Design and implementation of quad-element super-wideband MIMO antenna for IoT applications

P Kumar, S Urooj, A Malibari - IEEE Access, 2020 - ieeexplore.ieee.org
In this article, a low-profile, compact, quad-port super-wideband (SWB) multiple-input–
multiple-output (MIMO) antenna is presented for the internet of things (IoT) applications. The …

Flexible V-shaped piezoelectric-triboelectric device for biomechanical energy harvesting and sensing

S Naval, NT Beigh, D Mukherjee, A Jain… - Journal of Physics D …, 2022 - iopscience.iop.org
The vast proliferation of wearables and smart sensing devices in the last decade has
created an immense demand for new and efficient powering solutions. The research focus …

Determinants of consumers' attitudes towards digital advertising–A meta-analytic comparison across time and touchpoints

H Lütjens, M Eisenbeiss, M Fiedler, T Bijmolt - Journal of Business …, 2022 - Elsevier
By means of a meta-analysis, we synthesize the findings of over two decades of research
from 88 empirical studies regarding four well established and theoretically rooted …

Integrated industrial reference architecture for smart healthcare in internet of things: a systematic investigation

AD Aguru, ES Babu, SR Nayak, A Sethy, A Verma - Algorithms, 2022 - mdpi.com
Internet of Things (IoT) is one of the efflorescing technologies of recent years with splendid
real-time applications in the fields of healthcare, agriculture, transportation, industry, and …

WITHDRAWN: An investigation of various applications and related security challenges of Internet of things

A Raghuvanshi, UK Singh, M Shuaib, S Alam - 2021 - Elsevier
WITHDRAWN: An investigation of various applications and related security challenges of
Internet of things - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …

Investigating the role of block chain to secure identity in IoT for industrial automation

D Uike, S Agarwalla, V Bansal… - … on System Modeling …, 2022 - ieeexplore.ieee.org
The information is accessible to everyone using a block chain-capable app. Each single set
of information that comes has its own block. When a blocks is loaded with information and …

A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

A Barnawi, S Gaba, A Alphy, A Jabbari… - Neural Computing and …, 2023 - Springer
The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in
the IoT surfaces. The deep leaning algorithms are competent for directing the sanctuary …

Energy-efficient opportunistic multi-carrier NOMA-based resource allocation for beyond 5G (B5G) networks

H Al-Obiedollah, HB Salameh, S Abdel-Razeq… - … Modelling Practice and …, 2022 - Elsevier
The interplay between the non-orthogonal multiple access (NOMA) and the opportunistic
cognitive radio (CR)-based orthogonal frequency multiple access (OFDMA) has been …

Development of a lightweight centralized authentication mechanism for the Internet of Things driven by fog

J Lansky, M Sadrishojaei, AM Rahmani, MH Malik… - Mathematics, 2022 - mdpi.com
The rapid development of technology has made the Internet of Things an integral element of
modern society. Modern Internet of Things' implementations often use Fog computing, an …

Quantitative analysis of the applied parts of Internet of Things technology in Iran: an opportunity for economic leapfrogging through technological development

M Fallah, ME Sadeghi, H Nozari - Science and technology policy …, 2021 - stpl.ristip.sharif.ir
IoT technology is one of long waves of technology that will act as a platform for countries to
rise or fall in the economic path. If countries and companies that take advantage of the …