internet of things

The growing demand to address environmental sustainability and climate change has emphasized the need for innovative solutions in supply chain and energy management. This study investigates the transformative role of the Internet of Things (IoT) in reducing carbon footprints and optimizing energy utilization within supply chains. A well-structured methodology was employed including regression modeling, cluster analysis, IoT simulation frameworks and optimization techniques. The data was collected from diverse energy and emission databases.

Categories:
70 Views

Distributed-Optimization with Centralized-Refining (DO-CR) mechanism to achieve more efficient resource allocation by engaging both access point and all devices. Specifically, the new DO-CR mechanism first utilizes the distributed processing capacity of all devices, allowing them to optimize their own resource allocation schemes through a new resource reservation and reporting technique. Then a centralized optimizer generates a graph of resource trading topology based on individual optimization results and achieves the Pareto optimal solution by the graph-based algorithm.

Categories:
147 Views

Privacy perception refers to the control individuals have over the use of their data, including determining who can access, share, and utilize it without interference or intrusion. In the context of the Internet of Things (IoT), particularly in Smart Home Data Monetization (SH-DM), users’ data is aggregated and made available to potential service providers to target end users with personalized advertisements.

Categories:
430 Views

The Integrated Energy Management and Forecasting Dataset is a comprehensive data collection specifically designed for advanced algorithmic modeling in energy management. It combines two distinct yet complementary datasets - the Energy Forecasting Data and the Energy Grid Status Data - each tailored for different but related purposes in the energy sector.

Categories:
3262 Views

This quantitative correlational research study aimed to investigate the factors affecting the implementation of zero-trust security and multifactor authentication (MFA) in a fog computing environment. Fog computing is an emerging decentralized technology that extends cloud computing capabilities near the user. A fog computing environment helps in faster communication with the internet of things (IoT) devices and reduces data transmission overheads.

Categories:
555 Views

This dataset is supplementary material for our paper "PUF for the Commons: Enhancing Embedded Security on the OS Level".

Categories:
543 Views

We are delighted to present a comprehensive video showcasing our operational prototype designed specifically for intravenous therapy. The submitted video shows the sequential flow of the entire process, starting from the preparatory phase to initiate fluid therapy and seamlessly transitioning into the administration phase. It highlights the real-time integration of our fabricated device with a web browser and an automated control system, ensuring the high precision and accuracy in fluid administration.

Categories:
22 Views

This dataset contains full details of the use case scenarios. Those can be used for effort elicitation using the adapted Use Case Points method. Despite the extensive use of UCP in software engineering, it has yet to be adapted for IoT systems, which is essential for project management and resource planning. Our proposed adaptation, UCP for IoT, is based on a four-layer IoT architecture and tailors the standard software UCP to the specifications of IoT systems.

Categories:
164 Views

This dataset consists of “.csv” files of 4 different routing attacks (Blackhole Attack, Flooding Attack, DODAG Version Number Attack, and Decreased Rank Attack) targeting the RPL protocol, and these files are taken from Cooja (Contiki network simulator). It allows researchers to develop IDS for RPL-based IoT networks using Artificial Intelligence and Machine Learning methods without simulating attacks. Simulating these attacks by mimicking real-world attack scenarios is essential to developing and testing protection mechanisms against such attacks.

Categories:
3806 Views

This dataset is hosted on IEEE DataPort(TM), a data repository created by IEEE to facilitate research reproducibility. A Systematic Literature Review SLR is presented on information retrieval for IoT and WoT scenarios, containing the definition of the research questions and the selection strategy. We specify the inclusion and exclusion criteria in conjunction with the quality assurance criteria. The data extraction procedure is then outlined.

Categories:
233 Views

Pages