Search
Now showing items 31-39 of 39
Wireless Power Transmission for the Internet of Things (IoT)
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In some cases, long battery life may be essential to IoT devices, and early failures of actuators and sensors because of the rapid discharging of battery may lead to unacceptably high replacement costs. Critical to the ...
Generating Images from Arabic Story-Text using Scene Graph
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, we propose a new approach to generate descriptive images from simple Arabic text of stories for children to build a flexible and rich multimedia repository. To make it successful, we need to transform the ...
An image steganography approach based on k-least significant bits (k-LSB)
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Image steganography is the operation of hiding a message into a cover image. the message can be text, codes, or image. Hiding an image into another is the proposed approach in this paper. Based on LSB coding, a k-LSB-based ...
Detecting anomalies within smart buildings using do-it-yourself internet of things
(
Springer
, 2022 , Article)
Detecting anomalies at the time of happening is vital in environments like buildings and homes to identify potential cyber-attacks. This paper discussed the various mechanisms to detect anomalies as soon as they occur. We ...
A survey of blockchain enabled cyber-physical systems
(
MDPI AG
, 2020 , Article Review)
Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
RL-Assisted Energy-Aware User-Edge Association for IoT-based Hierarchical Federated Learning
(2022 , Conference Paper)
The extremely heavy global reliance on IoT devices is causing enormous amounts of data to be gathered and shared in IoT networks. Such data need to efficiently be used in training and deploying of powerful artificially ...
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML
(
Elsevier
, 2022 , Article Review)
Internet of Medical Things (IoMT) supports traditional healthcare systems by providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It enables the development of smart hardware as ...
Neighbourhood oriented TDMA scheme for the internet of things-enabled remote sensing
(
Taylor and Francis Ltd.
, 2023 , Article)
Throughout the world, Internet of Things (IoT) have been used in different application areas to assist human beings in numerous activities such as smart buildings and cities via remote sensing-enabled techniques. However, ...