí odkaz:
https://doaj.org/article/b154da2e599044f3bc77784a842d25c5
Publikováno v:
IEEE Journal of the Electron Devices Society, Vol 12, Pp 450-456 (2024)
Energy harvesters, such as photovoltaic cells, generate carriers in the deep substrate regions; these carriers can affect MOSFETs and deteriorate their performance or even cause malfunctioning. In this study, we discussed the effects of bulk carrier
Externí odkaz:
https://doaj.org/article/30423d6cac884c3681389cf5320003d5
Publikováno v:
IEEE Access, Vol 12, Pp 78549-78561 (2024)
The Internet of Things (IoT) revolutionizes connectivity, as IoT devices grow exponentially, vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the critical need for robust security measures, including encryption pr
Externí odkaz:
https://doaj.org/article/5d70ab2d916049809894e167e747a382