-
781
Fault-Tolerant Control Strategy for Neutral-Point-Clamped Three-Level Inverter
Published 2018-01-01Get full text
Article -
782
Research on PCB defect detection algorithm based on LPCB-YOLO
Published 2025-01-01Get full text
Article -
783
Exploring the vulnerability in the inference phase of advanced persistent threats
Published 2022-03-01“…In recent years, the Internet of Things has been widely used in modern life. …”
Get full text
Article -
784
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01“… The Internet of Things (IoT) encompasses a network of different devices, both stationary and mobile, that may interact with the physical world. …”
Get full text
Article -
785
Salt and Pepper Noise Removal with Noise Detection and a Patch-Based Sparse Representation
Published 2014-01-01Get full text
Article -
786
Detection and identification technology of rotor unmanned aerial vehicles in 5G scene
Published 2019-06-01“…In the 5G era, integration between different networks is required to realize a new world of Internet of things, the most typical model is Space–Air–Ground Internet of things. …”
Get full text
Article -
787
Research on the NB-IoT Random Access in LEO Satellite IoT
Published 2021-12-01“…Narrowband internet of things (NB-IoT) technology is widely used in data communications for a large number of low-speed and low-power devices, but it is diff cult to provide services for remote areas that cannot be covered by terrestrial networks.With its global coverage and low cost, the LEO satellite constellation can supplement and expand the terrestrial NB-IoT infrastructure, providing an eff ective solution for the space-based internet of things.Facing the application requirements of space-based internet of things, on the basis of reviewing the NB-IoT system architecture, the challenges of channel environment high dynamic delay and frequency off set faced by the application of NB-IoT technology in the LEO satellite constellation scenario were analyzed.For the uplink random access process, an eff ective user detection and timing synchronization method was designed, which had the advantages of high performance and low complexity, and provided an eff cient receiving method for the LEO satellite NB-IoT uplink random access synchronization.…”
Get full text
Article -
788
Fuzzy Pruning Based LS-SVM Modeling Development for a Fermentation Process
Published 2014-01-01Get full text
Article -
789
An Improved Recursive ARIMA Method with Recurrent Process for Remaining Useful Life Estimation of Bearings
Published 2022-01-01Get full text
Article -
790
VECTOR: Velocity-Enhanced GRU Neural Network for Real-Time 3D UAV Trajectory Prediction
Published 2024-12-01Get full text
Article -
791
-
792
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01“…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
Get full text
Article -
793
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…The proposed scheme ensures that even if the stakeholder’s device or the Internet of Things device is attacked, the system remains secure.…”
Get full text
Article -
794
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“… Kondisi Internet of Things saat ini yang cenderung tanpa menggunakan fitur keamanan dapat menjadi tantangan untuk realisasi Internet of things terutama di bidang privasi dan kerahasiaan data, khususnya pada modul sensorik berdaya rendah yaitu Bluetooth Low Energy. …”
Get full text
Article -
795
Model Predictive Control for Continuous-Time Singular Jump Systems with Incomplete Transition Rates
Published 2015-01-01Get full text
Article -
796
IoT in Urban Traffic Prediction Development Case Studies and Future Trends
Published 2025-01-01“…This paper first briefly summarizes the development process of using the Internet of Things (IoT) to calculate future road traffic. …”
Get full text
Article -
797
-
798
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. …”
Get full text
Article -
799
Secret sharing-based authentication and key agreement protocol for machine-type communications
Published 2019-04-01“…One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. …”
Get full text
Article -
800
An IoT and Machine Learning-Based Model to Monitor Perishable Food towards Improving Food Safety and Quality
Published 2022-01-01“…This article describes a technique for monitoring perishable goods that is based on the Internet of Things and machine learning. Pictures are recorded using high-resolution cameras in this suggested architecture, and then these images are sent to a cloud server using Internet of Things devices. …”
Get full text
Article