Results (133)
Search Parameters:
Keyword: InternetDoubling the Number of Connected Devices in Narrow-band Internet of Things while Maintaining System Performance: An STC-based Approach
Narrow-band Internet of Things (NB-IoT) is a low-power wide-area network (LPWAN) method that was first launched by the 3rd generation partnership project (3GPP) Rel-13 with the purpose of enabling low-cost, low-power, and wide-area cellular connections for the Internet of Things (IoT). As the demand for over-the-air services grows and with the number of linked wireless…
Read MoreThe Influence Analysis of Internet Finance on China’s Banking Industry Development
This article presented an overview of the evolution of China’s internet financial industry, emphasizing the critical importance of fintech, a novel economic sector improving the efficiency of financial services through innovative technology applications. The systems referred to encompass those technologies, applications, and tools that enhance the efficiency and accessibility of financial services. The historical trajectory…
Read MoreExtraction of Psychological Symptoms and Instantaneous Respiratory Frequency as Indicators of Internet Addiction Using Rule-Based Machine Learning
Internet addiction (IA) has adverse effects on psychophysiological responses, interpersonal relationships, and academic and occupational performance. IA detection has received increasing attention. Although questionnaires enable long-term assessment (over 6 months) and physiological measurements to aid the short-term evaluation (over 2 min) of IA, the lack of algorithms results in an inability to detect IA in…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MorePrototype Design Internet of Things Based Waste Management Using Image Processing
Waste is currently a serious problem often found in rural areas, rural areas, and even industrial areas. Waste is a side effect of activities carried out by humans to meet social or industrial needs. Increasing human productivity will also increase the amount of waste produced. To overcome this, a sorting management system is needed. Good…
Read MoreSmart Ambulance: Speed Clearance in the Internet of Things paradigm using Voice Chat
In recent years, researchers have focused on the development of many applications of information and communication which could lead to enhance human life. The congestion and road traffic are one of the most problems facing the ambulance transportation to provide fast healthcare services for patients. In this work, a tracking and data transfer system has…
Read MoreApplication Layer Security Authentication Protocols for the Internet of Things: A Survey
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…
Read MoreSupporting Active Aging Through A Home Automation Infrastructure for Social Internet of Things
The number of smart devices inside the living environments grows more and more every day, and with it the need to interface them in order to share data and activate functions. Each day, new scenarios and new applications emerge to make our lives easier in many different contexts. The AAL SOCIALIZE project aims to create…
Read MoreThe Internet of Things ecosystem: the blockchain and data protection issues
The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreOptimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things
Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless…
Read MoreInternet of Things: An Evolution of Development and Research area topics
Internet of Things (IoT) is a hot topic in the Europe Union (EU). In the year of 2015 the EU established an Alliance of Internet of Things Innovation (AIOTI) and this alliance included the IoT European Research Cluster (IERC) on the Internet of Things in the work group 01. IERC was established in 2007 and…
Read MoreFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MorePrivate 5G MIMO for Cable TV IP Broadcasting
Private 5G utilization by cable TV is expected to be an alternative to wired services, especially for multi-dwelling units and rural communal TV receiving areas. On the other hand, the 100 MHz of the sub-6 frequency band for private 5G is not sufficient for cable TV services consisting of multi-channel broadcasting and Internet, and some…
Read MoreA Study of the Digital Health Management Needs of the Elderly
The purpose of this paper is to explore the feasibility and development trend of utilizing smart medical technology for chronic disease health management in older people in the context of ageing at home. As the ageing society intensifies, the elderly population faces multiple health challenges, especially the management of chronic diseases. This paper analyzes the…
Read MoreHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read MoreIoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring
Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…
Read MoreAutomated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC
Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…
Read MoreAn Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection
The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…
Read MoreEnhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data
The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…
Read MoreA Smart Farming Management System based on IoT Technologies for Sustainable Agriculture
Advances in Internet of Things (IoT) and wireless technologies are revolutionizing various sectors, including environment, education, healthcare, industry, etc. In the same dynamic, as the world population constantly evolves, solutions based on such technologies need to be proposed to improve the agricultural sector. Senegalese agriculture, primarily rain-fed and based on both cash crops and subsistence…
Read MoreOptimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data
Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…
Read MoreSocial Media Text Summarization: A Survey Towards a Transformer-based System Design
Daily life is characterized by a great explosion of abundance of information available on the internet and social media. Smart technology has radically changed our lives, giving a leading role to social media for communication, advertising, information and exchange of opinions. Managing this huge amount of data by humans is an almost impossible task. Adequacy…
Read MoreIoT System and Deep Learning Model to Predict Cardiovascular Disease Based on ECG Signal
In this work, our contribution will intervene to reduce the impact of noises on the ECG signals. Various ECG denoising approaches were tested to see how efficient they were in removing dominant noises that add to pure ECG signals. Due to different causes such as interference, muscular noise, body movement related to breathing, and so…
Read MoreDesign and Implementation of an Automated Medicinal-Pill Dispenser with Wireless and Cellular Connectivity
Medical adherence is a major concern globally and is increasing with improved access to medication. Unfortunately, patients taking multiple medications often struggle with confusion about when and how to take each medication. To address this issue, an inexpensive domestic device has been proposed to improve medication adherence. This device uses Wi-Fi and cellular Internet of…
Read More
