Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Holistic survey on energy aware routing techniques for IoT applications
MR Poornima, HS Vimala, J Shreyas - Journal of Network and Computer …, 2023 - Elsevier
Abstract Context: The Internet of Things (IoT) is a paradigm in which real-world things are
connected to the Internet for efficient processing, control, and communication without the …
connected to the Internet for efficient processing, control, and communication without the …
Secure and energy-efficient smart building architecture with emerging technology IoT
With the advent of the Internet-of-Things (IoT), it is considered to be one of the latest
innovations that offer interesting opportunities for different vertical industries. One of the most …
innovations that offer interesting opportunities for different vertical industries. One of the most …
[HTML][HTML] The rise of blockchain internet of things (biot): Secured, device-to-device architecture and simulation scenarios
Most Internet of Things (IoT) resources are exposed to security risks due to their essential
functionality. IoT devices, such as smartphones and tablets, have a limited network …
functionality. IoT devices, such as smartphones and tablets, have a limited network …
[HTML][HTML] Blockchain technology and artificial intelligence based decentralized access control model to enable secure interoperability for healthcare
Healthcare, one of the most important industries, is data-oriented, but most of the research in
this industry focuses on incorporating the internet of things (IoT) or connecting medical …
this industry focuses on incorporating the internet of things (IoT) or connecting medical …
[HTML][HTML] Blockchain-based model to improve the performance of the next-generation digital supply chain
In the era of the fourth industrial revolution, all aspects of the industrial domain are being
affected by emerging technologies. Digitalization of every process is taking place or under …
affected by emerging technologies. Digitalization of every process is taking place or under …
Energy‐efficient fog computing in Internet of Things based on Routing Protocol for Low‐Power and Lossy Network with Contiki
The traditional centralized cloud computing (CC) model faces a range of problems with the
exponential growth of the Internet of Things (IoT) applications, like high latency, reduced …
exponential growth of the Internet of Things (IoT) applications, like high latency, reduced …
Contiki Cooja Security Solution (CCSS) with IPv6 routing protocol for low-power and lossy networks (RPL) in Internet of Things applications
Everyone is aware that existing approaches to IoT networks have nothing to do with certain
security issues that may expose sensitive data to unauthorised user. Today, low-power and …
security issues that may expose sensitive data to unauthorised user. Today, low-power and …
Internet of things based stable increased-throughput multi-hop protocol for link efficiency (iot-simple) for health monitoring using wireless body area networks
AK Rana, S Sharma - International Journal of Sensors Wireless …, 2021 - benthamdirect.com
Aims: This study aimed to propose a routing protocol for IoT-based WBANs that is reliable,
power-efficient, and has a high throughput. Background: A variety of services and …
power-efficient, and has a high throughput. Background: A variety of services and …
A survey on blockchain technology supported approaches for healthcare system, open issues and challenges
In the last few years, technological development has multiplied. New technologies are
affecting almost every industry. One of these which noticed the abrupt change in their …
affecting almost every industry. One of these which noticed the abrupt change in their …
Various swarm optimization algorithms: Review, challenges, and opportunities
In various research areas there is a requirement for optimized results in various research-
oriented parameters. In steganography, the important task is to find out the areas, where we …
oriented parameters. In steganography, the important task is to find out the areas, where we …