بحث بسيط
السجلات المعروضة 241 -- 250 من 396
An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ...
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ...
A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting ...
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users with Imperfect CSI
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this paper, we propose, an energy-efficient resource allocation scheme for simultaneous wireless information and power transfer (SWIPT)-Non-orthogonal multiple access (NOMA) based femtocell users with imperfect channel ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Image-based body mass prediction of heifers using deep neural networks
(
Academic Press
, 2021 , Article)
Manual weighing of heifers is time-consuming, labour-intensive, expensive, and can be dangerous and risky for both humans and animals because it requires the animal to be stationary. To overcome this problem, automated ...
A Firewall Policy Anomaly Detection Framework for Reliable Network Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls. In the case of so-called packet-filtering ...
Deep learning-based multi-task prediction system for plant disease and species detection
(
Elsevier
, 2022 , Article)
The manual prediction of plant species and plant diseases is expensive, time-consuming, and requires expertise that is not always available. Automated approaches, including machine learning and deep learning, are increasingly ...
Product failure detection for production lines using a data-driven model
(
Elsevier
, 2022 , Article)
For a healthy production line, it is essential to ensure a low failure rate of products. Product quality in production lines can be inspected using several techniques at the end of a production process, including a manual ...