[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020‏ - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …

Machine learning-based cloud IOT platform for intelligent tourism information services

F Bi, H Liu - EURASIP Journal on Wireless Communications and …, 2022‏ - Springer
Thanks to the continuous development of the tourism industry, the application of Internet of
things (IoT) begins to boom among modern tourists. Smart tourism utilizes Internet of things …

Image Intelligence in Cyber Security using Sensing System towards the Future Generation Intelligence

R Kumar, N Sharma, S Kumar - 2022 2nd International …, 2022‏ - ieeexplore.ieee.org
The fundamental target of tone map** is to duplicate the given scene or an image close to
the 64000 world brilliance coordinating the human read inside the show gadgets …

Home automation using IoT

S Tayyaba, SA Khan, MW Ashraf, VE Balas - Recent trends and advances …, 2020‏ - Springer
Application based communication and data transfer through the internet is one of the most
powerful and advanced methods. Internet facilitates the people to stay connected with each …

Internet of things architectural elements, challenges and future directions

R Kushwah, PK Batra, A Jain - 2020 6th International …, 2020‏ - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging paradigm that seamlessly integrates smart
devices, sensor nodes, network gateways, actuators, radio frequency identification and …

Numerical optimization of a fully cross-coupled rectifier circuit for wireless passive ultra low power sensor nodes

D Mair, M Ferdik, C Happ, M Renzler, T Ussmueller - Sensors, 2019‏ - mdpi.com
In the context of the Internet of Things, billions of devices—especially sensors—will be
linked together in the next few years. A core component of wireless passive sensor nodes is …

Image Processing with Intelligence System Using Sensing in Cyber Security

S Petikam, FDCD Sales, S Suma… - 2023 International …, 2023‏ - ieeexplore.ieee.org
The main goal of transmission map is to reproduce the provided picture or image as closely
as possible to the 3-billion world brightness while synchronising the human reader within …

Neurotrie: Deep Reinforcement Learning-based Fast Software IPv6 Lookup

H Chen, Y Yang, M Xu, Y Zhang… - 2022 IEEE 42nd …, 2022‏ - ieeexplore.ieee.org
IPv6 has shown notable growth in recent years, imposing the need for high-speed IPv6
lookup. As the forwarding rate of virtual switches continues increasing, software-based IPv6 …

Fast Software IPv6 Lookup With Neurotrie

Y Zhu, H Chen, Y Yang, M Xu, Y Zhang… - … /ACM Transactions on …, 2024‏ - ieeexplore.ieee.org
IPv6 has shown notable growth in recent years, imposing the need for high-speed IPv6
lookup. As the forwarding rate of virtual switches continues increasing, software-based IPv6 …

An edge computational offloading architecture for ultra-low latency in smart mobile devices

BK Osibo, Z **, T Ma, BD Marah, C Zhang, Y ** - Wireless Networks, 2022‏ - Springer
Computation offloading is a notable paradigm under Mobile Edge Computing (MEC) that
significantly improves the performance of Smart Mobile Devices (SMDs) through the …