Search
Search Results
-
Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN
Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...
-
-
-
A novel PLS technique for secure ESM based MIMO systems
Multiple-input multiple-output systems with spatial modulation has evolved into an energy efficient and less complex wireless transmission system due...
-
The impact of supply chain digitalization on supply chain performance: a moderated mediation model
Despite extensive attention that researchers and practitioners have paid to supply chain digitalization, our understanding of how to leverage supply...
-
Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model
In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...
-
Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse
There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...
-
DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning
Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D...
-
A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes
Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...
-
An anonymous broadcasting system with accountability based on group signatures
Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the...
-
Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset
As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as...
-
Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering
We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality...
-
Statistical analysis and characterization of signaling and user traffic of a commercial multi-band LTE system
The fourth-generation (4 G) cellular network is currently the dominant mobile technology used worldwide. The analysis of the network behavior can...
-
IoT traffic management using deep learning based on osmotic cloud to edge computing
IoT is critical in many application areas, such as smart cities, health care, and surveillance systems. Each application has its own QoS...
-
Application of Deep Learning in the Classification of Maritime Safety Information
Maritime safety information (MSI) refers to urgent information concerning navigation warnings, weather warnings, weather forecasts, and other...
-
LoRa interference issues and solution approaches in dense IoT networks: a review
Low Power Wide Area Networks (LPWAN) are prominent option of wireless communication technology for dense Internet of Things (IoT) applications. With...
-
Making It Possible for the Auditing of AI: A Systematic Review of AI Audits and AI Auditability
Artificial intelligence (AI) technologies have become the key driver of innovation in society. However, numerous vulnerabilities of AI systems can...