Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (59)

Search Parameters:
Keywords = Internet of Everything (IoE)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
36 pages, 3756 KiB  
Article
The IoT/IoE Integrated Security & Safety System of Pompeii Archeological Park
by Alberto Bruni and Fabio Garzia
Appl. Sci. 2025, 15(13), 7359; https://doi.org/10.3390/app15137359 - 30 Jun 2025
Viewed by 346
Abstract
Pompeii is widely known for its tragic past. In 79 A.D., a massive eruption of Mount Vesuvius buried the city and its inhabitants under volcanic ash. Lost for centuries, it was rediscovered in 1748 when the Bourbon monarchs initiated excavations, marking the beginning [...] Read more.
Pompeii is widely known for its tragic past. In 79 A.D., a massive eruption of Mount Vesuvius buried the city and its inhabitants under volcanic ash. Lost for centuries, it was rediscovered in 1748 when the Bourbon monarchs initiated excavations, marking the beginning of systematic digs. Since then, Pompeii has gained worldwide recognition for its archeological wonders. Despite centuries of looting and damage, it remains a breathtaking site. With millions of visitors annually, the Pompeii Archeological Park is the one most visited site in Italy. Managing such a vast and complex heritage site requires significant effort to ensure both visitor safety and the preservation of its fragile structures. Accessibility is also crucial, particularly for individuals with disabilities and staff responsible for site management. To address these challenges, integrated systems and advanced technologies like the Internet of Things/Everything (IoT/IoE) can provide innovative solutions. These technologies connect people, smart devices (such as mobile terminals, sensors, and wearables), and data to optimize security, safety, and site management. This paper presents a security/safety IoT/IoE-based system for security, safety, management, and visitor services at the Pompeii Archeological Park. Full article
(This article belongs to the Special Issue Advanced Technologies Applied to Cultural Heritage)
Show Figures

Figure 1

36 pages, 6950 KiB  
Article
Image-Based Malicious Network Traffic Detection Framework: Data-Centric Approach
by Doo-Seop Choi, Taeguen Kim, Boojoong Kang and Eul Gyu Im
Appl. Sci. 2025, 15(12), 6546; https://doi.org/10.3390/app15126546 - 10 Jun 2025
Viewed by 565
Abstract
With the advancement of network communication technology and Internet of Everything (IoE) technology, which connects all edge devices to the internet, the network traffic generated in various platform environments is rapidly increasing. The increase in network traffic makes it more difficult for the [...] Read more.
With the advancement of network communication technology and Internet of Everything (IoE) technology, which connects all edge devices to the internet, the network traffic generated in various platform environments is rapidly increasing. The increase in network traffic makes it more difficult for the detection system to analyze and detect malicious network traffic generated by malware or intruders. Additionally, processing high-dimensional network traffic data requires substantial computational resources, limiting real-time detection capabilities in practical deployments. Artificial intelligence (AI) algorithms have been widely used to detect malicious traffic, but most previous work focused on improving accuracy with various AI algorithms. Many existing methods, in pursuit of high accuracy, directly utilize the extensive raw features inherent in network traffic. This often leads to increased computational overhead and heightened complexity in detection models, potentially degrading overall system performance and efficiency. Furthermore, high-dimensional data often suffers from the curse of dimensionality, where the sparsity of data in high-dimensional space leads to overfitting, poor generalization, and increased computational complexity. This paper focused on feature engineering instead of AI algorithm selections, presenting an approach that uniquely balances detection accuracy with computational efficiency through strategic dimensionality reduction. For feature engineering, two jobs were performed: feature representations and feature analysis and selection. With effective feature engineering, we can reduce system resource consumption in the training period while maintaining high detection accuracy. We implemented a malicious network traffic detection framework based on Convolutional Neural Network (CNN) with our feature engineering techniques. Unlike previous approaches that use one-hot encoding, which increases dimensionality, our method employs label encoding and information gain to preserve critical information while reducing feature dimensions. The performance of the implemented framework was evaluated using the NSL-KDD dataset, which is the most widely used for intrusion detection system (IDS) performance evaluation. As a result of the evaluation, our framework maintained high classification accuracy while improving model training speed by approximately 17.47% and testing speed by approximately 19.44%. This demonstrates our approach’s ability to achieve a balanced performance, enhancing computational efficiency without sacrificing detection accuracy—a critical challenge in intrusion detection systems. With the reduced features, we achieved classification results of a precision of 0.9875, a recall of 0.9930, an F1-score of 0.9902, and an accuracy of 99.06%, with a false positive rate of 0.65%. Full article
Show Figures

Figure 1

28 pages, 15575 KiB  
Review
Architectural Trends in Collaborative Computing: Approaches in the Internet of Everything Era
by Débora Souza, Gabriele Iwashima, Viviane Cunha Farias da Costa, Carlos Eduardo Barbosa, Jano Moreira de Souza and Geraldo Zimbrão
Future Internet 2024, 16(12), 445; https://doi.org/10.3390/fi16120445 - 29 Nov 2024
Cited by 2 | Viewed by 1376
Abstract
The majority of the global population now resides in cities, and this trend continues to grow. In this context, the Internet of Things (IoT) is crucial in transforming existing urban areas into Smart Cities. However, IoT architectures mainly focus on machine-to-machine interactions, leaving [...] Read more.
The majority of the global population now resides in cities, and this trend continues to grow. In this context, the Internet of Things (IoT) is crucial in transforming existing urban areas into Smart Cities. However, IoT architectures mainly focus on machine-to-machine interactions, leaving human involvement aside. The Internet of Everything (IoE) includes human-to-human and human–machine collaboration, but the specifics of these interactions are still under-explored. As urban populations grow and IoT integrates into city infrastructure, efficient, collaborative architectures become crucial. In this work, we use the Rapid Review methodology to analyze collaboration in four prevalent computing architectures in the IoE paradigm, namely Edge Computing, Cloud Computing, Blockchain/Web Services, and Fog Computing. To analyze the collaboration, we use the 3C collaboration model, comprising communication, cooperation, and coordination. Our findings highlight the importance of Edge and Cloud Computing for enhancing collaborative coordination, focusing on efficiency and network optimization. Edge Computing supports real-time, low-latency processing at data sources, while Cloud Computing offers scalable resources for diverse workloads, optimizing coordination and productivity. Effective resource allocation and network configuration in these architectures are essential for cohesive IoT ecosystems. Therefore, this work offers a comparative analysis of four computing architectures, clarifying their capabilities and limitations. Smart Cities are a major beneficiary of these insights. This knowledge can help researchers and practitioners choose the best architecture for IoT and IoE environments. Additionally, by applying the 3C collaboration model, the article provides a framework for improving collaboration in IoT and IoE systems. Full article
(This article belongs to the Special Issue IoT, Edge, and Cloud Computing in Smart Cities)
Show Figures

Figure 1

22 pages, 4831 KiB  
Article
Kinodynamic Model-Based UAV Trajectory Optimization for Wireless Communication Support of Internet of Vehicles in Smart Cities
by Mohsen Eskandari, Andrey V. Savkin and Mohammad Deghat
Drones 2024, 8(10), 574; https://doi.org/10.3390/drones8100574 - 11 Oct 2024
Cited by 4 | Viewed by 1956
Abstract
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. [...] Read more.
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. UAVs autonomously navigate through dense urban areas to provide aerial line-of-sight (LoS) communication links for IoVs. Real-time UAV trajectory design is required for minimum energy consumption and maximum channel performance. However, this is multidisciplinary research including (1) dynamic-aware kinematic (kinodynamic) planning by considering UAVs’ motion and nonholonomic constraints; (2) channel modeling and channel performance improvement in future wireless networks (i.e., beyond 5G and 6G) that are limited to beamforming to LoS links with the aid of reconfigurable intelligent surfaces (RISs); and (3) real-time obstacle-free crash avoidance 3D trajectory optimization in dense urban areas by modeling obstacles and LoS paths in convex programming. Modeling and solving this multilateral problem in real-time are computationally prohibitive unless extensive computational and overhead processing costs are imposed. To pave the path for computationally efficient yet feasible real-time trajectory optimization, this paper presents UAV kinodynamic modeling. Then, it proposes a convex trajectory optimization problem with the developed linear kinodynamic models. The optimality and smoothness of the trajectory optimization problem are improved by utilizing model predictive control and quadratic state feedback control. Simulation results are provided to validate the methodology. Full article
Show Figures

Figure 1

23 pages, 1008 KiB  
Article
A Channel-Sensing-Based Multipath Multihop Cooperative Transmission Mechanism for UE Aggregation in Asymmetric IoE Scenarios
by Hua-Min Chen, Ruijie Fang, Shoufeng Wang, Zhuwei Wang, Yanhua Sun and Yu Zheng
Symmetry 2024, 16(9), 1225; https://doi.org/10.3390/sym16091225 - 18 Sep 2024
Viewed by 1501
Abstract
With the continuous progress and development of technology, the Internet of Everything (IoE) is gradually becoming a research hotspot. More companies and research institutes are focusing on the connectivity and transmission between multiple devices in asymmetric networks, such as V2X, Industrial Internet of [...] Read more.
With the continuous progress and development of technology, the Internet of Everything (IoE) is gradually becoming a research hotspot. More companies and research institutes are focusing on the connectivity and transmission between multiple devices in asymmetric networks, such as V2X, Industrial Internet of Things (IIoT), environmental monitoring, disaster management, agriculture, and so on. The number of devices and business volume of these applications have rapidly increased in recent years, which will lead to a large load of terminals and affect the transmission efficiency of IoE data transmission. To deal with this issue, it has been proposed to perform data transmission via multipath cooperative transmission with multihop transmission. This approach aims to improve transmission latency, energy consumption, reliability, and throughput. This paper designs a channel-sensing-based cooperative transmission mechanism (CSCTM) with hybrid automatic repeat request (HARQ) for user equipment (UE) aggregation mechanism in future asymmetric IoE scenarios, which ensures that IoE devices data can be transmitted quickly and reliably, and supports real-time data processing and analysis. The main contents of this proposed method include strategies of cooperative transmission and redundancy version (RV) determination, a joint combination of decoding process at the receiving side, and a design of transmission priority through ascending offset sort (AOS) algorithm based on channel sensing. In addition, multihop technology is designed for the multipath cooperative transmission strategy, which enables cooperative nodes (CN) to help UE to transmit data. As a result, it can be obtained that CSCTM provides significant advancements in latency and energy consumption for the whole system. It demonstrates improvements in enhanced coverage, improved reliability, and minimized latency. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

10 pages, 1662 KiB  
Data Descriptor
TM–IoV: A First-of-Its-Kind Multilabeled Trust Parameter Dataset for Evaluating Trust in the Internet of Vehicles
by Yingxun Wang, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri and Hushairi Zen
Data 2024, 9(9), 103; https://doi.org/10.3390/data9090103 - 31 Aug 2024
Cited by 1 | Viewed by 1957
Abstract
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address [...] Read more.
The emerging and promising paradigm of the Internet of Vehicles (IoV) employ vehicle-to-everything communication for facilitating vehicles to not only communicate with one another but also with the supporting roadside infrastructure, vulnerable pedestrians, and the backbone network in a bid to primarily address a number of safety-critical vehicular applications. Nevertheless, owing to the inherent characteristics of IoV networks, in particular, of being (a) highly dynamic in nature and which results in a continual change in the network topology and (b) non-deterministic owing to the intricate nature of its entities and their interrelationships, they are susceptible to a number of malicious attacks. Such kinds of attacks, if and when materialized, jeopardizes the entire IoV network, thereby putting human lives at risk. Whilst the cryptographic-based mechanisms are capable of mitigating the external attacks, the internal attacks are extremely hard to tackle. Trust, therefore, is an indispensable tool since it facilitates in the timely identification and eradication of malicious entities responsible for launching internal attacks in an IoV network. To date, there is no dataset pertinent to trust management in the context of IoV networks and the same has proven to be a bottleneck for conducting an in-depth research in this domain. The manuscript-at-hand, accordingly, presents a first of its kind trust-based IoV dataset encompassing 96,707 interactions amongst 79 vehicles at different time instances. The dataset involves nine salient trust parameters, i.e., packet delivery ratio, similarity, external similarity, internal similarity, familiarity, external familiarity, internal familiarity, reward/punishment, and context, which play a considerable role in ascertaining the trust of a vehicle within an IoV network. Full article
Show Figures

Figure 1

38 pages, 8695 KiB  
Review
Polymer Dielectric-Based Emerging Devices: Advancements in Memory, Field-Effect Transistor, and Nanogenerator Technologies
by Wangmyung Choi, Junhwan Choi, Yongbin Han, Hocheon Yoo and Hong-Joon Yoon
Micromachines 2024, 15(9), 1115; https://doi.org/10.3390/mi15091115 - 31 Aug 2024
Cited by 5 | Viewed by 3677
Abstract
Polymer dielectric materials have recently attracted attention for their versatile applications in emerging electronic devices such as memory, field-effect transistors (FETs), and triboelectric nanogenerators (TENGs). This review highlights the advances in polymer dielectric materials and their integration into these devices, emphasizing their unique [...] Read more.
Polymer dielectric materials have recently attracted attention for their versatile applications in emerging electronic devices such as memory, field-effect transistors (FETs), and triboelectric nanogenerators (TENGs). This review highlights the advances in polymer dielectric materials and their integration into these devices, emphasizing their unique electrical, mechanical, and thermal properties that enable high performance and flexibility. By exploring their roles in self-sustaining technologies (e.g., artificial intelligence (AI) and Internet of Everything (IoE)), this review emphasizes the importance of polymer dielectric materials in enabling low-power, flexible, and sustainable electronic devices. The discussion covers design strategies to improve the dielectric constant, charge trapping, and overall device stability. Specific challenges, such as optimizing electrical properties, ensuring process scalability, and enhancing environmental stability, are also addressed. In addition, the review explores the synergistic integration of memory devices, FETs, and TENGs, focusing on their potential in flexible and wearable electronics, self-powered systems, and sustainable technologies. This review provides a comprehensive overview of the current state and prospects of polymer dielectric-based devices in advanced electronic applications by examining recent research breakthroughs and identifying future opportunities. Full article
(This article belongs to the Special Issue Organic Semiconductors and Devices, 2nd Edition)
Show Figures

Figure 1

53 pages, 8589 KiB  
Review
The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges
by Sanjeev Sharma, Renu Popli, Sajjan Singh, Gunjan Chhabra, Gurpreet Singh Saini, Maninder Singh, Archana Sandhu, Ashutosh Sharma and Rajeev Kumar
Sustainability 2024, 16(16), 7039; https://doi.org/10.3390/su16167039 - 16 Aug 2024
Cited by 23 | Viewed by 12722
Abstract
The deployment of fifth-generation (5G) wireless networks has already laid the ground-work for futuristic smart cities but along with this, it has also triggered the rapid growth of a wide range of applications, for example, the Internet of Everything (IoE), online gaming, extended/virtual [...] Read more.
The deployment of fifth-generation (5G) wireless networks has already laid the ground-work for futuristic smart cities but along with this, it has also triggered the rapid growth of a wide range of applications, for example, the Internet of Everything (IoE), online gaming, extended/virtual reality (XR/VR), telemedicine, cloud computing, and others, which require ultra-low latency, ubiquitous coverage, higher data rates, extreme device density, ultra-high capacity, energy efficiency, and better reliability. Moreover, the predicted explosive surge in mobile traffic until 2030 along with envisioned potential use-cases/scenarios in a smart city context will far exceed the capabilities for which 5G was designed. Therefore, there is a need to harness the 6th Generation (6G) capabilities, which will not only meet the stringent requirements of smart megacities but can also open up a new range of potential applications. Other crucial concerns that need to be addressed are related to network security, data privacy, interoperability, the digital divide, and other integration issues. In this article, we examine current and emerging trends for the implementation of 6G in the smart city arena. Firstly, we give an inclusive and comprehensive review of potential 6th Generation (6G) mobile communication technologies that can find potential use in smart cities. The discussion of each technology also covers its potential benefits, challenges and future research direction. Secondly, we also explore promising smart city applications that will use these 6G technologies, such as, smart grids, smart healthcare, smart waste management, etc. In the conclusion part, we have also highlighted challenges and suggestions for possible future research directions. So, in a single paper, we have attempted to provide a wider perspective on 6G-enabled smart cities by including both the potential 6G technologies and their smart city applications. This paper will help readers gain a holistic view to ascertain the benefits, opportunities and applications that 6G technology can bring to meet the diverse, massive and futuristic requirements of smart cities. Full article
(This article belongs to the Section Sustainable Urban and Rural Development)
Show Figures

Figure 1

19 pages, 3465 KiB  
Article
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
by Zeeshan Ashraf, Adnan Sohail and Muddesar Iqbal
Electronics 2024, 13(13), 2649; https://doi.org/10.3390/electronics13132649 - 5 Jul 2024
Cited by 3 | Viewed by 1935
Abstract
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, [...] Read more.
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between people and people or from one machine to another machine are insecure. Usually, critical data are exchanged over the IoE, so authentication and confidentiality are significant concerns. Asymmetric key cryptosystems increase computation and communication overheads. This paper proposes a lightweight and certificateless end-to-end secure communication scheme to provide security services against replay attacks, man-in-the-middle (MITM) attacks, and impersonation attacks with low computation and communication overheads. The system is implemented on Linux-based Lubuntu 20.04 virtual machines using Java programming connected to NFV-based large-scale hybrid IPv4-IPv6 virtual networks. Finally, we compare the performance of our proposed security scheme with existing schemes based on the computation and communication costs. In addition, we measure and analyze the performance of our proposed secure communication scheme over NFV-based virtualized networks with regard to several parameters like end-to-end delay and packet loss. The results of our comparison with existing security schemes show that our proposed security scheme reduces the computation cost by 38.87% and the communication cost by 26.08%. Full article
(This article belongs to the Special Issue Cyber-Physical Systems in Industrial IoT)
Show Figures

Figure 1

17 pages, 961 KiB  
Review
The Advantage of the 5G Network for Enhancing the Internet of Things and the Evolution of the 6G Network
by Georgios Gkagkas, Dimitrios J. Vergados, Angelos Michalas and Michael Dossis
Sensors 2024, 24(8), 2455; https://doi.org/10.3390/s24082455 - 11 Apr 2024
Cited by 17 | Viewed by 4155
Abstract
The Internet of Things (IoT) is what we have as a great breakthrough in the 5G network. Although the 5G network can support several Internet of Everything (IoE) services, 6G is the network to fully support that. This paper is a survey research [...] Read more.
The Internet of Things (IoT) is what we have as a great breakthrough in the 5G network. Although the 5G network can support several Internet of Everything (IoE) services, 6G is the network to fully support that. This paper is a survey research presenting the 5G and IoT technology and the challenges coming, with the 6G network being the new alternative network coming to solve these issues and limitations we are facing with 5G. A reference to the Control Plane and User Plane Separation (CUPS) is made with IPv4 and IPv6, addressing which is the foundation of the network slicing for the 5G core network. In comparison to other related papers, we provide in-depth information on how the IoT is going to affect our lives and how this technology is handled as the IoE in the 6G network. Finally, a full reference is made to the 6G network, with its challenges compared to the 5G network. Full article
(This article belongs to the Special Issue Advanced Technologies in 5G/6G-Enabled IoT Environments and Beyond)
Show Figures

Figure 1

18 pages, 1614 KiB  
Article
MESMERIC: Machine Learning-Based Trust Management Mechanism for the Internet of Vehicles
by Yingxun Wang, Adnan Mahmood, Mohamad Faizrizwan Mohd Sabri, Hushairi Zen and Lee Chin Kho
Sensors 2024, 24(3), 863; https://doi.org/10.3390/s24030863 - 29 Jan 2024
Cited by 12 | Viewed by 2300
Abstract
The emerging yet promising paradigm of the Internet of Vehicles (IoV) has recently gained considerable attention from researchers from academia and industry. As an indispensable constituent of the futuristic smart cities, the underlying essence of the IoV is to facilitate vehicles to exchange [...] Read more.
The emerging yet promising paradigm of the Internet of Vehicles (IoV) has recently gained considerable attention from researchers from academia and industry. As an indispensable constituent of the futuristic smart cities, the underlying essence of the IoV is to facilitate vehicles to exchange safety-critical information with the other vehicles in their neighborhood, vulnerable pedestrians, supporting infrastructure, and the backbone network via vehicle-to-everything communication in a bid to enhance the road safety by mitigating the unwarranted road accidents via ensuring safer navigation together with guaranteeing the intelligent traffic flows. This requires that the safety-critical messages exchanged within an IoV network and the vehicles that disseminate the same are highly reliable (i.e., trustworthy); otherwise, the entire IoV network could be jeopardized. A state-of-the-art trust-based mechanism is, therefore, highly imperative for identifying and removing malicious vehicles from an IoV network. Accordingly, in this paper, a machine learning-based trust management mechanism, MESMERIC, has been proposed that takes into account the notions of direct trust (encompassing the trust attributes of interaction success rate, similarity, familiarity, and reward and punishment), indirect trust (involving confidence of a particular trustor on the neighboring nodes of a trustee, and the direct trust between the said neighboring nodes and the trustee), and context (comprising vehicle types and operating scenarios) in order to not only ascertain the trust of vehicles in an IoV network but to segregate the trustworthy vehicles from the untrustworthy ones by means of an optimal decision boundary. A comprehensive evaluation of the envisaged trust management mechanism has been carried out which demonstrates that it outperforms other state-of-the-art trust management mechanisms. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

13 pages, 1785 KiB  
Proceeding Paper
Development of a Modified Medical Data Transmission over the Cellular Network System to Secure Health-Related Data from Changes in Environmental Parameters
by Krishnaveni Kommuri and Venkata Ratnam Kolluru
Eng. Proc. 2023, 59(1), 153; https://doi.org/10.3390/engproc2023059153 - 12 Jan 2024
Cited by 2 | Viewed by 1300
Abstract
Patients are generally sent to hospitals during emergencies and life-threatening conditions using ambulances. The health problems of patients become more serious when the treatment is delayed. If the vital signs of patients inside an ambulance or a treatment area sent to a hospital [...] Read more.
Patients are generally sent to hospitals during emergencies and life-threatening conditions using ambulances. The health problems of patients become more serious when the treatment is delayed. If the vital signs of patients inside an ambulance or a treatment area sent to a hospital in real time, the odds of saving lives will improve considerably. The patient’s medical needs can be arranged by paramedics with the doctors’ instructions until their arrival at the hospital. Information from past vital signs can also be archived their medical history. The Internet of Things (IoT) is a paradigm that visualizes practically everything connected to the Internet. This opens access to a lot of tiny medical needs and emergency relief tools. As a proof of concept, a test model prototype was implemented using an IoT-enabled ambulatory vital sign sensor board and a remote hospital framework. The objective of the implementation of such a prototype blends IoT technology with healthcare services to provide a more efficient and patient-centred approach to monitoring and controlling health issues, particularly in instances when continuous remote monitoring is advantageous. The working of the proposed device was validated and the results were monitored for the health-related data collected during the testing period. This strategy promotes health monitoring in emergencies with eHealth Signals for medical assistance. Full article
(This article belongs to the Proceedings of Eng. Proc., 2023, RAiSE-2023)
Show Figures

Figure 1

31 pages, 5689 KiB  
Article
Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks
by Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Manuel Perez-Meana, Jose Portillo-Portillo and Jesus Olivares-Mercado
Future Internet 2023, 15(12), 397; https://doi.org/10.3390/fi15120397 - 9 Dec 2023
Viewed by 4310
Abstract
The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual property rights. In 2022 alone, about 130 billion accesses to potentially non-compliant websites [...] Read more.
The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual property rights. In 2022 alone, about 130 billion accesses to potentially non-compliant websites were recorded, underscoring the challenges for industries reliant on copyright-protected assets. Amidst prevailing uncertainties and the need for technical and AI-integrated solutions, this study introduces two pivotal contributions. First, it establishes a novel taxonomy aimed at safeguarding and identifying IoE-based content infringements. Second, it proposes an innovative architecture combining IoE components with automated sensors to compile a dataset reflective of potential copyright breaches. This dataset is analyzed using a Bidirectional Encoder Representations from Transformers-based advanced Natural Language Processing (NLP) algorithm, further fine-tuned by a dense neural network (DNN), achieving a remarkable 98.71% accuracy in pinpointing websites that violate copyright. Full article
(This article belongs to the Section Big Data and Augmented Intelligence)
Show Figures

Figure 1

12 pages, 656 KiB  
Article
Data-Driven Modeling of Appliance Energy Usage
by Cameron Francis Assadian and Francis Assadian
Energies 2023, 16(22), 7536; https://doi.org/10.3390/en16227536 - 12 Nov 2023
Cited by 2 | Viewed by 2981
Abstract
Due to the transition toward the Internet of Everything (IOE), the prediction of energy consumed by household appliances has become a progressively more difficult topic to model. Even with advancements in data analytics and machine learning, several challenges remain to be addressed. Therefore, [...] Read more.
Due to the transition toward the Internet of Everything (IOE), the prediction of energy consumed by household appliances has become a progressively more difficult topic to model. Even with advancements in data analytics and machine learning, several challenges remain to be addressed. Therefore, providing highly accurate and optimized models has become the primary research goal of many studies. This paper analyzes appliance energy consumption through a variety of machine learning-based strategies. Utilizing data recorded from a single-family home, input variables comprised internal temperatures and humidities, lighting consumption, and outdoor conditions including wind speed, visibility, and pressure. Various models were trained and evaluated: (a) multiple linear regression, (b) support vector regression, (c) random forest, (d) gradient boosting, (e) xgboost, and (f) the extra trees regressor. Both feature engineering and hyperparameter tuning methodologies were applied to not only extend existing features but also create new ones that provided improved model performance across all metrics: root mean square error (RMSE), coefficient of determination (R2), mean absolute error (MAE), and mean absolute percentage error (MAPE). The best model (extra trees) was able to explain 99% of the variance in the training set and 66% in the testing set when using all the predictors. The results were compared with those obtained using a similar methodology. The objective of performing these actions was to show a unique perspective in simulating building performance through data-driven models, identifying how to maximize predictive performance through the use of machine learning-based strategies, as well as understanding the potential benefits of utilizing different models. Full article
(This article belongs to the Special Issue Application of AI in Energy Savings and CO2 Reduction)
Show Figures

Figure 1

32 pages, 419 KiB  
Article
The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges
by Carlos Serôdio, José Cunha, Guillermo Candela, Santiago Rodriguez, Xosé Ramón Sousa and Frederico Branco
Future Internet 2023, 15(11), 348; https://doi.org/10.3390/fi15110348 - 25 Oct 2023
Cited by 48 | Viewed by 5949
Abstract
The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation. To support this connectivity, mission-critical applications are emerging [...] Read more.
The emergence of the sixth generation of cellular systems (6G) signals a transformative era and ecosystem for mobile communications, driven by demands from technologies like the internet of everything (IoE), V2X communications, and factory automation. To support this connectivity, mission-critical applications are emerging with challenging network requirements. The primary goals of 6G include providing sophisticated and high-quality services, extremely reliable and further-enhanced mobile broadband (feMBB), low-latency communication (ERLLC), long-distance and high-mobility communications (LDHMC), ultra-massive machine-type communications (umMTC), extremely low-power communications (ELPC), holographic communications, and quality of experience (QoE), grounded in incorporating massive broad-bandwidth machine-type (mBBMT), mobile broad-bandwidth and low-latency (MBBLL), and massive low-latency machine-type (mLLMT) communications. In attaining its objectives, 6G faces challenges that demand inventive solutions, incorporating AI, softwarization, cloudification, virtualization, and slicing features. Technologies like network function virtualization (NFV), network slicing, and software-defined networking (SDN) play pivotal roles in this integration, which facilitates efficient resource utilization, responsive service provisioning, expanded coverage, enhanced network reliability, increased capacity, densification, heightened availability, safety, security, and reduced energy consumption. It presents innovative network infrastructure concepts, such as resource-as-a-service (RaaS) and infrastructure-as-a-service (IaaS), featuring management and service orchestration mechanisms. This includes nomadic networks, AI-aware networking strategies, and dynamic management of diverse network resources. This paper provides an in-depth survey of the wireless evolution leading to 6G networks, addressing future issues and challenges associated with 6G technology to support V2X environments considering presenting +challenges in architecture, spectrum, air interface, reliability, availability, density, flexibility, mobility, and security. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies)
Back to TopTop