A secure, reliable and low-cost distributed storage scheme based on blockchain and IPFS for firefighting IoT data

L Li, D Jin, T Zhang, N Li - IEEE Access, 2023 - ieeexplore.ieee.org
In the fire scene investigation, the firefighting Internet of Things (IoT) data is the key
electronic evidence for event analysis and responsibility determination. However, the …

Cybersecurity challenges in IoT-based smart renewable energy

A Rekeraho, DT Cotfas, PA Cotfas, TC Bălan… - International Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) makes it possible to collect data from, and issue
commands to, devices via the Internet, eliminating the need for humans in the process while …

Implementation of IoT in Agriculture: A Scientific Approach for Smart Irrigation

V Viswanatha, A Kumari… - 2022 IEEE 2nd Mysore …, 2022 - ieeexplore.ieee.org
Digital technologies empower the transformation into data-driven, intelligent, agile, and
autonomous farm operations and are typically considered a key to addressing the grand …

[图书][B] Transformasi Digital

E Erwin, AW Pasaribu, NJA Novel, AR Thaha… - 2023 - books.google.com
Buku" Transformasi Digital" adalah sebuah buku yang memberikan wawasan mendalam
tentang perubahan dan adaptasi bisnis dalam era digital. Buku ini ditulis untuk membantu …

[HTML][HTML] Recency, Frequency, Monetary Value, Clustering, and Internal and External Indices for Customer Segmentation from Retail Data

HJ Wilbert, AF Hoppe, A Sartori, SF Stefenon, LA Silva - Algorithms, 2023 - mdpi.com
While there are several ways to identify customer behaviors, few extract this value from
information already in a database, much less extract relevant characteristics. This paper …

Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy

R Devendiran, AV Turukmane - Expert Systems with Applications, 2024 - Elsevier
Network intrusion is a huge harmful activity to the privacy of the data sharing network. The
activity will result in a cyber-attack, which causes damage to the system as well as the user's …

Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques

K Moghaddasi, M Masdari - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) presents complex challenges in task offloading,
especially within Mobile Edge Computing (MEC) environments and under conditions of data …

An energy-aware IoT routing approach based on a swarm optimization algorithm and a clustering technique

M Sadrishojaei, NJ Navimipour, M Reshadi… - Wireless Personal …, 2022 - Springer
Abstract The Internet of Things (IoT) comprises many nodes dispersed around a particular
target region, and it has lately been applied in a variety of sectors such as smart cities …

[图书][B] Pemasaran Digital di Era Society 5.0: Transformasi Bisnis di Dunia Digital

I Ifadhila, AY Rukmana, E Erwin, LPRA Ratnaningrum… - 2024 - books.google.com
Buku" Pemasaran Digital di Era Society 5.0: Transformasi Bisnis di Dunia Digital"
menghadirkan pandangan holistik tentang bagaimana revolusi digital telah mengubah …

Efficient blockchain-based mutual authentication and session key agreement for cross-domain IIoT

J Cui, Y Zhu, H Zhong, Q Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Several studies have introduced edge computing and blockchain into the Industrial Internet
of Things (IIoT) to satisfy the requirements of delay-sensitive applications and support cross …