Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Real Time Vehicle Status Monitoring under Moving Conditions Using a Low Power IoT System

    M. Vlachos1,*, R. Lopardo2, A. Amditis1

    Journal on Internet of Things, Vol.4, No.4, pp. 235-261, 2022, DOI:10.32604/jiot.2022.040820

    Abstract In the era of the Internet of Things (IoT), the ever-increasing number of devices connected to the IoT networks also increases the energy consumption on the edge. This is prohibitive since the devices living on the edge are generally resource constrained devices in terms of energy consumption and computational power. Thus, trying to tackle this issue, in this paper, a fully automated end-to-end IoT system for real time monitoring of the status of a moving vehicle is proposed. The IoT system consists mainly of three components: (1) the ultra-low power consumption Wireless Sensor Node (WSN), (2) the IoT gateway and… More >

  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Handover Scheme with Neighbor Beacon Frame Transmission

    Youngjun Kim1, Taekook Kim2, Hyungoo Choi1, Jinwoo Park1, Yeunwoong Kyung3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 193-204, 2023, DOI:10.32604/iasc.2023.032784

    Abstract Mobility support to change the connection from one access point (AP) to the next (i.e., handover) becomes one of the important issues in IEEE 802.11 wireless local area networks (WLANs). During handover, the channel scanning procedure, which aims to collect neighbor AP (NAP) information on all available channels, accounts for most of the delay time. To reduce the channel scanning procedure, a neighbor beacon frame transmission scheme (N-BTS) was proposed for a seamless handover. N-BTS can provide a seamless handover by removing the channel scanning procedure. However, N-BTS always requires operating overhead even if there are few mobile stations (MSs)… More >

  • Open Access

    ARTICLE

    An IoT-Aware System for Managing Patients’ Waiting Time Using Bluetooth Low-Energy Technology

    Reham Alabduljabbar*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 1-16, 2022, DOI:10.32604/csse.2022.018102

    Abstract It is a common observation that whenever patients arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, concerning health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology is presented to solve the problem. Recently, a technology-oriented method, the Internet of Things (IoT), has been gaining popularity in helping to solve some of the healthcare sector’s problems.… More >

  • Open Access

    ARTICLE

    A Position Self-Adaptive Method to Detect Fake Access Points

    Ping Lu1,2,*

    Journal of Quantum Computing, Vol.2, No.2, pp. 119-127, 2020, DOI:10.32604/jqc.2020.09433

    Abstract In recent years, with the maturity and popularity of Wi-Fi technology, wireless hotspots have been deployed on a large scale in public places. But at the same time, it brings many security issues that cannot be ignored. Among them, the fake access point attack is a very serious threat in wireless local area network. In this paper, we propose a method to detect fake access points in wireless local area network. First, our detection method is passive, which means there is almost no additional traffic will be generated during the program’s operation. Second, different from many existing methods, our method… More >

Displaying 1-10 on page 1 of 5. Per Page