دانلود و نمایش مقالات مرتبط با اینترنت اشیا::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - اینترنت اشیا

تعداد مقالات یافته شده: 679
ردیف عنوان نوع
1 Intelligent authentication of 5G healthcare devices: A survey
احراز هویت هوشمند دستگاه های مراقبت بهداشتی 5G: یک مرور-2022
The dynamic nature of wireless links and the mobility of devices connected to the Internet of Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers pervasive healthcare applications. On the other hand, it allows eavesdroppers and other illegitimate actors to access secret information. Due to the poor time efficiency and high computational complexity of conventional cryptographic methods and the heterogeneous technologies used, it is easy to compromise the authentication of lightweight wearable and healthcare devices. Therefore, intelligent authentication, which relies on artificial intelligence (AI), and sufficient network resources are extremely important for securing healthcare devices connected to IoT- 5G. This survey considers intelligent authentication and includes a comprehensive overview of intelligent authentication mechanisms for securing IoT-5G devices deployed in the healthcare domain. First, it presents a detailed, thoughtful, and state-of-the-art review of IoT-5G, healthcare technologies, tools, applications, research trends, challenges, opportunities, and solutions. We selected 20 technical articles from those surveyed based on their strong overlaps with IoT, 5G, healthcare, device authentication, and AI. Second, IoT-5G device authentication, radiofrequency fingerprinting, and mutual authentication are reviewed, characterized, clustered, and classified. Third, the review envisions that AI can be used to integrate the attributes of the physical layer and 5G networks to empower intelligent healthcare devices. Moreover, methods for developing intelligent authentication models using AI are presented. Finally, the future outlook and recommendations are introduced for IoT-5G healthcare applications, and recommendations for further research are presented as well. The remarkable contributions and relevance of this survey may assist the research community in understanding the research gaps and the research opportunities relating to the intelligent authentication of IoT-5G healthcare devices.
keywords: اینترنت اشیا (IoT) | امنیت اینترنت اشیا | احراز هویت دستگاه | هوش مصنوعی | امنیت مراقبت های بهداشتی | شبکه های 5g | InternetofThings(IoT) | InternetofThingssecurity | Deviceauthentication | Artificialintelligence | Healthcaresecurity | 5Gnetworks
مقاله انگلیسی
2 Internet of Things-enabled Passive Contact Tracing in Smart Cities
ردیابی تماس غیرفعال با قابلیت اینترنت اشیا در شهرهای هوشمند-2022
Contact tracing has been proven an essential practice during pandemic outbreaks and is a critical non-pharmaceutical intervention to reduce mortality rates. While traditional con- tact tracing approaches are gradually being replaced by peer-to-peer smartphone-based systems, the new applications tend to ignore the Internet-of-Things (IoT) ecosystem that is steadily growing in smart city environments. This work presents a contact tracing frame- work that logs smart space users’ co-existence using IoT devices as reference anchors. The design is non-intrusive as it relies on passive wireless interactions between each user’s carried equipment (e.g., smartphone, wearable, proximity card) with an IoT device by uti- lizing received signal strength indicators (RSSI). The proposed framework can log the iden- tities for the interacting pair, their estimated distance, and the overlapping time duration. Also, we propose a machine learning-based infection risk classification method to char- acterize each interaction that relies on RSSI-based attributes and contact details. Finally, the proposed contact tracing framework’s performance is evaluated through a real-world case study of actual wireless interactions between users and IoT devices through Bluetooth Low Energy advertising. The results demonstrate the system’s capability to accurately cap- ture contact between mobile users and assess their infection risk provided adequate model training over time. © 2021 Elsevier B.V. All rights reserved.
keywords: بلوتوث کم انرژی | ردیابی تماس | اینترنت اشیا | طبقه بندی خطر عفونت | Bluetooth Low Energy | Contact Tracing | Internet of Things | Infection Risk Classification
مقاله انگلیسی
3 IoT anomaly detection methods and applications: A survey
روش ها و کاربردهای تشخیص ناهنجاری اینترنت اشیا: یک مرور-2022
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly expanding field. This growth necessitates an examination of application trends and current gaps. The vast majority of those publications are in areas such as network and infrastructure security, sensor monitoring, smart home, and smart city applications and are extending into even more sectors. Recent advancements in the field have increased the necessity to study the many IoT anomaly detection applications. This paper begins with a summary of the detection methods and applications, accompanied by a discussion of the categorization of IoT anomaly detection algorithms. We then discuss the current publications to identify distinct application domains, examining papers chosen based on our search criteria. The survey considers 64 papers among recent publications published between January 2019 and July 2021. In recent publications, we observed a shortage of IoT anomaly detection methodologies, for example, when dealing with the integration of systems with various sensors, data and concept drifts, and data augmentation where there is a shortage of Ground Truth data. Finally, we discuss the present such challenges and offer new perspectives where further research is required.
keywords: Anomaly detection | Internet of Things | IoT | Review | Survey | Applications
مقاله انگلیسی
4 IoT architecture for continuous long term monitoring: Parkinson’s Disease case study
معماری اینترنت اشیا برای نظارت طولانی مدت مداوم: مطالعه موردی بیماری پارکینسون-2022
In recent years, technological advancements and the strengthening of the Internet of Things concepts have led to significant improvements in the technology infrastructures for remote monitoring. This includes telemedicine which is the ensemble of technologies and tools involved in medical services, from consultations, to diagnosis, prescriptions, treatment and patient monitoring, all done remotely via an Internet connection.
Developing a telemedicine framework capable of monitoring patients over a continuous long-term monitoring window may encounter various issues related to the battery life of the device or the accuracy of the retrieved data. Moreover, it is crucial to develop an IoT architecture that is adaptable to various scenarios and the ongoing changes of the application scenario under analysis.
In this work, we present an IoT architecture for continuous long-term monitoring of patients. Furthermore, as a real scenario case study, we adapt our IoT architecture for Parkinson’s Disease management, building up the PDRMA (Parkinson’s disease remote monitoring architecture). Performance analysis for optimal operation with respect to temperature and daily battery life is conducted. Finally, a multi-parameter app for the continuous monitoring of Parkinson’s patients is presented.
keywords: IoT | Telemedicine | Continuous long term monitoring | Parkinson’s disease | e-Health
مقاله انگلیسی
5 IoT-based Prediction Models in the Environmental Context: A Systematic Literature Review
مدل‌های پیش‌بینی مبتنی بر اینترنت اشیا در زمینه محیطی: مروری بر ادبیات سیستماتیک-2022
Undoubtedly, during the last years climate change has alerted the research community of the natural environment sector. Furthermore, the advent of Internet of Things (IoT) paradigm has enhanced the research activity in the environmental field offering low-cost sensors. Moreover, artificial intelligence and more specifically, statistical and machine learning methodologies have proved their predictive power in many disciplines and various real-world problems. As a result of the aforementioned, many scientists of the environmental research field have performed prediction models exploiting the strength of IoT data. Hence, insightful information could be extracted from the review of these research works and for this reason, a Systematic Literature Review (SLR) is introduced in the present manuscript in order to summarize the recent studies of the field under specific rules and constraints. From the SLR, 54 primary studies have been extracted during 2017-2021. The analysis showed that many IoT-based prediction models have been applied the previous years in 10 different environmental issues, presenting in the majority of the primary studies promising results.
keywords: Natural Environment | Internet of Things | Prediction Models | Systematic Literature Review
مقاله انگلیسی
6 IoTracker: A probabilistic event tracking approach for data-intensive IoT Smart Applications
IoTracker: یک رویکرد ردیابی رویداد احتمالی برای برنامه‌های هوشمند اینترنت اشیا با داده های فشرده-2022
Smart Applications for cities, industry, farming and healthcare use Internet of Things (IoT) approaches to improve the general quality. A dependency on smart applications implies that any misbehavior may impact our society with varying criticality levels, from simple inconveniences to life-threatening dangers. One critical challenge in this area is to overcome the side effects caused by data loss due to failures in software, hardware, and communication systems, which may also affect data logging systems. Event traceability and auditing may be impaired when an application makes automated decisions and the operating log is incomplete. In an environment where many events happen automatically, an audit system must understand, validate, and find the root causes of eventual failures. This paper presents a probabilistic approach to track sequences of events even in the face of logging data loss using Bayesian networks. The results of the performance analysis with three smart application scenarios show that this approach is valid to track events in the face of incomplete data. Also, scenarios modeled with Bayesian subnets highlight a decreasing complexity due to this divide and conquer strategy that reduces the number of elements involved. Consequently, the results improve and also reveal the potential for further advancement.
Keywords: Smart applications | Event tracker | Probabilistic tracker | Bayesian networks
مقاله انگلیسی
7 iRestroom : A smart restroom cyberinfrastructure for elderly people
iRestroom: زیرساخت سایبری سرویس بهداشتی هوشمند برای افراد مسن-2022
According to a report by UN and WHO, by 2030 the number of senior people (age over 65) is projected to grow up to 1.4 billion, and which is nearly 16.5% of the global population. Seniors who live alone must have their health state closely monitored to avoid unexpected events (such as a fall). This study explains the underlying principles, methodology, and research that went into developing the concept, as well as the need for and scopes of a restroom cyberinfrastructure system, that we call as iRestroom to assess the frailty of elderly people for them to live a comfortable, independent, and secure life at home. The proposed restroom idea is based on the required situations, which are determined by user study, socio-cultural and technological trends, and user requirements. The iRestroom is designed as a multi-sensory place with interconnected devices where carriers of older persons can access interactive material and services throughout their everyday activities. The prototype is then tested at Texas A&M University-Kingsville. A Nave Bayes classifier is utilized to anticipate the locations of the sensors, which serves to provide a constantly updated reference for the data originating from numerous sensors and devices installed in different locations throughout the restroom. A small sample of pilot data was obtained, as well as pertinent web data. The Institutional Review Board (IRB) has approved all the methods.
keywords: اینترنت اشیا | حسگرها | نگهداری از سالمندان | سیستم های هوشمند | یادگیری ماشین | IoT | Sensors | Elder Care | Smart Systems | Machine Learning
مقاله انگلیسی
8 Is the Internet of Things a helpful employee? An exploratory study of discourses of Canadian farmers
آیا اینترنت اشیا یک کارمند مفید است؟ بررسی اکتشافی گفتمان های کشاورزان کانادایی-2022
The increasing global population and the growing demand for high-quality products have called for the modernization of agriculture. “Internet of Things” is one of the technologies that is pre- dicted to offer many solutions. We conducted a discourse analysis of 19 interviews with farmers in Ontario, Canada, asking them to describe their experience of working with IoT and related technologies. One main discourse with two opposing tendencies was identified: farmers recognize their relationship with IoT and related technology and view technology as a kind of “employee”, but some tend to emphasize (1) an optimistic view which is discourse of technology is a “Helpful Employee”; while others tend to emphasize (2) a pessimistic view which is a discourse of tech- nology is an “Untrustworthy Employee”. We examine these tendencies in the light of the literature on organizational behavior and identify potential outcomes of these beliefs. The results suggest that a farmer’s style of approaching technology can be assessed on a similar scale as managers’ view of their employees and provide a framework for further research.
keywords: فناوری اینترنت اشیا | کشاورزی | تحلیل گفتمان | سبک استفاده از تکنولوژی | Internet of things technology | Agriculture | Discourse analysis | Style of use of technology
مقاله انگلیسی
9 Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
اجرای کارآمد توابع هش سبک در GPU و کامپیوترهای کوانتومی برای کاربردهای اینترنت اشیا-2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cybersecurity attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions. Recently, US National Institute of Standards and Technology (NIST) announced a competition to standardize lightweight hash functions, which can be used in IoT applications. IoT communication involves various hardware platforms, from low-end microcontrollers to high-end cloud servers with GPU accelerators. Since many sensor nodes are connected to the gateway devices and cloud servers, performing high throughput integrity check is important to secure IoT applications. However, this is a time consuming task even for high-end servers, which may affect the response time in IoT systems. Moreover, no prior work had evaluated the performance of NIST candidates on contemporary processors like GPU and quantum computers. In this study, we showed that with carefully crafted implementation techniques, all the finalist hash function candidates in the NIST standardization competition can achieve high throughput (up-to 1,000 Gbps) on a RTX 3080 GPU. This research output can be used by IoT gateway devices and cloud servers to perform data integrity checks at high speed, thus ensuring a timely response. In addition, this is also the first study that showcase the implementation of NIST lightweight hash functions on a quantum computer (ProjectQ). Besides securing the communication in IoT, these efficient implementations on a GPU and quantum computer can be used to evaluate the strength of respective hash functions against brute-force attack.
INDEX TERMS: Graphics processing units (GPU) | hash function | lightweight cryptography | quantum computer.
مقاله انگلیسی
10 Post-Quantum Blockchain-Based Data Sharing for IoT Service Providers
به اشتراک گذاری داده های مبتنی بر بلاک چین پسا کوانتومی برای ارائه دهندگان خدمات اینترنت اشیا-2022
Quantum technologies have made significant advances and are likely to lead to important security challenges and threats to networks in the near future. On the other hand, sharing the huge amount of data from the Internet of Things (IoT) in the context of data as a service could provide new revenue streams for infrastructure providers and service providers. However, post-quantum computing exposes the entire data sharing ecosystem to a new set of security risks. In this article, we propose a novel blockchain-based system for data sharing in the post-quantum era. The proposed system facilitates data sharing among multiple organizations while meeting compliance and regulatory requirements via private blockchain. We implemented the proposed architecture and information flow using three blockchain networks (namely Hyperledger Fabric, Ethereum, and Quorum) and selected NTRU as our quantum resistant security algorithm (QRSA) to compare the parallelization performance of Toom-Cook’s and Karatsuba’s computation methods. Experimental results show that parallel computation has a positive impact when the security level of QRSAs is lowered, and the transaction time savings is almost 50 percent in favor of Quorum. Finally, we outline the main challenges and potential solutions.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3787 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 38054 :::::::: افراد آنلاین: 45