To see the other types of publications on this topic, follow the link: IOTU.

Journal articles on the topic 'IOTU'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IOTU.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Londero, Francesco, Riccardo Pravisani, William Grossi, et al. "VATS localization of subdiaphragmatic nodule with IOTU and resection with high-energy device." ASVIDE 12 (June 2025): 99. https://doi.org/10.21037/asvide.2025.099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Galimberti, Andrea, Martina Spada, Danilo Russo, et al. "Integrated Operational Taxonomic Units (IOTUs) in Echolocating Bats: A Bridge between Molecular and Traditional Taxonomy." PLoS ONE 7, no. 6 (2012): e40122. https://doi.org/10.5281/zenodo.13484858.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Background: Nowadays, molecular techniques are widespread tools for the identification of biological entities. However, until very few years ago, their application to taxonomy provoked intense debates between traditional and molecular taxonomists. To prevent every kind of disagreement, it is essential to standardize taxonomic definitions. Along these lines, we introduced the concept of Integrated Operational Taxonomic Unit (IOTU). IOTUs come from the concept of Operational Taxonomic Unit (OTU) and paralleled the Molecular Operational Taxonomic
APA, Harvard, Vancouver, ISO, and other styles
3

Galimberti, Andrea, Martina Spada, Danilo Russo, et al. "Integrated Operational Taxonomic Units (IOTUs) in Echolocating Bats: A Bridge between Molecular and Traditional Taxonomy." PLoS ONE 7, no. 6 (2012): e40122. https://doi.org/10.5281/zenodo.13484858.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Background: Nowadays, molecular techniques are widespread tools for the identification of biological entities. However, until very few years ago, their application to taxonomy provoked intense debates between traditional and molecular taxonomists. To prevent every kind of disagreement, it is essential to standardize taxonomic definitions. Along these lines, we introduced the concept of Integrated Operational Taxonomic Unit (IOTU). IOTUs come from the concept of Operational Taxonomic Unit (OTU) and paralleled the Molecular Operational Taxonomic
APA, Harvard, Vancouver, ISO, and other styles
4

Galimberti, Andrea, Martina Spada, Danilo Russo, et al. "Integrated Operational Taxonomic Units (IOTUs) in Echolocating Bats: A Bridge between Molecular and Traditional Taxonomy." PLoS ONE 7, no. 6 (2012): e40122. https://doi.org/10.5281/zenodo.13484858.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Background: Nowadays, molecular techniques are widespread tools for the identification of biological entities. However, until very few years ago, their application to taxonomy provoked intense debates between traditional and molecular taxonomists. To prevent every kind of disagreement, it is essential to standardize taxonomic definitions. Along these lines, we introduced the concept of Integrated Operational Taxonomic Unit (IOTU). IOTUs come from the concept of Operational Taxonomic Unit (OTU) and paralleled the Molecular Operational Taxonomic
APA, Harvard, Vancouver, ISO, and other styles
5

Galimberti, Andrea, Martina Spada, Danilo Russo, et al. "Integrated Operational Taxonomic Units (IOTUs) in Echolocating Bats: A Bridge between Molecular and Traditional Taxonomy." PLoS ONE 7, no. 6 (2012): e40122. https://doi.org/10.5281/zenodo.13484858.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Background: Nowadays, molecular techniques are widespread tools for the identification of biological entities. However, until very few years ago, their application to taxonomy provoked intense debates between traditional and molecular taxonomists. To prevent every kind of disagreement, it is essential to standardize taxonomic definitions. Along these lines, we introduced the concept of Integrated Operational Taxonomic Unit (IOTU). IOTUs come from the concept of Operational Taxonomic Unit (OTU) and paralleled the Molecular Operational Taxonomic
APA, Harvard, Vancouver, ISO, and other styles
6

Osman, Radwa Ahmed, Sherine Nagy Saleh, and Yasmine N. M. Saleh. "A Novel Interference Avoidance Based on a Distributed Deep Learning Model for 5G-Enabled IoT." Sensors 21, no. 19 (2021): 6555. http://dx.doi.org/10.3390/s21196555.

Full text
Abstract:
The co-existence of fifth-generation (5G) and Internet-of-Things (IoT) has become inevitable in many applications since 5G networks have created steadier connections and operate more reliably, which is extremely important for IoT communication. During transmission, IoT devices (IoTDs) communicate with IoT Gateway (IoTG), whereas in 5G networks, cellular users equipment (CUE) may communicate with any destination (D) whether it is a base station (BS) or other CUE, which is known as device-to-device (D2D) communication. One of the challenges that face 5G and IoT is interference. Interference may
APA, Harvard, Vancouver, ISO, and other styles
7

Sedi Nzakuna, Pierre, Vincenzo Paciello, Aimé Lay-Ekuakille, Angelo Kuti Lusala, Salvatore Dello Iacono, and Antonio Pietrosanto. "From IOTA Tangle 2.0 to Rebased: A Comparative Analysis of Decentralization, Scalability, and Suitability for IoT Applications." Sensors 25, no. 11 (2025): 3408. https://doi.org/10.3390/s25113408.

Full text
Abstract:
The Internet of Things (IoT) demands scalable, secure, and feeless distributed ledger technologies (DLTs) to enable seamless machine-to-machine transactions. The IOTA DLT was developed to fulfill this vision through its feeless Directed Acyclic Graph (DAG) named the Tangle, whose announced upgrade to IOTA 2.0 promised feeless microtransactions and coordinator-free (Coordicide) decentralization via a Nakamoto Consensus mechanism and a Mana anti-spam system. However, its delayed decentralization and scalability limitations hindered ecosystem growth and practical IoT adoption, leading to a new le
APA, Harvard, Vancouver, ISO, and other styles
8

Ramírez-Gordillo, Tamai, Antonio Maciá-Lillo, Francisco A. Pujol, Nahuel García-D’Urso, Jorge Azorín-López, and Higinio Mora. "Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology." Future Internet 17, no. 1 (2025): 49. https://doi.org/10.3390/fi17010049.

Full text
Abstract:
The exponential growth of the Internet of Things (IoT) necessitates robust, scalable, and secure identity management solutions to handle the vast number of interconnected devices. Traditional centralized identity systems are increasingly inadequate due to their vulnerabilities, such as single points of failure, scalability issues, and limited user control over data. This study explores a decentralized identity management model leveraging the IOTA Tangle, a Directed Acyclic Graph (DAG)-based distributed ledger technology, to address these challenges. By integrating Decentralized Identifiers (DI
APA, Harvard, Vancouver, ISO, and other styles
9

Ullah, Ikram, Gerard de Roode, Nirvana Meratnia, and Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, no. 5 (2021): 1834. http://dx.doi.org/10.3390/s21051834.

Full text
Abstract:
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alter
APA, Harvard, Vancouver, ISO, and other styles
10

Jain, Shelendra Kumar, and Nishtha Kesswani. "IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment." International Journal of Information Security and Privacy 14, no. 2 (2020): 116–42. http://dx.doi.org/10.4018/ijisp.2020040107.

Full text
Abstract:
Many emerging fields are adopting Internet of Things technologies to incorporate smartness in respective areas. Several IoT based application area produces large volumes of real time data. Data aggregated through sensor nodes may contain highly sensitive information. An effective and successful IoT system must protect sensitive data from revealing to unauthorized persons. In this article, the authors present an efficient privacy-preserving mechanism called Internet of Things privacy (IoTp). The research simulates and analyzes the effectiveness of the proposed data aggregation and data access m
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Junsheng, Wenyuan Ren, Aijun Zhang, Shuangcun Li, Jianping Tan, and Hongtai Liu. "Mechanical Properties and Microstructure Analysis of Cement Mortar Mixed with Iron Ore Tailings." Buildings 13, no. 1 (2023): 149. http://dx.doi.org/10.3390/buildings13010149.

Full text
Abstract:
In order to study the feasibility and sand substitution mechanism of cement mortar mixed with iron ore tailings (IOT), iron ore tailings cement mortars (referred to as IOTC) with IOT content of 0%, 25%, and 50% were made and tested. First, the basic properties of IOT used were measured to verify the theoretical feasibility. Second, the uniaxial compressive and tensile strengths, as well as the crack resistance performance of IOTC under different curing ages and different sand substitution rates were tested. Third, the techniques of inductively coupled plasma atomic emission spectrometry (ICP-O
APA, Harvard, Vancouver, ISO, and other styles
12

Rhee, Eugene, and Jihoon Lee. "Improved DAG in blockchain tangle for IOTA." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 806. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp806-813.

Full text
Abstract:
The internet of things (IoT) enables machine-to-machine communication without human intervention. Consequently, every object connected to the internet can exchange information with each other. Internet of things application (IOTA) has undertaken a project to address the high transaction fees inherent in traditional blockchain systems and enhance the efficiency of microtransactions between machines by combining blockchain and IoT. IOTA employs its unique Tangle technology, which introduces a novel transaction consensus method, addressing the fee issues, limited scalability, and the inability to
APA, Harvard, Vancouver, ISO, and other styles
13

Rhee, Eugene, and Jihoon Lee. "Improved DAG in blockchain tangle for IOTA." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 806–13. https://doi.org/10.11591/ijeecs.v34.i2.pp806-813.

Full text
Abstract:
The internet of things (IoT) enables machine-to-machine communication without human intervention. Consequently, every object connected to the internet can exchange information with each other. Internet of things application (IOTA) has undertaken a project to address the high transaction fees inherent in traditional blockchain systems and enhance the efficiency of microtransactions between machines by combining blockchain and IoT. IOTA employs its unique Tangle technology, which introduces a novel transaction consensus method, addressing the fee issues, limited scalability, and the inability to
APA, Harvard, Vancouver, ISO, and other styles
14

Rawat, Abhimanyu, Vanesa Daza, and Matteo Signorini. "Offline Scaling of IoT Devices in IOTA Blockchain." Sensors 22, no. 4 (2022): 1411. http://dx.doi.org/10.3390/s22041411.

Full text
Abstract:
An increased pattern of hidden Internet of Things (IoT) devices has been observed. Due to the increased number of security attacks, a large number of IoT devices are disappearing from the public internet. Operating blockchain operations in such ad hoc connectivity becomes challenging. However, multiple past studies have pointed towards IOTA Distributed Ledger Technology (DLT) that closely caters to offline blockchain use cases. However, there has been little to no empirical study or introduction to time bounds on transaction confirmation. Therefore, this study explains what provisions the exis
APA, Harvard, Vancouver, ISO, and other styles
15

Partida, Alberto, Regino Criado, and Miguel Romance. "Visibility Graph Analysis of IOTA and IoTeX Price Series: An Intentional Risk-Based Strategy to Use 5G for IoT." Electronics 10, no. 18 (2021): 2282. http://dx.doi.org/10.3390/electronics10182282.

Full text
Abstract:
The transformation of time series into complex networks through visibility graphs is an innovative way to study time-based events. In this work, we use visibility graphs to transform IOTA and IoTeX price volatility time series into complex networks. Our aim is twofold: first, to better understand the markets of the two most capitalised Internet of Things (IoT) platforms at the time of writing. IOTA runs on a public directed acyclic graph (DAG) and IoTeX on a blockchain. Second, to suggest how 5G can improve information security in these two key IoT platforms. The analysis of the networks creat
APA, Harvard, Vancouver, ISO, and other styles
16

K. M, Delphin Raj, Jinyoung Lee, Eunbi Ko, et al. "Underwater Network Management System in Internet of Underwater Things: Open Challenges, Benefits, and Feasible Solution." Electronics 9, no. 7 (2020): 1142. http://dx.doi.org/10.3390/electronics9071142.

Full text
Abstract:
As oceans cover the majority of the earth’s surface, it becomes inevitable in extending the concepts of Internet of Things (IoT) to ocean bodies, thereby tiling the way for a new drift in the digital world, the Internet of Underwater Things (IoUT). The primary objective of IoUT is the creation of a network of several smart interconnected undersea things, to digitally link water bodies by using devices such as autonomous underwater vehicles. Since the traditional ideas of IoT cannot be merely expanded to underwater, due to the difference in environmental characteristics, this puts forward a var
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Qian, Qingguo Tang, Weiwei Zhao, et al. "Ultrafine Grinded and Silane Grafted Iron Ore Tailings as Reinforcing Filler of Styrene Butadiene Rubber." Materials 15, no. 5 (2022): 1756. http://dx.doi.org/10.3390/ma15051756.

Full text
Abstract:
In order to realize the high value-added resource utilization of solid waste and reduce the cost of rubber manufacturing, iron ore tailings (IOTs) were used as raw material to prepare a reinforcing filler of rubber through ultrafine grinding and surface organic modification techniques. We studied the effects of ball mill grinding conditions on the particle size and distribution of grinded iron ore tailings (G-IOTs). The effects of bis-(triethoxy-silyl-propyl)-tetrasulfide (Si69)-modified G-IOT (Si69-G-IOT) loading levels on the cure characteristics, static mechanical and dynamic mechanical pro
APA, Harvard, Vancouver, ISO, and other styles
18

Zhang, Yuanyu, Ruka Nakanishi, Masahiro Sasabe, and Shoji Kasahara. "Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things." Sensors 21, no. 15 (2021): 5053. http://dx.doi.org/10.3390/s21155053.

Full text
Abstract:
Unauthorized resource access represents a typical security threat in the Internet of Things (IoT), while distributed ledger technologies (e.g., blockchain and IOTA) hold great promise to address this threat. Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access requests. To overcome these limitations, this paper proposes a novel IoT access control scheme by combining the fee-less IOTA technology and the Ciphertext-Policy Attribute-Based Encryption
APA, Harvard, Vancouver, ISO, and other styles
19

Ahmed Osman, Radwa, and Amira I. Zaki. "Energy-Efficient and Reliable Internet of Things for 5G: A Framework for Interference Control." Electronics 9, no. 12 (2020): 2165. http://dx.doi.org/10.3390/electronics9122165.

Full text
Abstract:
The Internet of Things (IoT) is one of the promising paradigms that enable massive machines and devices to communicate with each other in future communication networks to promote a high level of awareness about our world and improve our daily life. IoT devices (IoTDs) communicate with an IoT base station (IoTBS) or IoT gateway (IoTG) by sharing the resources of other cellular users (CUEs). Due to the leakage of the spectral efficiency, interference exists among IoTG and base station (BS) due to CUEs and IoTDs. In this paper, a new framework is proposed called the interference control model. Th
APA, Harvard, Vancouver, ISO, and other styles
20

Mbimbi, Butrus, David Murray, and Michael Wilson. "IoT Forensics-Based on the Integration of a Permissioned Blockchain Network." Blockchains 2, no. 4 (2024): 482–506. https://doi.org/10.3390/blockchains2040021.

Full text
Abstract:
The proliferation of Internet of Things (IoT) devices has facilitated the exchange of information among individuals and devices. This development has introduced several challenges, including increased vulnerability to potential cyberattacks and digital forensics. IoT forensic investigations need to be managed in a forensically sound manner using a standard framework. However, adopting traditional digital forensics tools introduces various challenges, such as identifying all IoT devices and users at the crime scene. Therefore, collecting evidence from these devices is a major problem. This pape
APA, Harvard, Vancouver, ISO, and other styles
21

Fang, Nan, Yanhua Xi, Jing Zhang, Jian Wu, Huicai Cheng, and Qiang He. "Insight into Adsorption Kinetics, Equilibrium, Thermodynamics, and Modeling of Ciprofloxacin onto Iron Ore Tailings." Water 17, no. 5 (2025): 760. https://doi.org/10.3390/w17050760.

Full text
Abstract:
To achieve the resource utilization of iron ore tailings (IOTs), two different IOTs were investigated as sustainable adsorbents for ciprofloxacin (CIP) removal from aqueous systems. Through systematic batch experiments, key adsorption parameters including initial pH, adsorbent dosage, contact time, ionic strength, and temperature were comprehensively evaluated. The results showed that CIP adsorption by IOTs remained relatively stable across a broad initial pH range (2–10), with maximum adsorption capacities of 5-IOT and 14-IOT observed at the initial pH values of 10.1 and 9.16, respectively. C
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Kangning, Sheliang Wang, Xiaoyi Quan, et al. "Development of Engineered Cementitious Composites (ECCs) Incorporating Iron Ore Tailings as Eco-Friendly Aggregates." Buildings 13, no. 5 (2023): 1341. http://dx.doi.org/10.3390/buildings13051341.

Full text
Abstract:
In this study, iron ore tailings (IOTs) are used as aggregates to prepare iron-ore-tailing-engineered cementitious composites (IOT-ECCs) to achieve clean production. Some mechanical indexes, such as compressive strength (fcu), four-point flexural strength (ff), axial compressive strength (fc), deformation properties, flexural toughness, and stress–strain behavior, are studied. The mass loss, fcu loss, relative dynamic modulus elasticity (RDEM), and deterioration mechanism after the sulfate freeze–thaw (F-T) cycle are discussed in detail. In addition, pore structure analysis is performed using
APA, Harvard, Vancouver, ISO, and other styles
23

Mal, Hoshiar, and Nagendra Singh Nehra. "The Impact of IoT Characteristics, Cultural Factors and Safety Concerns on Consumer Purchase Intention of Green Electronic Products." Sustainability 15, no. 8 (2023): 6597. http://dx.doi.org/10.3390/su15086597.

Full text
Abstract:
This study examines the impact of IoT characteristics, key cultural dimensions, and safety concerns on consumer green purchase intentions. The research employed a survey approach, collecting responses from 278 consumers. Structural equation modeling (SEM) was used to test the hypotheses. The finding of the study indicates that IoT characteristics (IoTC), environmental concerns (EC), collectivism (GW), and individualism (ID) have a positive effect with attitude toward green purchasing (AGP), which further affect green purchase intentions (GPI). Attitude toward green purchasing (AGP) mediates th
APA, Harvard, Vancouver, ISO, and other styles
24

Bala Murugan, C., and S. Koteeswaran. "Emprical Study of Iot Solution for The Security Threats In Real Life Scenario: State of The Art." International Journal of Engineering & Technology 7, no. 2.19 (2018): 26. http://dx.doi.org/10.14419/ijet.v7i2.19.13792.

Full text
Abstract:
IoT technology and applications represents security as a significant issue for facilitating the tremendous implementation. Devoid of IoTs technology ensures the device level confidentiality, privacy and authenticity. The applicable users are not going to undertake answers for security in IoT in huge scale. The earlier stage deployments of IoT devices are primarily based on RFIDs technology which results in simplest, security solutions inside the principal been devised in an advert hoc manner [8]. This brings the fact that such deployments were typically vertically incorporated, with all additi
APA, Harvard, Vancouver, ISO, and other styles
25

Buja, Atdhe, Melinda Pacolli, Donika Bajrami, Philip Polstra, and Akihiko Mutoh. "Time-Series Analysis on AIDE IoT Attack Data Unraveling Trends and Patterns for Enhanced Security." Advances in Artificial Intelligence and Machine Learning 04, no. 02 (2024): 2233–43. http://dx.doi.org/10.54364/aaiml.2024.42128.

Full text
Abstract:
With the growing use of IoT devices, cyberattacks have increased against these devices, using various exploitable vulnerabilities. Cyberattacks are potentially ruinous events for business owners and the cost of a cyber-attack is not only financial, but companies also must spend time on recovering from the attacks. Through applied research we set out the latest findings and trends to provide new insights into the security of IoTs, focusing on the emerging nature of IoT attacks, frequency, and usual vulnerabilities, thus providing significance to cybersecurity and IoT defense, which will be bene
APA, Harvard, Vancouver, ISO, and other styles
26

Cano, Sandra, Victor Peñeñory, César A. Collazos, and Sergio Albiol-Pérez. "Designing Internet of Tangible Things for Children with Hearing Impairment." Information 11, no. 2 (2020): 70. http://dx.doi.org/10.3390/info11020070.

Full text
Abstract:
Tangible User Interfaces (TUIs) are a new, non-traditional way to interact with digital information using a physical environment. Therefore, TUIs connect a physical set of objects that can be explored and manipulated. TUI can be interconnected over the Internet, using Internet of Things (IoT) technology to monitor a child’s activities in real-time. Internet of Tangible Things (IoTT) is defined as a tangible interaction applied to IoT. This article describes four case studies that apply IoTT to children with cochlear implants and children whose communication is sign language. For each case stud
APA, Harvard, Vancouver, ISO, and other styles
27

Kimbugwe, Nasser, Tingrui Pei, and Moses Ntanda Kyebambe. "Application of Deep Learning for Quality of Service Enhancement in Internet of Things: A Review." Energies 14, no. 19 (2021): 6384. http://dx.doi.org/10.3390/en14196384.

Full text
Abstract:
The role of the Internet of Things (IoT) networks and systems in our daily life cannot be underestimated. IoT is among the fastest evolving innovative technologies that are digitizing and interconnecting many domains. Most life-critical and finance-critical systems are now IoT-based. It is, therefore, paramount that the Quality of Service (QoS) of IoTs is guaranteed. Traditionally, IoTs use heuristic, game theory approaches and optimization techniques for QoS guarantee. However, these methods and approaches have challenges whenever the number of users and devices increases or when multicellula
APA, Harvard, Vancouver, ISO, and other styles
28

Kumar, Ranjit, Rahul Gupta, and Sunil Kumar. "IoT Security on Smart Grid: Threats and Mitigation Frameworks." ECS Transactions 107, no. 1 (2022): 14623–30. http://dx.doi.org/10.1149/10701.14623ecst.

Full text
Abstract:
The number of smart grid IoTs is expected to grow exponentially in the near future, as predicted by the analyst. The improvement of a smart grid IoT security system increases due to communication technologies used in traditional power systems. Smart grid IoTs include critical devices due to its complex architectures. Smart grid IoTs that are connected and controlled remotely through the internet are becoming more universal. As a result, homes and businesses have ever increasing attack surfaces on their networks. It can lead to security arrears, and large-scale economic damage when the confiden
APA, Harvard, Vancouver, ISO, and other styles
29

Akhtar, Mohd Majid, Danish Raza Rizvi, Mohd Abdul Ahad, Salil S. Kanhere, Mohammad Amjad, and Giuseppe Coviello. "Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy." Sensors 21, no. 13 (2021): 4354. http://dx.doi.org/10.3390/s21134354.

Full text
Abstract:
A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called “distributed ledger technology” (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability stil
APA, Harvard, Vancouver, ISO, and other styles
30

Song, Junsup, Dimitris Karagiannis, and Moonkun Lee. "Modeling Method to Abstract Collective Behavior of Smart IoT Systems in CPS." Sensors 22, no. 13 (2022): 5057. http://dx.doi.org/10.3390/s22135057.

Full text
Abstract:
This paper presents a new modeling method to abstract the collective behavior of Smart IoT Systems in CPS, based on process algebra and a lattice structure. In general, process algebra is known to be one of the best formal methods to model IoTs, since each IoT can be represented as a process; a lattice can also be considered one of the best mathematical structures to abstract the collective behavior of IoTs since it has the hierarchical structure to represent multi-dimensional aspects of the interactions of IoTs. The dual approach using two mathematical structures is very challenging since the
APA, Harvard, Vancouver, ISO, and other styles
31

Rabei, Rabei, Shaima Miqdad Mohamed Najeeb, Rabei Raad Ali, and Mohammed Ahmed Jubair. "Securing IoT through Intrusion Detection Systems: An Overview." Journal of Intelligent Systems and Internet of Things 15, no. 2 (2025): 183–90. https://doi.org/10.54216/jisiot.150213.

Full text
Abstract:
Internet of Things (IoT) has emerged as a new paradigm for integrating internet resources and physical objects. It provides a better standard of living in different domains, like industrial processes, home automation, and environmental monitoring. The growth of IoT depends on the need to connect more devices via the Internet. However, anywhere internet connectivity is involved, security poses as an enormous challenge. Intrusion Detection Systems (IDS) can protect IoTs by applying rules related to IoTs operation. This paper reviews some of the mechanisms of IoT-related IDS, which protect IoT de
APA, Harvard, Vancouver, ISO, and other styles
32

Purohit, Santanu. "Technological transition from analog to internet of things ( IoT ) on Indian petro-retail’s customer service." Indian Journal of Science and Technology 13, no. 42 (2020): 4364–68. http://dx.doi.org/10.17485/ijst/v13i42.1964.

Full text
Abstract:
Objectives: To identify the gap in the adaptation of IoTs towards meeting the customer expectation for services in petro-retailing in India. Method: Review of available published research articles, case studies, published article in journals and websites on uses of IOTs in various sectors like retail, telecom manufacturing, supply chain management, oil & gas etc. Findings: Technological advances have had a significant impact on both consumers as well as industries. While internet changed the way human interact, Internet of Things (IoT) is expected to change the way machines interact. Addin
APA, Harvard, Vancouver, ISO, and other styles
33

Idrees, Muhammad, Javed Iqbal, Abdul Latif, and Zia Khalid. "Validating IOT and Block Chain Adoption for Home Automation and Block less Solution for Robust Penetration." Qlantic Journal of Social Sciences 5, no. 4 (2024): 329–38. https://doi.org/10.55737/qjss.v-iv.24264.

Full text
Abstract:
The motivation behind this comprehensive study is twofold, i.e. validation of UTAUT2 for both potential and actual users of IOT as well as proposing the incorporation of blockchain 3.0 (IOTA) and challenges as novel constructs in UTAUT2. This study helps academicians and practitioners understand the antecedents of IOT adoption and underpins the core areas that need attention to foster adoption. The study incorporates 750 plus responses from both actual and potential users of IOT from the entire Pakistan. Three hundred fifty actual users and 400 plus potential users participated in the study an
APA, Harvard, Vancouver, ISO, and other styles
34

Santanu, Purohit, and Kumar Jain Arvind. "Technological transition from analog to internet of things ( IoT ) on Indian petro-retail's customer service." Indian Journal of Science and Technology 13, no. 42 (2020): 4364–68. https://doi.org/10.17485/IJST/v13i42.1964.

Full text
Abstract:
Abstract <strong>Objectives</strong>: To identify the gap in the adaptation of IoTs towards meeting the customer expectation for services in petro-retailing in India.&nbsp;<strong>Method</strong>: Review of available published research articles, case studies, published article in journals and websites on uses of IOTs in various sectors like retail, telecom manufacturing, supply chain management, oil &amp; gas etc.&nbsp;<strong>Findings</strong>: Technological advances have had a significant impact on both consumers as well as industries. While internet changed the way human interact, Internet
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Jian, Shuailong Wang, and Jiaqi Guo. "Research on Collaborative Education Mechanism of IoT for “Artificial Intelligence + Encourage Startups and Innovation”." Journal of Education and Educational Research 6, no. 1 (2023): 49–52. http://dx.doi.org/10.54097/jeer.v6i1.14158.

Full text
Abstract:
Aiming at the training mode of application-oriented undergraduate talents under the background of new engineering, this paper discusses the construction ideas of the Internet of Things (IoTs) major in the new engineering background. Currently, a lack of clarity persists concerning the establishment of the IoTs major in many colleges and universities. As the IoTs represents a novel concept for both enterprises and education, it is imperative to deeply explore its curriculum system design and talent training model. This article analyzes the current status of talent cultivation in the field of Io
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Fanhua, and Jiangli Qu. "Remote Monitoring System Based on Artificial Intelligence Technology." Journal of Physics: Conference Series 2146, no. 1 (2022): 012039. http://dx.doi.org/10.1088/1742-6596/2146/1/012039.

Full text
Abstract:
Abstract With the advent of the information age, IOTT has been favored by many industries and has become another profound revolution in the IT industry. In such an era, the application of IOTT in IB construction can broaden the practicability of intelligent system, ORA, improve the management and service ability of IB, so as to improve people’s quality of life. This paper expounds the development status and future challenges of IOTH, and analyzes the interactive design of smart TV.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Yang, Xu-Hui Wang, and Xian-Jie Tang. "An Experimental Study on the Effects of Basalt Fiber and Iron Ore Tailings on the Durability of Recycled Concrete." Buildings 15, no. 14 (2025): 2492. https://doi.org/10.3390/buildings15142492.

Full text
Abstract:
To elucidate the effects of iron ore tailings (IOTs) and basalt fiber (BF) on the durability of recycled aggregate concrete (RAC) with different recycled aggregate replacement rates, this study used IOTs to replace natural sand at mass replacement rates of 0%, 20%, 40%, 60%, 80%, and 100% and incorporated BF at volume fractions of 0%, 0.1%, 0.2%, and 0.3%. Carbonation and freeze–thaw cycle tests were conducted on C30 grade RAC. The carbonation depth and compressive strength of RAC at different carbonation ages and the mass loss rate, relative dynamic elastic modulus, and changes in compressive
APA, Harvard, Vancouver, ISO, and other styles
38

Nittayathammakul, Vitsanu, Pinanta Chatwattana, and Pallop Piriyasurawong. "Crowd Context-Based Learning Process via IoT Wearable Technology to Promote Digital Health Literacy." International Education Studies 15, no. 6 (2022): 27. http://dx.doi.org/10.5539/ies.v15n6p27.

Full text
Abstract:
The crowd context-based learning process via IoT wearable technology [IoTW-driven Crowd context-based learning (CCBL)] is a new learning paradigm that integrates Technological Cybergogical Content Knowledge (TCACK) based on connectivism, cognitive tools and information processing theories to promote digital health literacy. In this study, the IoTW-driven CCBL was designed by incorporating content, cybergogical, and technological elements, which can become a sustainable solution in educational settings during the global COVID-19 pandemic. The researchers collected qualitative data by confirmato
APA, Harvard, Vancouver, ISO, and other styles
39

V. Jog, Vivek, and Senthil Murugan T. "Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things." International Journal of Intelligent Computing and Cybernetics 10, no. 2 (2017): 241–56. http://dx.doi.org/10.1108/ijicc-08-2016-0030.

Full text
Abstract:
Purpose Due to the connectivity of the multiple devices and the systems on the same network, rapid development has become possible in Internet of Things (IoTs) for the last decade. But, IoT is mostly affected with severe security challenges due to the potential vulnerabilities happened through the multiple connectivity of sensors, devices and system. In order to handle the security challenges, literature presents a handful of security protocols for IoT. The purpose of this paper is to present a threat profiling and elliptic curve cryptography (ECC)-based mutual and multi-level authentication f
APA, Harvard, Vancouver, ISO, and other styles
40

Ershov, Yurii S., Naimdzhon M. Ibragimov, and Aleksandr I. Dushenin. "Input-Output Table Regionalization and Multiregional Input-Output Model Development Algorithm." Journal of Siberian Federal University. Humanities & Social Sciences 14, no. 7 (2021): 1018–27. http://dx.doi.org/10.17516/1997-1370-0781.

Full text
Abstract:
The main problems of constructing multiregional input-output (IO) models used for the development of spatial and sectoral long-term national economy forecasts are caused by the absence of proper statistics. Therefore, it is necessary to make up the input-output tables (IOTs) based on a limited set of direct and indirect indicators that measure spatial patterns of production, consumption, capital formation, etc., sufficiently accurate for filling up multiregional IO models. The paper discusses Russian IOT spatial mapping problems and proposes an approach to partial automation of the procedures
APA, Harvard, Vancouver, ISO, and other styles
41

Altameem, Ayman, Prabu P, Senthilnathan T, Ramesh Chandra Poonia, and Abdul Khader Jilani Saudagar. "A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0." Systems 11, no. 1 (2023): 28. http://dx.doi.org/10.3390/systems11010028.

Full text
Abstract:
The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding user privacy. Captured fingerprints can jeopardize the security and privacy of personal information. To solve privacy- and security-related problems in IoT-based environments, Biometric Authentication Frameworks (BAFs) are proposed to enable authentications in IoTs coupled with fingerprint authentications on edge consumer devices and to ensure biometr
APA, Harvard, Vancouver, ISO, and other styles
42

Alreshidi, Abdulrahman, and Aakash Ahmad. "Architecting Software for the Internet of Thing Based Systems." Future Internet 11, no. 7 (2019): 153. http://dx.doi.org/10.3390/fi11070153.

Full text
Abstract:
Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that enabling autonomous systems to shape-up digitized societies. Software architecture, as the blue-print of software-intensive systems, abstracts the complexities of modeling, design, development, and evolution phases of a software to engineer complex IoT driven systems effectively and efficiently. Objectives and Method—Research and development efforts are required to exploit architectural principle and practices to design and develop IoT systems
APA, Harvard, Vancouver, ISO, and other styles
43

Razzaq, Abdul, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed Khan Ghayyur, Wilayat Khan, and Mohammad Alsaffar. "IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology." Electronics 12, no. 5 (2023): 1233. http://dx.doi.org/10.3390/electronics12051233.

Full text
Abstract:
As Internet of Things (IoT)-based systems become more prevalent in the era of data-driven intelligence, they are prone to some unprecedented challenges in terms of data security and systems scalability in an era of context-sensitive data. The current advances in IoT-driven data sensing and sharing rely on third-party sources of information (TTPs) that gather data from one party, then transmit it to the other. As a result of TTPs’ involvement, such IoT systems suffer from many issues including but not limited to security, transparency, trust, and immutability as a result of the involvement of t
APA, Harvard, Vancouver, ISO, and other styles
44

Szabó, Norbert, and Hanga Lilla Bilicz. "Lokális ágazatközi kapcsolatok – hibrid ÁKM Pécs városrégióban." Közgazdasági Szemle 71, no. 6 (2024): 624–52. http://dx.doi.org/10.18414/ksz.2024.6.624.

Full text
Abstract:
Regional input-output tables (IOT) are increasingly used in economic impact assessment to support the design of sectoral policies. With the popularity of regional IOTs and increasing urbanization processes, there is a growing demand for sub-regional input-output modeling. Regional-county level analyses cannot account for the differences between urban economies and the specificities of their interconnections with other regions. However, estimating city-level IOTs is difficult due to the limited data available. This paper presents the steps of compiling a hybrid two-region IOT, based partly on a
APA, Harvard, Vancouver, ISO, and other styles
45

Ersin, Çağatay, and Onur Köktürk. "Blockchain Destekli Nesnelerin İnterneti (IoT) Varlıklarında Fiyat Tahmini İçin Model Karşılaştırması." Black Sea Journal of Engineering and Science 8, no. 4 (2025): 61–62. https://doi.org/10.34248/bsengineering.1665890.

Full text
Abstract:
Teknolojik gelişmelerin hız kazanmasıyla birlikte Nesnelerin İnterneti (IoT - Internet of Things), küresel ölçekte üretim süreçlerinden akıllı şehir uygulamalarına, kişisel sağlık izleme cihazlarından akıllı spor kıyafetlerine kadar geniş bir yelpazede dönüşüme katkı sağlamaktadır. Nesnelerin İnterneti, cihazların birbirleriyle ve veri merkezleriyle etkileşime geçerek büyük miktarda veri ürettiği bir ekosistem yaratmaktadır. Bu bağlamda, IoT teknolojilerine dayalı blok zinciri tabanlı kripto varlıklar da gelişim göstermiştir. Bu çalışmanın amacı, Nesnelerin İnterneti (IoT) temalı kripto varlık
APA, Harvard, Vancouver, ISO, and other styles
46

Al Sawafi, Yahya, Abderezak Touzene, and Rachid Hedjam. "Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks." Journal of Sensor and Actuator Networks 12, no. 2 (2023): 21. http://dx.doi.org/10.3390/jsan12020021.

Full text
Abstract:
Internet of things (IoT) has become an emerging technology transforming everyday physical objects to be smarter by using underlying technologies such as sensor networks. The routing protocol for low-power and lossy networks (RPL) is considered one of the promising protocols designed for the IoT networks. However, due to the constrained nature of the IoT devices in terms of memory, processing power, and network capabilities, they are exposed to many security attacks. Unfortunately, the existing Intrusion Detection System (IDS) approaches using machine learning that have been proposed to detect
APA, Harvard, Vancouver, ISO, and other styles
47

Valmohammadi, Changiz. "Examining the perception of Iranian organizations on Internet of Things solutions and applications." Industrial and Commercial Training 48, no. 2 (2016): 104–8. http://dx.doi.org/10.1108/ict-07-2015-0045.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the perception of Iranian experts and executive managers of sample organizations on the benefits and barriers of Internet of Things (IoT) solutions implementation. Based on the context of Iran using descriptive analysis. Design/methodology/approach – Based on the review of the related literature and websites, benefits and barriers of successful implementation to IoTs solutions were identified. Through a self-administered questionnaire which was collected from 67 Iranian organizations the ranking and importance of benefits and barriers of IoTs s
APA, Harvard, Vancouver, ISO, and other styles
48

Hudson, Nandere, and Kosea Erasto Muwanga. "Emerging Technologies and Applications of IoT: Current and Future Perspectives." Emerging Technologies and Applications of IoT: Current and Future Perspectives 8, no. 10 (2023): 10. https://doi.org/10.5281/zenodo.10003082.

Full text
Abstract:
This article presents an in-depth analysis of the current and future Internet of Things (IoTs) technologies and applications. A brief overview of the significance of the current state of IoT technologies is discussed. The article examines emerging technologies and techniques such as 5G, edge computing, and AI, that will continue to transform ongoing IoT applications. The article explores the applications of IoT in various industries such as healthcare, transportation, smart cities, and agriculture. The article highlights the security and privacy concerns and solutions to IoT applications in di
APA, Harvard, Vancouver, ISO, and other styles
49

Tiruvayipati, Sujanavan, and Ramadevi Yellasiri. "Leveraging Nano Block-Lattice for Cost-Effective Large-Scale Wi-Fi-Based IoT Network Expansion." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 08 (2025): 224–38. https://doi.org/10.3991/ijim.v19i08.53319.

Full text
Abstract:
The rapid expansion of Internet of Things (IoT) networks necessitates cost-effective and scalable solutions for secure data transmission and storage. This study explores the integration of Nano (XNO) cryptocurrency with Wi-Fi repeater networks to address the challenges of IoT scalability and data security. By leveraging XNO’s block-lattice structure, this study demonstrates how the cryptocurrency’s minimal transaction fees, high transaction throughput, and low latency make it an optimal solution for real-time IoT data handling. In combination with Wi-Fi repeater networks, which extend coverage
APA, Harvard, Vancouver, ISO, and other styles
50

Yuan, Peng, LuAn Tang, Yanchi Liu, Kobayashi Yuji, Moto Sato, and Haifeng Chen. "Incident Diagnosing and Reporting System Based on Retrieval Augmented Large Language Model." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 28 (2025): 29721–23. https://doi.org/10.1609/aaai.v39i28.35379.

Full text
Abstract:
The Internet of Things (IoT) is widely used in many applications such as smart city, transportation, healthcare, and environment monitoring. A key task of IoT maintenance is to analyze the abnormal sensor records and generate incident report. Traditionally, domain experts engage in such labor intensive tasks. Recent advances in Large Language Model (LLM) have sparked interests in developing AI based systems to automate these labor intensive processes. However, two critical problems hinder the effective application of LLM in IoTs: (1) LLM lacks background knowledge of deployed IoTs; and (2) the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!