Abstract is missing.
- Reducing rescheduling events in operating rooms by applying pattern recognition techniquesFemke A. Van Der Schoot, Renata M. de Carvalho. 1-8 [doi]
- Optimal Secure Placement of IoT Applications for Smart FarmingJagruti Sahoo. 1-6 [doi]
- Process Mining for Reliability Modeling of Manufacturing Systems with Limited Data AvailabilityJonas Friederich, Sanja Lazarova-Molnar. 1-7 [doi]
- Pricing and Market Strategies for Dynamic Spectrum Access Networks: Overview and Visionary FrameworksHaythem Bany Salameh, Mohammad Qasem Samara, Ahmad F. Al-Ajlouni, Ghaleb A. El Refae. 1-4 [doi]
- IoT Framework for Effective and Fine-Grain Access ControlZina Houhamdi, Belkacem Athamena. 1-6 [doi]
- Analysing the Application of Fuzzy Logic in Renewable Energy SystemsYazeed Ghadi, Tarik Elamsy. 1-6 [doi]
- Performance Analysis of Drone Assisted Multiple Antenna Backscatter IoT Sensor NetworkAli Mohammad Hayajneh, Haitham Moffaqq Al-Obiedollah, Haythem Bany Salameh, Massimo Merenda, Sofyan Mohammad Hayajneh, Syed Ali Raza Zaidi, Desmond C. McLernon. 1-7 [doi]
- IoT Cloud RAN Testbed for Indoor Localization based on LPWANsMarcelo Michael, Joerg Robert, Clemens Neumüller, Albert Heuberger. 1-6 [doi]
- Creation of Smart Structures with the Aid of IoTMohammad Alhassan, Mohsen Issa, Layla Amaireh. 1-4 [doi]
- A Programmable and Reliable Publish/Subscribe System for Multi-Tier IoTWei-Tsung Lin, Rich Wolski, Chandra Krintz. 1-8 [doi]
- IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees youArtjoms Daskevics, Anastasija Nikiforova. 1-8 [doi]
- An IoT Management System Using Fog ComputingBerkin Yildiran, Erel Ozturk, Necati Ozkent, Yagizcan Arslan, Ilker Korkmaz. 1-8 [doi]
- Control and Maintenance System with Augmented Reality for a Stone CounterFernando Fernandez, William Oñate, Morelva Saeteros, Gustavo Caiza. 1-5 [doi]
- An Exploratory Data Analysis of the Network Behavior of Hive Home DevicesAsmau Wali, Oluwasegun Apejoye, Jun He, Xiaoqi Ma. 1-8 [doi]
- A Blockchain-based Access and Management System for IoT DevicesManuel Valentin, Claus Pahl, Nabil El Ioini, Hamid R. Barzegar. 1-8 [doi]
- Medium-Term Prediction for Ambulance Demand of Heat Stroke using Weekly Weather ForecastTetsuya Nakai, Sachio Saiki, Masahide Nakamura. 1-8 [doi]
- FlyTrap: A Blockchain-based Proxy for Authorisation and Audit of MQTT ConnectionsKonrad M. Dryja, Milan Markovic, Peter Edwards. 1-8 [doi]
- Harnessing The Power of the Internet of Things (IoT) to Achieve an Agile Business Education Model: A Visionary PaperAmer Qasim, Ghaleb A. El Refae, Shorouq Eletter, Abdul Razzak Al-Chahadah. 1-4 [doi]
- Delegated Device Attestation for IoTJukka Julku, Jani Suomalainen, Markku Kylänpää. 1-8 [doi]
- Intelligent Service Migration in Multi-Domain Cellular Networks based on Profile PredictionsEhsan Ur Rehman, Hamid R. Barzegar, Nabil El Ioini, Claus Pahl. 1-7 [doi]
- An Efficient Power Allocation Algorithm for Improved System Performance in MIMO Two-Relay Wireless IoT Networks: A Heuristic ApproachBassam Harb, Hazim Shakhatreh, Haythem Bany Salameh. 1-5 [doi]
- Utilizing Behavior Simulation in Usage Control for Cyber-Physical SystemsLars Niemczik, Alexander Kern, Reiner Anderl. 1-8 [doi]
- SecureHome: A Privacy Preserving Health Care Smart Home SystemsPhultuli Sarkhel, Jayeeta Chanda. 1-5 [doi]
- Improving Health Disabled People through Smart Wheelchair based on Fuzzy OntologyAbdelhalim Hadjadj, Khaled Halimi. 1-6 [doi]
- * AlgorithmLahej Alhelli, Mohammed Al-Yafeai, Mohammad Sh. Daoud, Tarik Elamsy. 1-5 [doi]
- Fall Detection for Elderly Person Monitoring using Wearable Inertial Sensors and Locality Sensitive HashingAymen Shaafi, Osman Salem, Ahmed Mehaoua. 1-8 [doi]
- An Open Source LoRaWAN Simulator Framework for the Internet of Things ApplicationsSahel Alouneh, Alá F. Khalifeh, Dhiah el Diehn I. Abou-Tair, Khaled Aldahdouh, Feras Al-Hawari. 1-5 [doi]
- Planar Broadband Dual-Sense Circularly Polarized Multiple-Input-Multiple-Output Antenna for IoT Integrated SystemsUbaid Ullah, Slawomir Koziel, Muath Al-Hasan, Anna Pietrenko-Dabrowska. 1-4 [doi]
- On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems NetworksSaja Alqurashi, Hossein Shirazi, Indrakshi Ray. 1-6 [doi]
- Improvement of Edge Computing Workload Placement using Multi Objective Particle Swarm OptimizationOscar Ricardo Cuéllar Rodríguez, Van Thanh Le, Claus Pahl, Nabil El Ioini, Hamid R. Barzegar. 1-8 [doi]
- Vulnerability Assessment and Penetration Testing on IP cameraPietro Biondi, Stefano Bognanni, Giampaolo Bella. 1-8 [doi]
- IoT Security and Safety Testing Toolkits for Water Distribution SystemsSean O'Toole, Cameron Sewell, Hoda Mehrpouyan. 1-8 [doi]