[HTML][HTML] Delay-Aware resource allocation to increase efficiency over LTE network for M2M communications in a noisy channel

X Wang, RO Yahya - Journal of King Saud University-Computer and …, 2024 - Elsevier
Currently, the predominant source of Internet traffic stems from interpersonal user
interactions, commonly referred to as user-to-user or H. 2. H communications, facilitated …

Receive wireless sensor data through IoT gateway using web client based on border gateway protocol

M Yan - Heliyon, 2024 - cell.com
One of the significant topics in the field of the Internet of Things (IoT) pertains to the
interaction and information sharing among people. The utilization of the Border Gateway …

Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things

AMN Gilmolk, MR Aref - International Journal of Computational Intelligence …, 2024 - Springer
Recently, the field of lightweight cryptography (LWC) has emerged in response to the
security needs of low-cost, widely used technology. It is essential to implement an encryption …

A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection

Y Lin, X Xu, H Xu - Cluster Computing, 2024 - Springer
In an era dominated by network connectivity, the reliance on robust and secure networks
has become paramount. With the advent of 5G and the Internet of Things, networks are …

Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach

B Wen, S Li, H Motevalli - Cluster Computing, 2024 - Springer
In the domains of health and medicine, current technology facilitates the quicker
identification of effective solutions. Smart electronic health networks based on IoT–fog are …

Improving the Efficacy of Continuous Monitoring of Patients with Parkinson's Disease Through the Use of an Intelligent Computing Architecture Within the Medical …

R Ariana, MR Majma, SJ Jassbi - International Journal of Computational …, 2024 - Springer
Telemonitoring has grown in popularity these days, particularly to assist patients with
serious illnesses such as Parkinson's disease (PD). This study relies on the Daphnet …

Enhanced Transformer Protection Using Fuzzy-Logic-Integrated Differential Relays: A Comparative Study with Rule-based Methods

RIH Hussein, N Gökşenli, E Bektaş… - Journal of Robotics …, 2024 - journal.umy.ac.id
The power transformers are the important part of electrical networks where transformer
reliability and operational lifetime depends on sufficiently accurate and reliable protective …

A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems

H Huang, Y Wang, Y Cai, H Wang - Cluster Computing, 2024 - Springer
Cloud computing enables global access to tool-based IT services, accommodating a wide
range of applications across consumer, scientific, and commercial sectors, operating on a …

Detecting the penetration of malicious behavior in big data using hybrid algorithms

Y Wang, Y Shi - Signal, Image and Video Processing, 2024 - Springer
Abstract Information security must be maintained because the amount of data in the world
today is growing exponentially. The issues related to security are growing as big data usage …

Presenting a new method for optimal placement of reliability-based distributed generation units in the transmission system considering the demand response …

Y Chu, F Hu - Electrical Engineering, 2024 - Springer
Emerging technologies in power systems, such as distributed generation (DG), are a result
of society's growing need for dependable electrical power. Demand response (DR) …