期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Artificial Intelligence-Driven Fog-Computing-Based Radio Access Networks
1
《China Communications》 SCIE CSCD 2019年第1期194-194,共1页
The edge cache is an effective way to reduce the heavy traffic load and the end-to-end latency in radio access networks(RANs)for supporting a number of critical Internet of Things(IoT)services and applications.It has ... The edge cache is an effective way to reduce the heavy traffic load and the end-to-end latency in radio access networks(RANs)for supporting a number of critical Internet of Things(IoT)services and applications.It has been verified to provide high spectral efficiency,high energy efficiency,and low latency.To exploit the advantages of edge cache,a paradigm of fog computing-based radio access networks(F-RANs)has emerged to provide great flexibility to satisfy quality-of-service requirements of various IoT applications in the fifth generation(5G)wireless systems. 展开更多
关键词 Artificial INTELLIGENCE DRIVEN fog-computing BASED Radio Access Networks
在线阅读 下载PDF
Security Challenges and Analysis Tools in Internet of Health Things:A Comprehensive Review
2
作者 Enas W.Abood Ali A.Yassin +4 位作者 Zaid Ameen Abduljabbar Vincent Omollo Nyangaresi Iman Qays Abduljaleel Abdulla J.Y.Aldarwish Husam A.Neamah 《Computers, Materials & Continua》 2025年第11期2305-2345,共41页
The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based ... The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field. 展开更多
关键词 Internet of health things AUTHENTICATION PRIVACY fog-computing blockchain AI
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部