Match!
IEEE Internet of Things Journal
IF
9.52
Papers
2007
Papers 2780
1 page of 278 pages (2,780 results)
Newest
Source
#1Jing QiuH-Index: 4
#2Zhihong TianH-Index: 8
Last. Binxing Fang (GU: Guangzhou University)H-Index: 2
view all 6 authors...
With the development of Internet-of-Things (IoT) technology, various types of information, such as social resources and physical resources, are deeply integrated for different comprehensive applications. Social networking, car networking, medical services, video surveillance, and other forms of the IoT information service model gradually change people’s daily lives. Facing the vast amounts of IoT information data, the IoT search technology is used to quickly find accurate information to meet the...
5 CitationsSource
#1Yujiong LiuH-Index: 2
#2Shangguang WangH-Index: 23
Last. Fangchun YangH-Index: 26
view all 7 authors...
Vehicular edge computing (VEC) offers a new paradigm to improve vehicular services and augment the capabilities of vehicles. In this article, we study the problem of task scheduling in VEC, where multiple computation-intensive vehicular applications can be offloaded to roadside units (RSUs) and each application can be further divided into multiple tasks with task dependency. The tasks can be scheduled to different mobile-edge computing servers on RSUs for execution to minimize the average comple...
1 CitationsSource
#1Ramyad HadidiH-Index: 5
#2Jiashen CaoH-Index: 3
Last. Hyesoon KimH-Index: 26
view all 4 authors...
Recent advancements in deep neural networks (DNNs) have enabled us to solve traditionally challenging problems. To deploy a service based on DNNs, since DNNs are compute intensive, consumers need to rely on compute resources in the cloud. This approach, in addition to creating a dependency on the high-quality network infrastructure and data centers, raises new privacy concerns because of the sharing of private data. These concerns and challenges limit the widespread use of DNN-based applications...
Source
Massive robust communication demands among machines and humans are required in ubiquitous Internet-of-Things (IoT) applications. To design the appropriate communication system, the knowledge of the propagation characteristics for various IoTs scenarios is necessary. In this article, a measurement-based neural-network-based root-mean-square (RMS) delay spread model for ubiquitous indoor IoTs scenarios is presented. The proposed model is a two-layer feedforward neural network plus a random variabl...
Source
Internet of Things (IoT) is a technology that has overgrown and whose interest lies in the connection of diverse kinds of devices to collect and exchange data. Since most IoT devices are mobile, the hardware resources are hard limited; thus, complexity reduction becomes a relevant concern in this context. Bluetooth low energy (BLE) communication standard has an important position in IoT due to its Gaussian frequency-shift keying (GFSK) modulation scheme employed in the physical layer, which prov...
Source
#1Jun Liu (JLU: Jilin University)H-Index: 3
Last. Debing WeiH-Index: 2
view all 5 authors...
As one of the most promising networks, the space–air–ground–aqua integrated network (SAGAIN) has the characteristics of wide coverage and large information capacity, which can meet various requests from users in different domains. With the rapid growth of data and information generated by the Internet of Things (IoT), SAGAIN has received much attention in recent years. However, the existing network architectures are not capable of providing personalized network services according to different ta...
Source
#1Zehui XiongH-Index: 13
#2Shaohan FengH-Index: 4
Last. Bin LinH-Index: 8
view all 6 authors...
A sponsored content policy enables a content provider (CP) to pay a network service provider (SP), and thereby mobile users (MUs) can access contents from the CP through network services from the SP with a lower charge. Thus, more users want to access the contents which potentially generates more profit gain to the CP. In this article, we study the interactions among three entities under the sponsored content policy, namely, the network SP, which is referred to as SP for brevity, the CP and MUs....
Source
#1Jin CaoH-Index: 12
#2Zheng YanH-Index: 22
Last. Hui LiH-Index: 1
view all 6 authors...
As a development of the next generation of mobile communication networks and systems (5G), the Third-Generation Partnership Project (3GPP) committee has standardized a new 5G authentication and key-agreement (5G-AKA) protocol to ensure the access security of a mobile equipment. However, there are still some security vulnerabilities in the 5G-AKA protocol, and there is no authentication protocol proposed for massive device concurrent connection by the 3GPP working groups. In this article, we prop...
Source
#1Mostafa HaghiH-Index: 3
#2Sebastian NeubertH-Index: 7
Last. Kerstin ThurowH-Index: 20
view all 7 authors...
The concentration in the new era of healthcare is the medical Internet of Things (IoT) according to preventive and prediction ( p^{2}~Health). In large scale and general perspective, the effective parameters from behavioral, ambient, and physiological domains as the most influencing fields of interest in healthcare must be monitored. In personalized healthcare monitoring, wearables are playing an important role in terms of data measurement and collection. We aim at creating a configurable and...
Source
12345678910
Top fields of study
Distributed computing
Wireless sensor network
Computer network
Computer science
Wireless
Cloud computing