標(biāo)題: Titlebook: Emerging Technology Trends in Internet of Things and Computing; First International Panos Liatsis,Abir Hussain,Dhiya Al-Jumeily Conference [打印本頁(yè)] 作者: Scuttle 時(shí)間: 2025-3-21 18:03
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing影響因子(影響力)
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing影響因子(影響力)學(xué)科排名
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing被引頻次
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing被引頻次學(xué)科排名
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing年度引用
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing年度引用學(xué)科排名
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing讀者反饋
書(shū)目名稱Emerging Technology Trends in Internet of Things and Computing讀者反饋學(xué)科排名
作者: 武器 時(shí)間: 2025-3-21 22:41 作者: 諂媚于人 時(shí)間: 2025-3-22 03:09 作者: cochlea 時(shí)間: 2025-3-22 04:58
A Lightweight Algorithm to Protect the Web of Things in IOT contacts between devices and a huge volume of data. On the other hand, there are many security challenges to protect this information from risk exposure. It’s crucial to note that these devices are compact and use very little power. As a consequence, using several rounds of data encryption would be作者: accomplishment 時(shí)間: 2025-3-22 10:39
IoT Intrusion Detection Using Modified Random Forest Based on Double Feature Selection Methodsted entry and alteration. Intrusion Detection Systems (IDS) are techniques that can be used in information systems to monitor identified threats or anomalies. The challenge that arises is that the IDS should detect attacks on time in high-speed network traffic data. This paper proposed a modified ID作者: 因無(wú)茶而冷淡 時(shí)間: 2025-3-22 16:21
Network-Based Method for Dynamic Burden-Sharing in the Internet of Things (IoT)uting loads to processors is not an easy task to perform. In the IoT literature, many approaches have been suggested to come up with optimal burden-sharing. However, there still exists a limitation in providing simple, low-cost, and efficient approaches. Therefore, this paper proposes a network-base作者: 因無(wú)茶而冷淡 時(shí)間: 2025-3-22 18:50 作者: 小淡水魚(yú) 時(shí)間: 2025-3-22 21:43
Brain Tumours Classification Using Support Vector Machines Based on Feature Selection by Binary Cat also it has a major role in suggested computer systems for classification and segmentation of tumors due to the advancements in computer science and information technology. Researchers all over the world have worked hard to develop methods for diagnosing and classifying brain tumors. This paper pres作者: 繞著哥哥問(wèn) 時(shí)間: 2025-3-23 01:42
Early Depression Detection Using Electroencephalogram Signalsion with nervous system and some of them relate stress with the reduced brain activity within the left frontal lobe. Hence, an early depression detection system is an initiative to detect early depression. In this research, the detection of early depression was done using the EEG signal because the作者: 人充滿活力 時(shí)間: 2025-3-23 09:21 作者: 泰然自若 時(shí)間: 2025-3-23 12:31
Cardiac Arrhythmia Diagnosis via Multichannel Independent Component Analysis: An Approach Towards a rt‘s functioning to ensure healthy living. ECG signals provide details regarding the various forms of arrhythmias. However, owing to the complexities and non-linearity of ECG signals, it is impossible to examine these signals manually. Conventional approaches for specialist inspection of ECGs on pap作者: Diastole 時(shí)間: 2025-3-23 13:53 作者: syncope 時(shí)間: 2025-3-23 20:10
Automated Brain Tumor Segmentation and Classification Through MRI Imagess paper presents convolutional neural network method for segmentation and classification of brain tumors using magnetic resonance images. The proposed method has achieved an accuracy of 98.97%, specificity of 97.35%, sensitivity of 97%, precision of 97.90%, and F1-score of 96% for brain tumor segmen作者: 切割 時(shí)間: 2025-3-23 22:33 作者: goodwill 時(shí)間: 2025-3-24 06:21
Integration Femtocells Based on Hybrid Beamforming with Existing LTE Macro-cell for Improving Througs suffer from the Shannon limit. Integration of the key 5G technologies such as millimeter waves (mmWave), massive multiple-input multiple-output (Massive MIMO), and Small-Cells (SC) systems is to achieve the increase in the network throughput and capacity, as well as the enhancement of the spectral作者: Flagging 時(shí)間: 2025-3-24 10:18
Performance Evaluation of CoAP and MQTT_SN Protocols network. One of the most important requirements of a wireless sensor networks (WSN) is power efficiency because it depends on the life span of the batteries of sensor nodes. This paper resolves to evaluate the performance of application-layer IoT protocols such as CoAP (Constrained Application Prot作者: BIBLE 時(shí)間: 2025-3-24 14:05 作者: thwart 時(shí)間: 2025-3-24 15:58
Paul Muldoon: Expatriate Transnationalism, to conduct the simulation of the protocols and to collect the data of the nodes which was used to calculate the power consumption. Simulation Results show that CoAP is relatively more power efficient than MQTT_SN. It was also evaluated that the highest power consumption is happening at different power states for each protocol.作者: 連累 時(shí)間: 2025-3-24 20:39
Performance Evaluation of CoAP and MQTT_SN Protocols to conduct the simulation of the protocols and to collect the data of the nodes which was used to calculate the power consumption. Simulation Results show that CoAP is relatively more power efficient than MQTT_SN. It was also evaluated that the highest power consumption is happening at different power states for each protocol.作者: 傾聽(tīng) 時(shí)間: 2025-3-25 03:02 作者: Defraud 時(shí)間: 2025-3-25 04:18 作者: Common-Migraine 時(shí)間: 2025-3-25 11:21 作者: Coordinate 時(shí)間: 2025-3-25 14:08
https://doi.org/10.1007/978-3-030-54458-4tation. While on brain tumor classification, the proposed method shows accuracy 98.25%, sensitivity 98%, specificity 98.5%, precision 97.21% and F1-score 97%. The BRATS 2020 dataset has been utilized for training and testing the proposed method for brain tumor segmentation and classification.作者: Facet-Joints 時(shí)間: 2025-3-25 16:27 作者: Medicaid 時(shí)間: 2025-3-25 21:41 作者: patriot 時(shí)間: 2025-3-26 03:43 作者: 迫擊炮 時(shí)間: 2025-3-26 06:07
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/308463.jpg作者: plasma 時(shí)間: 2025-3-26 11:36
https://doi.org/10.1057/9781137349897er a network. The internet helps people live and work more smartly. Technology contributes to helping from environmental threatening such as flooding, and tornadoes which cost people‘s lives. In this matter, IoT technology comes up with a lot of solutions. One of major well-known technology is the L作者: 違反 時(shí)間: 2025-3-26 13:55 作者: 易碎 時(shí)間: 2025-3-26 18:04
North Korea in the New World Orderock that contains several transactions through consensus algorithms and is linked to the previous block using hash computation. It is expected to be integrated with smart technologies, such as the Internet of Things (IoT) to store and process data from sensors. However, IoT devices are resource-cons作者: cogent 時(shí)間: 2025-3-26 21:09 作者: 威脅你 時(shí)間: 2025-3-27 02:16
Nothing But Words? Rhetoric and Beyond,ted entry and alteration. Intrusion Detection Systems (IDS) are techniques that can be used in information systems to monitor identified threats or anomalies. The challenge that arises is that the IDS should detect attacks on time in high-speed network traffic data. This paper proposed a modified ID作者: Seizure 時(shí)間: 2025-3-27 05:52
https://doi.org/10.1007/978-94-009-1982-2uting loads to processors is not an easy task to perform. In the IoT literature, many approaches have been suggested to come up with optimal burden-sharing. However, there still exists a limitation in providing simple, low-cost, and efficient approaches. Therefore, this paper proposes a network-base作者: 強(qiáng)有力 時(shí)間: 2025-3-27 11:57 作者: accomplishment 時(shí)間: 2025-3-27 15:03 作者: 痛苦一生 時(shí)間: 2025-3-27 19:05 作者: arbovirus 時(shí)間: 2025-3-27 22:35 作者: Bombast 時(shí)間: 2025-3-28 03:42 作者: Altitude 時(shí)間: 2025-3-28 08:02
Northeast Asian Critical Security, and preventive measures. In most cases, anemia refers to malnutrition and is closely related to demographic and social factors. Previously, statistical methods were used to predict anemia among children and identify associated factors. It was concluded that this is not a good way. Following the suc作者: nonplus 時(shí)間: 2025-3-28 14:14
https://doi.org/10.1007/978-3-030-54458-4s paper presents convolutional neural network method for segmentation and classification of brain tumors using magnetic resonance images. The proposed method has achieved an accuracy of 98.97%, specificity of 97.35%, sensitivity of 97%, precision of 97.90%, and F1-score of 96% for brain tumor segmen作者: 輕觸 時(shí)間: 2025-3-28 18:28 作者: 傻 時(shí)間: 2025-3-28 22:23 作者: Venules 時(shí)間: 2025-3-28 23:50 作者: 胰臟 時(shí)間: 2025-3-29 03:40 作者: 注意 時(shí)間: 2025-3-29 08:23
978-3-030-97254-7Springer Nature Switzerland AG 2022作者: Graves’-disease 時(shí)間: 2025-3-29 11:49 作者: 曲解 時(shí)間: 2025-3-29 19:16 作者: 他日關(guān)稅重重 時(shí)間: 2025-3-29 20:09 作者: 屈尊 時(shí)間: 2025-3-30 03:47
North Korea in the New World Orderyers in permissioned mode with different features, namely: Common, Committee, Fog, Queen, and Cloud. A limited number of common, committee, and fog nodes are grouped. Each group has its DAG (named Cobweb ledger) based on uniform distribution. Common nodes send authenticated data with the public key 作者: 公式 時(shí)間: 2025-3-30 08:05 作者: Banquet 時(shí)間: 2025-3-30 09:12 作者: 做方舟 時(shí)間: 2025-3-30 14:04
https://doi.org/10.1007/978-94-009-1982-2ch other. The cost of accessing a node from another is assigned to the weight of the edge between the two nodes. The findings showed that the proposed method outperformed the benchmarking approaches in terms of missed deadline tasks. Moreover, the proposed method is easy to implement and does not ne作者: 舊石器時(shí)代 時(shí)間: 2025-3-30 16:56 作者: aggravate 時(shí)間: 2025-3-30 23:19 作者: hermitage 時(shí)間: 2025-3-31 01:15 作者: AGATE 時(shí)間: 2025-3-31 07:16 作者: Outshine 時(shí)間: 2025-3-31 11:37
Back to Keynesianism: Reforming the IMF method has a significant effect on the reliability and performance of ECG pattern recognition. This paper proposes new approaches and algorithms for pre-processing multi-channel ECG signals and neural networks for arrhythmia classification using independent component analysis (ICA) with two distinc作者: crescendo 時(shí)間: 2025-3-31 16:02 作者: incite 時(shí)間: 2025-3-31 20:38
Northern Ireland at the Crossroadshms in the literature. Also, it proposes the heterogeneous network that included femto-cells, based on a real channel model to analyze our algorithm and calculate the throughput in all aspects of the 5G network. The proposed HBF achieves spectral efficiency closer to fully digital precoding, meaning作者: 愛(ài)管閑事 時(shí)間: 2025-4-1 01:38 作者: 正論 時(shí)間: 2025-4-1 01:51
AGRIBOT: Energetic Agricultural Field Monitoring Robot Based on IoT Enabled Artificial Intelligence Identifier, Crop Leaf Image Accumulator, Rain Identification Sensor and Surrounding Temperature level Identification Sensor. These sensors are associated with the proposed agriBOT to make the robot as powerful and robust in association with Artificial Intelligence and Internet of Things (IoT) strat作者: 放逐 時(shí)間: 2025-4-1 08:49 作者: Chagrin 時(shí)間: 2025-4-1 14:07
A Lightweight Algorithm to Protect the Web of Things in IOTf the time spent encrypting and decrypting data. The stage of MixColumns has been replaced by simple SHIFT processes in the proposed algorithm. It took just 1–8 s from the starting of the sensors’ reading to the moment they were collected for the customer. The experimental results show that the modi作者: myelography 時(shí)間: 2025-4-1 15:55