-
1341
Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures
Published 2025-01-01“…This possibility offers exciting opportunities for Internet of Things (IoT) systems, but it also introduces unprecedented threats to the security and privacy of data, devices, and systems. …”
Get full text
Article -
1342
From Data to Decisions: A Smart IoT and Cloud Approach to Environmental Monitoring
Published 2025-01-01“…In this project, we present a smart environmental monitoring system that leverages IoT (Internet of Things) technology and data analytics to monitor temperature and humidity levels in real-time. …”
Get full text
Article -
1343
Dynamic Targets Occupancy Status Detection Utilizing mmWave Radar Sensor and Ensemble Machine Learning
Published 2024-01-01“…Rapid advancements in communication technologies in the Internet of Things (IoT) domain have had an impact on the application of positioning technology across multiple domains. …”
Get full text
Article -
1344
Long-Distance Passive Sensing Tag Design Based on Multi-Source Energy Harvesting and Reflection Amplification
Published 2024-12-01“…Additionally, the communication range of existing passive sensor tags remains short, which challenges their suitability for evolving Internet of Things (IoT) applications. This paper, therefore, presents a long-distance passive RFID sensing tag that integrates multi-source energy harvesting and reflection amplification. …”
Get full text
Article -
1345
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01“…The Internet of Things (IoT) is a developing technology and its range of applications is satisfying among numerous consumers, as it makes everything very simple. …”
Get full text
Article -
1346
IoT Network Anomaly Detection in Smart Homes Using Machine Learning
Published 2023-01-01“…In this modern age of technology, the Internet of Things has covered all aspects of life including smart situations, smart homes, and smart spaces. …”
Get full text
Article -
1347
Specialized Scalar and SIMD Instructions for Error Correction Codes Decoding on RISC-V Processors
Published 2025-01-01“…The rapid deployment of Internet-of-Things (IoT) devices for a few years has been impressive, and the progressive deployment of 5G will accelerate things even further. …”
Get full text
Article -
1348
Metamorphosis of the Identity of the Human Сompleted: from Digital Donor to Digital Centaur
Published 2025-01-01“…Smartphones, computers, the Internet of Things, and AI assistants, which form an integral technosystem that mediates the everyday life of man, are complex cultural tools that become his complements and extensions – part of the personality. …”
Get full text
Article -
1349
Applications of unmanned vehicle systems for multi-spatial scale monitoring and management of aquatic ecosystems: A review
Published 2025-03-01“…The systematic analysis highlights the gap in UVS applications for multi-spatial scale monitoring and reveals significant opportunities for integrating UVS with Artificial Intelligence (AI), machine learning, and Internet of Things (IoT) technologies, which are improving UVS integration, security, and efficiency, and enabling better resource management and navigation accuracy. …”
Get full text
Article -
1350
Payload State Prediction Based on Real-Time IoT Network Traffic Using Hierarchical Clustering with Iterative Optimization
Published 2024-12-01“…IoT (Internet of Things) networks are vulnerable to network viruses and botnets, while facing serious network security issues. …”
Get full text
Article -
1351
Evaluation of Machine Learning Algorithms for NB-IoT Module Energy Consumption Estimation Based on Radio Channel Quality
Published 2025-01-01“…In this study, we propose a method to estimate energy consumption in battery-powered Narrowband Internet of Things (NB-IoT) devices using the statistical data available from the NB-IoT modem, thereby circumventing the need for additional circuitry to measure battery voltage or current consumption. …”
Get full text
Article -
1352
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01“…In this article, we considered a typical architecture for smart homes based on the Internet of Things (IoT) and studied various recent authentication protocols presented for this scenario. …”
Get full text
Article -
1353
The Impact of Logistics and Key Macroeconomic Indicators on the Development of the Startup Ecosystem in Europe
Published 2024-12-01“…Innovative technologies like the Internet of Things (IoT) enhance supply chain visibility and efficiency, while warehouse automation and big data analytics streamline operations. …”
Get full text
Article -
1354
A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture
Published 2025-01-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has brought about a profound transformation in our daily lives and work environments. …”
Get full text
Article -
1355
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
1356
Management of Sustainable Development of the Fuel and Energy Complex of the Regional Economic System Based on Digital Technologies
Published 2024-12-01“…Features of the new approach are: 1) transition from public administration to corporate governance; 2) reliance on digital technologies in management; 3) flexible use of digital technologies in management, which involves the limited and careful use of controversial technologies (geographic information systems, Internet of things, cloud services and artificial intelligence) and the expansion of the use of key technologies that positively affect the sustainability of the fuel and energy complex in the regional economy of Russia: ERP systems, large data and digital platforms. …”
Get full text
Article -
1357
Blockchain oracles for decentralized agricultural insurance using trusted IoT data
Published 2025-01-01“…A mechanism called oracle is required for the trusted access of agricultural risk factor data to smart contracts from external sources such as Internet of Things (IoT) devices, web services and databases. …”
Get full text
Article -
1358
Graphene/TiO<sub>2</sub> Heterostructure Integrated with a Micro-Lightplate for Low-Power NO<sub>2</sub> Gas Detection
Published 2025-01-01“…Low-power gas sensors that can be used in IoT (Internet of Things) systems, consumer devices, and point-of-care devices will enable new applications in environmental monitoring and health protection. …”
Get full text
Article -
1359
Towards last-mile connectivity in 6G-IoT: An integrated MIMO-FSO communication system and FBG sensors under atmospheric attenuations, strain and temperature effects
Published 2025-03-01“…Free-space optical (FSO) communication is an advanced wireless optical communication technology that provides high-speed data services for 6th-generation wireless communication and Internet of Things (IoT) networks. In light of developing a 6G IoT network in an open environment, this paper analyses the impact of temperature and strain on FSO communication links using Fiber Bragg Grating (FBG) sensors. …”
Get full text
Article -
1360
Enhancing Hajj pilgrimage experience and crowd management through Hajj-related keywords-based chipless RFID tags
Published 2025-04-01“…The integration of proposed chipless RFID technology with Hajj-related keywords can improve pilgrimage experiences with enhanced crowd management using an integrated wayfinding system based on the Internet of Things (IoT) as well as the preservation of historical and cultural heritage.…”
Get full text
Article