


default search action
Discover Internet of Things, Volume 3
Volume 3, Number 1, December 2023
- Awais Manzoor
, Malik Ali Judge, Saif ul Islam
, Nabil Neggaz
, Laith Abulaigh, Ishfaq Ahmad:
AHHO: Arithmetic Harris Hawks Optimization algorithm for demand side management in smart grids. 1-21 - Rahul Vishwakarma, Ravi Monani, Ava Hedayatipour, Amin Rezaei:
Reliable and secure memristor-based chaotic communication against eavesdroppers and untrusted foundries. 1-17 - Ramzi Khezzar, Abdelrahman Moursi, Zaher Al Aghbari:
arHateDetector: detection of hate speech from standard and dialectal Arabic Tweets. 1-13 - Peace Bamurigire
, Anthony Vodacek
:
Validating algorithms designed for fertilization control in rice farming system. 4 - Mansi Bhavsar, Kaushik Roy, John C. Kelly, Olusola Tolulope Odeyomi:
Anomaly-based intrusion detection system for IoT application. 5 - Prateek Shrivastava, Virendra Kumar Tewari, Chanchal Gupta, Gajendra Singh:
IoT and radio telemetry based wireless engine control and real-time position tracking system for an agricultural tractor. 6 - Faria Sajjad, Muhammad Rashid
, Afia Zafar, Kainat Zafar, Benish Fida, Ali Arshad
, Saman Riaz, Ashit Kumar Dutta, Joel J. P. C. Rodrigues:
An efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications. 7 - Hari Mohan Rai, Atik-Ur-Rehman, Aditya Pal, Sandeep Mishra, Kaustubh Kumar Shukla:
Use of Internet of Things in the context of execution of smart city applications: a review. 8 - Meduri Saketh, Neha Nandal, Rohit Tanwar, B. Pradyun Reddy:
Intelligent surveillance support system. 9 - Zheng Xu, Deepak Kumar Jain, S. Neelakandan, Jemal H. Abawajy:
Hunger games search optimization with deep learning model for sustainable supply chain management. 10 - Md. Ishan Arefin Hossain
, Anika Tabassum, Zia Ush-Shamszaman:
Deep edge intelligence-based solution for heart failure prediction in ambient assisted living. 11 - Sanjay Prajapati
, Himansu Das
, Mahendra Kumar Gourisaria
:
Feature selection using differential evolution for microarray data classification. 12 - Soumili Ghosh
, Mahendra Kumar Gourisaria
, Biswajit Sahoo
, Himansu Das
:
A pragmatic ensemble learning approach for rainfall prediction. 13 - Vishalkumar Langaliya
, Jaypalsinh A. Gohil
:
Innovative and secure decentralized approach to process real estate transactions by utilizing private blockchain. 14 - Eralda Caushaj, Vijayan Sugumaran:
Classification and security assessment of android apps. 15 - Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten:
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces. 16 - Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta:
A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks. 17 - Riya Punia, Aruna Malik, Samayveer Singh:
An interpolation-based reversible data hiding scheme for internet of things applications. 18 - Boniface Ntambara
, Devotha Godfrey Nyambo, Andreas Solsbach
:
Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania. 19 - Ernesto Quisbert-Trujillo, Panagiota Morfouli:
Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples. 20 - Rawshan Ara Mowri
, Madhuri Siddula, Kaushik Roy:
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP. 21 - Riya Punia, Aruna Malik, Samayveer Singh:
Innovative image interpolation based reversible data hiding for secure communication. 22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.