Article
Computer Science, Information Systems
Phudit Ampririt, Shunya Higashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli
Summary: This study presents two fuzzy-based handover decision models for 5G wireless networks considering different network slicing parameters. The simulation results show that the considered parameters have different effects on handover decision. Additionally, the results indicate that the FHDM2 model performs better than the FHDM1 model since it considers four input parameters.
INTERNET OF THINGS
(2023)
Article
Computer Science, Hardware & Architecture
Ismaeel Al Ridhawi, Safa Otoum
Summary: In the past few decades, fixed infrastructures have been the optimal solution for meeting the connectivity and reliability requirements of moving devices. However, in the era of the Internet of Things, this solution is no longer feasible. With the increasing number of connected and mobile devices, connectivity and reliability issues have become more prominent. This article discusses solutions that utilize connected vehicles, UAVs, and other moving intelligent devices to provide connectivity support and enable intelligent services and applications management.
Article
Computer Science, Information Systems
Ijaz Ahmad, Zeeshan Asghar, Tanesh Kumar, Gaolei Li, Ahsan Manzoor, Konstantin Mikhaylov, Syed Attique Shah, Marko Hoyhtya, Jarmo Reponen, Jyrki Huusko, Erkki Harjula
Summary: This article discusses the latest technologies and technological paradigms in remote health care, emphasizing the need to use the latest technological developments and conducting a survey of existing technologies, challenges, and solutions. It also presents research gaps and future research directions to motivate further research in remote health care.
Article
Computer Science, Information Systems
Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang, Longxiang Gao, Lianhua Chi, Shui Yu
Summary: In this article, an effective 5G-IoT node authentication approach is proposed using unique radio frequency fingerprinting data to train a Deep learning model for detecting legitimate and nonlegitimate IoT nodes. The approach is based on Mahalanobis Distance theory and Chi-square distribution theories, achieving higher detection accuracy (99.35%) and lower training time compared to existing approaches. The experiments conducted verify the feasibility of the proposed approach in real-life scenarios using ETSI-open source NFV management and orchestration platform on AWS cloud platform.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Chemistry, Analytical
Constantin Lucian Aldea, Razvan Bocu, Anca Vasilescu
Summary: This paper describes the cybersecurity problems considered during the development of a proposed microservices architecture. The underlying hardware components and networks affect the service composition mechanisms and their security. The overall speedup of platforms using new 5G networks and performant IoT devices can be wasted by inadequate combination of authentication services, misplacing of encryption services, or inappropriate subsystem scaling. The Spring Boot alternative is used to implement various services and assemble them into a secure microservices architecture. Relevant security aspects in the medical and energy domains are also analyzed and discussed based on the designed architecture. Well-designed and orchestrated architectures that consider proper security aspects can lead to stable and secure software platforms for end users.
Review
Chemistry, Multidisciplinary
Malgorzata Krystek, Artur Ciesielski, Paolo Samori
Summary: Graphene and related materials are powerful components for boosting concrete technology and constructing smart buildings, with potential applications in structural health monitoring.
ADVANCED FUNCTIONAL MATERIALS
(2021)
Article
Computer Science, Information Systems
Md Munjure Mowla, Iftekhar Ahmad, Daryoush Habibi, Quoc Viet Phung, M. Ishtiaque Aziz Zahed
Summary: This research investigates the green backhauling challenge of the hybrid FSO/mmWave backhauling system and proposes a more energy-efficient solution.
COMPUTER COMMUNICATIONS
(2022)
Review
Computer Science, Information Systems
Jun Liu, Lei Shu, Xu Lu, Ye Liu
Summary: In the future, modern agriculture will face significant challenges in increasing production, sustainability, wisdom, and efficiency. With the popularization of 5G and advanced information technologies, such as IoT and AI, smart agriculture is evolving. This paper investigates the research progress of 5G IoT in smart agriculture, presents its development status, and explores its concept, architecture, enabling key technologies, and application value.
Article
Mathematical & Computational Biology
Delong Cui, Hong Huang, Zhiping Peng, Qirui Li, Jieguang He, Jinbo Qiu, Xinlong Luo, Jiangtao Ou, Chengyuan Fan
Summary: This study aims to develop an intelligent health-monitoring platform for ethylene cracking furnace tubes based on 5G communication technology, using mixed computing and deep learning techniques. The platform enhances the automation and intelligence of the industry and promotes technological progress and transformation.
MATHEMATICAL BIOSCIENCES AND ENGINEERING
(2022)
Review
Computer Science, Information Systems
Rustam Pirmagomedov, Yevgeni Koucheryavy
Summary: This article discusses the enhancement of human abilities through IoT technology and the challenges associated with IoT-empowered Augmented Human (AH), aiming to spark readers' interest in this topic.
INTERNET OF THINGS
(2021)
Article
Computer Science, Hardware & Architecture
Wei Wang, Rui Qu, Haijun Liao, Zhao Wang, Zhenyu Zhou, Zhongyuan Wang, Shahid Mumtaz, Mohsen Guizani
Summary: This article proposes a 5G MEC-based intelligent computation offloading framework for power robotic inspection tasks. It addresses the low-latency computation offloading problem using an artificial intelligence algorithm and provides simulation results to verify its superiority.
IEEE WIRELESS COMMUNICATIONS
(2023)
Article
Computer Science, Theory & Methods
Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss
Summary: This paper proposes a security mechanism utilizing beam pattern features for detecting wireless spoofing attacks in NGIoT networks, achieving a detection accuracy of 98.6% in experiments.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Review
Nanoscience & Nanotechnology
Anand Saminathan, Matthew Zajac, Palapuravan Anees, Yamuna Krishnan
Summary: Intracellular organelles are subsystems within a cell that reflect the metabolic state of the cell, and biological pathways can be exploited to target exogenous cargo to specific organelles with nucleic acids as suitable delivery vehicles.
NATURE REVIEWS MATERIALS
(2022)
Article
Chemistry, Multidisciplinary
Mamoona Humayun, Noor Zaman Jhanjhi, Abdullah Almotilag
Summary: This research proposes a cutting-edge technologies-based model, RTSHPMP, which aims to improve passenger safety on Saudi highways through real-time monitoring and data sharing. The model utilizes IoT and cloud technologies to enable real-time data collection and information dissemination in vehicles, with support from local and national authorities for emergency assistance and other support. The empirical study results demonstrate that the model provides an efficient and secure mechanism for traveler safety when needed.
APPLIED SCIENCES-BASEL
(2022)
Article
Computer Science, Information Systems
Nasser Ahmed, Nasser-Eddine Rikli
Summary: The paper proposes a QoS-enabled algorithm to aggregate MTCD traffic from various sources based on source type and delay requirements. Different queues are established for different types of MTCD traffic, with resources assigned to the aggregated MTC traffic instead of individual assignments. Simulation models are used to evaluate the proposed algorithms, showing improvements in LTE resource utilization for MTCDs with a negative effect on H2H users in the first scheme, and positive improvements for both MTCDs and H2H users in the second scheme.