Search
Now showing items 1-10 of 20836
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
Big data velocity management-from stream to warehouse via high performance memory optimized index join
(
IEEE
, 2020 , Article)
Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ...
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
(
IEEE
, 2020 , Article)
White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ...
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...
The Association between Methionine Intake and Diabetes in Chinese Adults-Results from the China Health and Nutrition Survey
(
MDPI
, 2022 , Article)
This study aimed to evaluate the association between methionine intake and diabetes prevalence in Chinese adults and explore whether the association was source-specific. Data from 12,849 adults aged ≥20 years old were used ...
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
(
IEEE
, 2020 , Article)
Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ...
Blockchain-Based Automated System for Identification and Storage of Networks
(
Hindawi
, 2021 , Article)
Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ...
Robust event-based non-intrusive appliance recognition using multi-scale wavelet packet tree and ensemble bagging tree
(
Elsevier
, 2020 , Article)
Providing the user with appliance-level consumption data is the core of each energy efficiency system. To that end, non-intrusive load monitoring is employed for extracting appliance specific consumption data at a low cost ...
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
(
Elsevier
, 2021 , Article)
Non-intrusive load monitoring (NILM) is a key cost-effective technology for monitoring power consumption and contributing to several challenges encountered when transiting to an efficient, sustainable, and competitive ...
Effective non-intrusive load monitoring of buildings based on a novel multi-descriptor fusion with dimensionality reduction
(
Elsevier
, 2020 , Article)
Recently, a growing interest has been dedicated towards developing and implementing low-cost energy efficiency solutions in buildings. Accordingly, non-intrusive load monitoring has been investigated in various academic ...