Blockchain applications in sustainable smart cities
Sustainable smart cities aim to optimize projected complexities, costs, and environmental
challenges accompanied by growing urbanization. The fundamental objectives of …
challenges accompanied by growing urbanization. The fundamental objectives of …
Distributed intelligence for IoT-based smart cities: a survey
The remarkable miniaturization of Internet of Things (IoT)-based systems and the rise of
distributed intelligence are promising research paradigms in the design of smart cities. IoT …
distributed intelligence are promising research paradigms in the design of smart cities. IoT …
A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy
L **a, DT Semirumi, R Rezaei - Sustainable Cities and Society, 2023 - Elsevier
With the increasing use of artificial intelligence (AI) and the Internet of Things (IoTs), it is
crucial to acknowledge the potential security and privacy issues that arise from these …
crucial to acknowledge the potential security and privacy issues that arise from these …
Intelligent energy management with iot framework in smart cities using intelligent analysis: An application of machine learning methods for complex networks and …
M Nikpour, PB Yousefi, H Jafarzadeh, K Danesh… - Journal of Network and …, 2025 - Elsevier
This study addresses the growing challenges of energy consumption and the depletion of
energy resources, particularly in the context of smart buildings. As the demand for energy …
energy resources, particularly in the context of smart buildings. As the demand for energy …
An Optimized Bio-inspired Localization Routing Technique for Sustainable IIoT Networks & Green Cities
Abstract The industrial Internet of Things (IIoTs) network life is shortened due to sensor node
(SN) energy limitations and computational capability. As a result, optimum node location …
(SN) energy limitations and computational capability. As a result, optimum node location …
An opportunistic energy‐efficient dynamic self‐configuration clustering algorithm in WSN‐based IoT networks
The demand for the Internet of Things (IoT) has significantly increased in the current
scenario; specific sectors that require IoT include industrial automation, home control, health …
scenario; specific sectors that require IoT include industrial automation, home control, health …
Applicability of UAVs in detecting and monitoring burning residue of paddy crops with IoT Integration: A step towards greener environment
A Sharma, PK Singh - Computers & Industrial Engineering, 2023 - Elsevier
The disposal of paddy-based residue in some parts of Indian north-western states,
particularly in Punjab and Haryana, has emerged as a significant issue, leading farmers to …
particularly in Punjab and Haryana, has emerged as a significant issue, leading farmers to …
[HTML][HTML] An intelligent fl-based vehicle route optimization protocol for green and sustainable iot connected iov
Abstract The intelligent Internet of Vehicles (IoV) provides superior results in effectively
addressing complex transportation challenges. Predicting vehicle traffic, crashes, demand …
addressing complex transportation challenges. Predicting vehicle traffic, crashes, demand …
Health-care monitoring of patient using cnn based model in internet of things
BD Parameshachari, KL Hemalatha… - 2023 International …, 2023 - ieeexplore.ieee.org
There is rising public concern about exposure to radiofrequency (RF) electromagnetic fields
(EMF) as more and more wireless communications become concentrated in everyday living …
(EMF) as more and more wireless communications become concentrated in everyday living …
[HTML][HTML] A computer-aided feature-based encryption model with concealed access structure for medical Internet of Things
One of the Internet of Things (IoT) security issues is the secure sharing and granular
management of data access. This study recommends a feature-based encryption scheme …
management of data access. This study recommends a feature-based encryption scheme …