Recent Articles

Open access

ISSN: 2667-3452

IoT: Communication protocols and security threats

In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security...

Share article

Metaverse from Philosophy

When Facebook changed its name to Meta, the upsurge of the metaverse was violently set off. Every company starts claiming they're working on the Metaverse, and everybody talks about the Metaverse. There...

Share article

Seagull optimization algorithm based multi-objective VM placement in edge-cloud data centers

Edge-Cloud Datacenters (ECDCs) have been massively exploited by the owners of technology and industrial centers to satisfy the user demand. At the same time, the amount of energy used by these data...

Share article

Detection-based active defense of biased injection attack based on robust adaptive controller

As the promising technology, the cooperative cyber-physical system can enhance the operating efficiency and reliability of smart grids. Meanwhile, the characteristics that deep integration of cyber-physical...

Share article

A blockchain-based decentralized collaborative learning model for reliable energy digital twins

This paper proposes a blockchain-based decentralized collaborative learning method for the Industrial Internet environment to solve the trust and security issues in Federated Learning. Deploy a decentralized...

Share article

RTP transport in IoT MQTT topologies

Media transmission in the context of constrained IoT devices is of critical importance to support several solutions that enable interaction with the physical environment. This includes solutions that...

Share article

Stability analysis of spatially interconnected systems with signal saturation

The robust stability problem of spatially interconnected systems with signal saturation among the many composed subsystems is considered. The system structure is usually sparse, and each subsystem has...

Share article

PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles charging scenarios for V2G networks

With the improvement of people's awareness of environmental protection, electric vehicles (EVs) are becoming more and more popular, and the issue of vehicle to grid (V2G) energy trading is also put...

Share article

Edge AI: A survey

Artificial Intelligence (AI) at the edge is the utilization of AI in real-world devices. Edge AI refers to the practice of doing AI computations near the users at the network's edge, instead of centralised...

Share article

Android malware classification using optimum feature selection and ensemble machine learning

The majority of smartphones on the market run on the Android operating system. Security has been a core concern with this platform since it allows users to install apps from unknown sources. With thousands...

Share article

A fatigue assessment method based on attention mechanism and surface electromyography

Surface electromyography (sEMG) signals can be used to quantitatively assess muscle fatigue, thereby directly and objectively reflecting the functional state of neuromuscular activity. Effective fatigue...

Share article

ChatGPT: A comprehensive review on background, applications, key challenges, bias, ethics, limitations and future scope

In recent years, artificial intelligence (AI) and machine learning have been transforming the landscape of scientific research. Out of which, the chatbot technology has experienced tremendous advancements...

Share article

Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a reputation for not only building Machine Learning (ML) models that rely on distributed datasets, but also for starting to...

Share article

A systematic review on the current research of digital twin in automotive application

Digital Twin (DT) has been considered one of the most promising technologies promoting the development of the industry and has successfully achieved significant applications in many fields including...

Share article

Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices...

Share article

Internet of things for smart factories in industry 4.0, a review

The Internet of Things (IoT) is playing a significant role in the transformation of traditional factories into smart factories in Industry 4.0 by using network of interconnected devices, sensors, and...

Share article

Development of a smart sensing unit for LoRaWAN-based IoT flood monitoring and warning system in catchment areas

This study introduces a novel flood monitoring and warning system (FMWS) that leverages the capabilities of long-range wide area networks (LoRaWAN) to maintain extensive network connectivity, consume...

Share article

REST and EDA architectures in IoT actuation

While most Internet of Things (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts...

Share article

Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions

Web3, the next generation web, promises a decentralized and democratized internet that puts users in control of their data and online identities. However, Web3 faces significant challenges, including...

Share article

ChatGPT: Vision and challenges

Artificial intelligence (AI) and machine learning have changed the nature of scientific inquiry in recent years. Of these, the development of virtual assistants has accelerated greatly in the past few...

Share article

Fortaleza: The emergence of a network hub

Digitalisation, accelerated by the pandemic, has brought the opportunity for companies to expand their businesses beyond their geographic location and has considerably affected networks around the world....

Share article

Blockchain inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0

A cyber-physical system is considered to be a collection of strongly coupled communication systems and devices that poses numerous security trials in various industrial applications including healthcare....

Share article

A robust transmission with enhancement of 5G PHY using FBMC and AMC for machine-to-machine communication node

Advancement of 5G new radios has enabled more robust communication for the Machine-to-Machine (M2M) communication node, using filter bank multicarrier (FBMC). This paper focuses on robust transmission...

Share article

New trends on computer vision applied to mobile robot localization

This work presents a systematic review of computer vision techniques for locating mobile robots. Its main objectives are to analyze the latest technology in use to locate mobile robots. In addition,...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.