2021
DOI: 10.3390/s21237880
|View full text |Cite
|
Sign up to set email alerts
|

Wearable Sensors and Systems in the IoT

Abstract: Wearable smart devices are widely used to determine various physico-mechanical parameters at chosen intervals. The proliferation of such devices has been driven by the acceptance of enhanced technology in society [...]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The implementation of AI techniques in wearable sensor data-handling can be performed with two different computing paradigms [ 94 ].…”
Section: Data Analysis For Healthcarementioning
confidence: 99%
See 2 more Smart Citations
“…The implementation of AI techniques in wearable sensor data-handling can be performed with two different computing paradigms [ 94 ].…”
Section: Data Analysis For Healthcarementioning
confidence: 99%
“…They can help in sending data to the monitoring unit with an adequate data transfer rate and size. The most recent phenomenon is the use of neural networks, where different kinds of functional networks are being employed in addition to the models for comparing their performances [ 94 ]. The use of these techniques circumvents the energy-harvesting issue to a great extent while maintaining a high quality of service for the attached sensors and actuators.…”
Section: Power Supplies For Wearable Healthcare System: Energy Harves...mentioning
confidence: 99%
See 1 more Smart Citation
“…As IoT networks become increasingly important, having a dataset that can be used for this purpose will be a valuable contribution. By 2025, it is anticipated that the global market for IoT end-user solutions will reach approximately $1.6 trillion, posing a new growing danger from exposed telnet ports, out-of-date Linux firmware, and numerous other related vulnerabilities [7]. The expansion of these insecure IoT devices opens up wide varieties of new cybersecurity attack factors, most notably IoT Botnet attacks.…”
Section: Introductionmentioning
confidence: 99%
“…MANETs are often deployed in a range of domains, such as disaster rescue, graphics and healthcare and defensive systems [1]. A maximum QoS is required for MANETs because they endure external and internal problems such as connection failure, topology changes and energy depletion [2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%