دانلود و نمایش مقالات مرتبط با Environment::صفحه 4
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Environment

تعداد مقالات یافته شده: 2770
ردیف عنوان نوع
31 Smart mask – Wearable IoT solution for improved protection and personal health
ماسک هوشمند – راه حل پوشیدنی اینترنت اشیا برای بهبود حفاظت و سلامت شخصی-2022
The use of face masks is an important way to fight the COVID-19 pandemic. In this paper, we envision the Smart Mask, an IoT supported platform and ecosystem aiming to prevent and control the spreading of COVID-19 and other respiratory viruses. The integration of sensing, materials, AI, wireless, IoT, and software will help the gathering of health data and health-related event detection in real time from the user as well as from their environment. In the larger scale, with the help of AI-based analysis for health data it is possible to predict and decrease medical costs with accurate diagnoses and treatment plans, where the comparison of personal data to large-scale public data enables drawing up a personal health trajectory, for example. Key research prob- lems for smart respiratory protective equipment are identified in addition to future research di- rections. A Smart Mask prototype was developed with accompanying user application, backend and heath AI to study the concept.
keywords: کووید-۱۹ | محاسبات لبه | اینترنت اشیا | سلامت شخصی | پوشیدنی | COVID-19 | Edge computing | IoT | Personal health | Wearable
مقاله انگلیسی
32 A new DTN routing strategies ensuring high message delivery ratio while keeping low power consumption
یک استراتژی جدید مسیریابی DTN با تضمین نسبت تحویل پیام بالا و مصرف کم انرژی-2022
This study proposes Delay/Disruption Tolerant Networking (DTN) routing strategies for disaster information delivery under the existence of obstacles that are based on the message relay decision (MRD) method. The proposed methods include a new added obstacle detection procedure to deliver messages to destinations while bypassing the obstacles. Efficient and precise relief activities are required immediately after disasters, and it is well known that obstacles appearing after a disaster will degrade message forwarding performance. Hence, the proposed schemes maintain communication performance by using a node to detect the existence of obstacles around itself. If there are obstacles, the message strategy is altered to bypass the obstacle. In this study, human-beings are the main mobile nodes and mobile phones are the creators and forwarders of messages. A multiple obstacle model is used to evaluate the schemes in terms of obstacle-resistance. Three routing schemes are proposed: MRD with area increase (MRDAI), Sub-Relay Station (SRS), and Adapted Predict Obstacle (APO). This model tests MRDAI and SRS at the macro level and APO under the existence of concave obstacles. The MRDAI scheme could autonomously perceive the existence of a huge obstacle and intelligently enlarge the original message relay area. The SRS scheme could re-establish sub-relay areas based on MRDAI. The APO scheme demonstrated resistance to concave obstacles, stability (less affected by environmental changes), and a high delivery ratio while ensuring low energy consumption. These proposed strategies for information delivery in a disaster area can be used to launch rescue activities more quickly.
Keywords: DTN | Routing strategy | Disaster information | Avoiding obstacles
مقاله انگلیسی
33 A new road state information platform based on crowed sensing on challenged network environments
یک پلت فرم جدید اطلاعات وضعیت جاده مبتنی بر حسگر در محیط های شبکه چالش برانگیز-2022
In this paper, a new generation road state information platform based on IoT crowed sens- ing technology is proposed. Various sensors are attached on vehicle to sample sensor data and to determine the road state in reatime. Those sensor data and road state information are transmitted to the neighbor vehicles and road side server using V2X communication network. Driver can receive the sensor data and road surface state information from the vehicle in opposite direction or road side server and eventually pay attentions to his/her driving before encountering the dangerous location. A prototype system of this proposed system is constructed and evaluated the functions and performance as a preliminary sys- tem.
keywords: اینترنت اشیا | سنسور | شبکه بی سیم | سنجش سطح جاده | رانندگی خودمختار | IoT | Sensor | V2V: V2R | Wireless network | Road surface sensing | Autonomous driving
مقاله انگلیسی
34 A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT
پروتکل ایمن تأیید هویت متقابل D2D و قرارداد کلیدی برای اینترنت اشیا-2022
Internet of Things (IoT) is a developing technology in our time that is prone to security problems as it uses wireless and shared networks. A challenging scenario in IoT environments is Device-to- Device (D2D) communication where an authentication server, as a trusted third-party, does not participate in the Authentication and Key Agreement (AKA) process and only cooperates in the process of allocating and updating long-term secret keys. Various authentication protocols have been suggested for such situations but have not been able to meet security and efficiency re- quirements. This paper examined three related protocols and demonstrated that they failed to remain anonymous and insecure against Key Compromise Impersonation (KCI) and clogging at- tacks. To counter these pitfalls, a new D2D mutual AKA protocol that is anonymous, untraceable, and highly secure was designed that needed no secure channel to generate paired private and public keys in the registration phase. Formal security proof and security analysis using BAN logic, Real-Or-Random (ROR) model, and Scyther tool showed that our proposed protocol satisfied security requirements. The communication and computation costs and energy consumption comparisons denoted that our design had a better performance than existing protocols.
keywords: تأیید اعتبار و توافقنامه کلید (AKA) | ارتباط دستگاه به دستگاه (D2D) | اینترنت اشیا (IoT) | حمله جعل هویت کلیدی (KCI) | Authentication and Key Agreement (AKA) | Device to Device (D2D) communication | Internet of Things (IoT) | Key Compromise Impersonation (KCI) attack
مقاله انگلیسی
35 A throughput drop estimation model and its application to joint optimization of transmission power, frequency channel, and channel bonding in IEEE 802:11n WLAN for large-scale IoT environments
یک مدل تخمین افت توان و کاربرد آن برای بهینه‌سازی مشترک توان انتقال، کانال فرکانس و پیوند کانال در IEEE 802:11n WLAN برای محیط‌های اینترنت اشیا در مقیاس بزرگ-2022
The concept of Internet of Things (IoT) has been widely studied in smart home networks, smart city networks, smart grid systems, autonomous driving systems, and smart healthcare systems. In IoT, the IEEE 802.11n wireless local-area network (WLAN) is used as a common communication technology due to its flexibility and low cost. Then, the high performance WLAN is required to enhance quality of service (QoS) of large-scale IoT applications connecting a number of devices or sensors allocated in wide areas. WLAN can use the limited number of partially overlapping channels (POCs) at 2.4 GHz band. The WLAN performance can be degraded by interfered signals from other WLANs. Then, to optimize the POC assignment by reducing interferences, we have proposed the throughput drop estimation model for concurrently communicating multiple links under interferences. Unfortunately, the 40 MHz channel bonding (CB) and the 20 MHz non-CB are considered separately, while the transmission power is always fixed to the maximum. In this paper, we study the throughput drop estimation model under coexistence of CB and non-CB while the transmission power is changed. Then, we present its application to the joint optimization of assigning the transmission power, the frequency channel, and the channel bonding to enhance the throughput performance of IEEE 802.11n WLAN. For evaluations, we compare estimated throughputs by the model with measured ones in various network topologies to verify the model accuracy. Then, we apply the model to the joint assignment optimization in them, and confirm the effectiveness through simulations and experiments using the testbed system.
Keywords: Internet of Things | WLAN | Partially overlapping channel | Access point | Transmission power | Channel bonding | Non-channel bonding | Throughput drop
مقاله انگلیسی
36 A Two-layer Fog-Cloud Intrusion Detection Model for IoT Networks
مدل تشخیص نفوذ مه-ابر دو لایه برای شبکه های اینترنت اشیا-2022
The Internet of Things (IoT) and its applications are becoming ubiquitous in our life. However, the open deployment environment and the limited resources of IoT devices make them vulnerable to cyber threats. In this paper, we investigate intrusion detection techniques to mitigate attacks that exploit IoT security vulnerabilities. We propose a machine learning-based two-layer hierarchical intrusion detection mechanism that can effectively detect intrusions in IoT networks while satisfying the IoT resource constraints. Specifically, the proposed model effectively utilizes the resources in the fog layer of the IoT network by efficiently deploying multi-layered feedforward neural networks in the fog-cloud infrastructure for detecting network attacks. With a fog layer into the picture, analysis is dynamically distributed across the fog and cloud layer thus enabling real-time analytics of traffic data closer to IoT devices and end-users. We have performed extensive experiments using two publicly available datasets to test the proposed approach. Test results show that the proposed approach outperforms existing approaches in multiple performance metrics such as accuracy, precision, recall, and F1-score. Moreover, experiments also justified the proposed model in terms of improved service time, lower delay, and optimal energy utilization.
keywords: Fog computing | Intrusion detection | IoT network | Machine learning | Security
مقاله انگلیسی
37 AI for next generation computing: Emerging trends and future directions
هوش مصنوعی برای محاسبات نسل بعدی: روندهای نوظهور و مسیرهای آینده-2022
Autonomic computing investigates how systems can achieve (user) specified ‘‘control’’ outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and inter-dependent control loops. Despite research into autonomic models for managing computer resources, ranging from individual resources (e.g., web servers) to a resource ensemble (e.g., multiple resources within a data centre), research into integrating Artificial Intelligence (AI) and Machine Learning (ML) to improve resource autonomy and performance at scale continues to be a fundamental challenge. The integration of AI/ML to achieve such autonomic and self-management of systems can be achieved at different levels of granularity, from full to human-in-the-loop automation. In this article, leading academics, researchers, practitioners, engineers, and scientists in the fields of cloud computing, AI/ML, and quantum computing join to discuss current research and potential future directions for these fields. Further, we discuss challenges and opportunities for leveraging AI and ML in next generation computing for emerging computing paradigms, including cloud, fog, edge, serverless and quantum computing environments.
Keywords: Next generation computing | Artificial intelligence | Cloud computing | Fog computing | Edge computing | Serverless computing | Quantum computing | Machine learning
مقاله انگلیسی
38 An integrated solution of software and hardware for environmental monitoring
راه حل یکپارچه نرم افزاری و سخت افزاری برای نظارت محیطی-2022
With the expansion of the Internet of Things (IoT), several monitoring solutions are available in the market. However, most solutions use proprietary software, which is costly and do not provide online monitoring, hampering data access and hindering preventive actions. This article presents LimnoStation, a low-cost integrated hardware and software solution that employs IoT concepts with LoRaWan, whose main objective is to monitor environmental and oceanographic data from surface and submerged sensors, which can be accessed online and has low-power consumption. Long-distance transmission tests were performed analyzing battery consumption and readings taken by the LimnoStation sensors. The results show that the average error of sensor readings was 0.51%, with a battery life of more than 2900 days and costing about 100 times less compared to commercial sensors. The evaluation of the LimnoStation showed that it is viable not only for academic use, but also as a replacement for presenting lower cost, high reliability, greater integration, and more functionality than most solutions found on the market.
Keywords: IoT | LoRaWan | LoRa | Environmental monitoring
مقاله انگلیسی
39 Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022
The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led to a rise in the use of their civilian and commercial applications. The access of these drones to controlled airspace can be efficiently coordinated through particular layered network architecture, often referred to as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment, brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography, Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the IoD. However, with the rapid development of quantum computing, it will be easy to break public-key cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide unconditional security solutions to protect data and communications in the IoD environment. This paper proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum channel to encode the private information based on a pre-shared key and a random key generated in a session. The involved entities also perform mutual authentication and share a secret key. We also provide the security proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography.
مقاله انگلیسی
40 Confidential computing in cloud/fog-based Internet of Things scenarios
محاسبات محرمانه در سناریوهای اینترنت اشیا مبتنی بر ابر/مه-2022
Internet of Things (IoT) devices are increasingly present in people’s daily lives, collecting different types of data about the environment, user behavior, medical data, and others. Due to limited processing power, such devices share the collected data with cloud/fog environments, which raises concerns about users’ privacy. To ensure privacy and confidentiality guarantees, many cloud/fog-enhanced IoT applications use Trusted Execution Environments, such as ARM TrustZone and Intel SGX, which are the basis for Confidential Computing. Confidential Computing aims at protecting data during processing, besides transit and rest. This paper presents a review regarding TEEs’ adoption to protect data in cloud/fog-based IoT applications, focusing on the two aforementioned technologies. We highlight the challenges in adopting these technologies and discuss the vulnerabilities present in both Intel SGX and ARM TrustZone.
keywords: Confidential computing | Trusted execution environments | Intel SGX | ARM trustZone
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2043 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 2043 :::::::: افراد آنلاین: 46