B5G Applications and Emerging Services in Smart IoT Environments

  • Abstract
  • Highlights & Summary
  • Literature Map
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

B5G Applications and Emerging Services in Smart IoT Environments

Highlights

  • B5G ArchitectureThe existing mobile network design supports voice and standard mobile broadband services due to upgrading 3rd Generation Partnership Project (3GPP) versions, complex interfaces, and many components used, which verified inefficiently flexible to enable differentiated services

  • The communication standard development requires specific parameters to achieve the requests of the desired application, most frequently, the connection speed rate

  • The research conducted a comprehensive assessment of the primary uses of B5G communication, encompassing enhanced Mobile Broadband (eMBB), Internet of Things (IoT), V2X, D2D, and M2M communications. 5G technology has the ability to significantly impact all aspects of human life and influence the trajectory of human civilization

Read more Highlights Expand/Collapse icon

Summary

B5G ArchitectureExpand/Collapse icon

The existing mobile network design supports voice and standard mobile broadband services due to upgrading 3GPP versions, complex interfaces, and many components used, which verified inefficiently flexible to enable differentiated services. Beyond the significant improvement in performance compared to previous generations (1G to 4G), B5G is anticipated to facilitate the emergence of novel forms of connection and applications. These encompass widespread connection, extensive video downloads, remote control with tactile feedback, and automotive communications. B5G has developed a reduced data transmission speed to cater to a wide range of purposes, such as sensors and applications related to the Internet of Things[12]. It can handle various applications, from low-bandwidth applications to high-bandwidth applications with low latency. Small cell systems and mobile relays, both of which are essential components

Multiple standards, site kinds, and services incorporated into complex networksExpand/Collapse icon
Service anchor placement on-demandExpand/Collapse icon
Flexible network function orchestrationExpand/Collapse icon
B5G network architectureExpand/Collapse icon
Radio access networkExpand/Collapse icon
Cloud computingExpand/Collapse icon
Core networkExpand/Collapse icon
Network functions virtualizationExpand/Collapse icon
Software-defined networkExpand/Collapse icon
B5G physical-layer securityExpand/Collapse icon
Network slicingExpand/Collapse icon
Edge computingExpand/Collapse icon
Three-dimensional networks (3D)Expand/Collapse icon
Application of B5G CommunicationExpand/Collapse icon
Internet of ThingsExpand/Collapse icon
V2V communicationExpand/Collapse icon
Vehicular communicationExpand/Collapse icon
D2D communicationExpand/Collapse icon
M2M communicationExpand/Collapse icon
Diversity of mobile devicesExpand/Collapse icon
Efficient use of computational resourcesExpand/Collapse icon
Demand for low latency computingExpand/Collapse icon
Mobility and dynamic changes in the networkExpand/Collapse icon
Health care serviceExpand/Collapse icon
Smart grid serviceExpand/Collapse icon
Impact of the B5G system on agricultureExpand/Collapse icon
Unmanned aerial vehicleExpand/Collapse icon
Real-time analysisExpand/Collapse icon
Predictive maintenance and virtual consultationExpand/Collapse icon
AI-driven robotExpand/Collapse icon
Cloud repository and data analyticsExpand/Collapse icon
ConclusionExpand/Collapse icon
ReferencesShowing 10 of 76 papers
  • Cite Count Icon 71
  • 10.1109/mcomstd.2018.1800002
3GPP Release 15 Early Data Transmission
  • Jun 1, 2018
  • IEEE Communications Standards Magazine
  • Andreas Hoglund + 5 more

  • Cite Count Icon 95
  • 10.1109/twc.2015.2418316
Partner selection and incentive mechanism for physical layer security
  • Aug 1, 2015
  • IEEE Transactions on Wireless Communications
  • Ning Zhang + 5 more

  • Cite Count Icon 29
  • 10.1016/j.micpro.2020.103021
Delay-aware concurrent data management method for IoT collaborative mobile edge computing environment
  • Feb 8, 2020
  • Microprocessors and Microsystems
  • B.C Kavitha + 2 more

  • Cite Count Icon 13
  • 10.1007/978-3-030-67490-8_7
Advance Cloud Data Analytics for 5G Enabled IoT
  • Dec 22, 2020
  • Vivek Kumar Prasad + 2 more

  • Open Access Icon
  • Cite Count Icon 13
  • 10.11591/ijece.v12i4.pp3943-3950
Evolution of wireless communication networks: from 1G to 6G and future perspective
  • Aug 1, 2022
  • International Journal of Electrical and Computer Engineering (IJECE)
  • Ahmed Amin Ahmed Solyman + 1 more

  • Open Access Icon
  • Cite Count Icon 15
  • 10.11591/eei.v10i6.3176
Key performance requirement of future next wireless networks (6G)
  • Dec 1, 2021
  • Bulletin of Electrical Engineering and Informatics
  • Ahmad A A Solyman + 1 more

  • Open Access Icon
  • Cite Count Icon 28
  • 10.1016/j.icte.2022.01.005
Vehicles communications handover in 5G: A survey
  • Jun 1, 2023
  • ICT Express
  • Mahmoud M Elsayed + 3 more

  • Open Access Icon
  • Cite Count Icon 245
  • 10.1016/j.jnca.2016.06.004
Device-to-Device Communication in Cellular Networks: A Survey
  • Jun 9, 2016
  • Journal of Network and Computer Applications
  • Pimmy Gandotra + 1 more

  • Open Access Icon
  • Cite Count Icon 1239
  • 10.1109/jproc.2016.2558521
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
  • Sep 1, 2016
  • Proceedings of the IEEE
  • Yulong Zou + 3 more

  • Open Access Icon
  • Cite Count Icon 52
  • 10.3390/s22145278
Intelligent Reflecting Surfaces Assisted UAV Communications for Massive Networks: Current Trends, Challenges, and Research Directions
  • Jul 14, 2022
  • Sensors (Basel, Switzerland)
  • Syed Agha Hassnain Mohsan + 4 more

Similar Papers
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 3
  • 10.1155/2021/9915408
Multilevel Privacy Controlling Scheme to Protect Behavior Pattern in Smart IoT Environment
  • Jan 1, 2021
  • Wireless Communications and Mobile Computing
  • Asad Khan + 5 more

Traditional approaches generally focus on the privacy of user’s identity in a smart IoT environment. Privacy of user’s behavior pattern is an important research issue to address smart technology towards improving user’s life. User’s behavior pattern consists of daily living activities in smart IoT environment. Sensor nodes directly interact with activities of user and forward sensing data to service provider server (SPS). While availing the services provided by a server, users may lose privacy since the untrusted devices have information about user’s behavior pattern and it may share data with adversary. In order to resolve this problem, we propose a multilevel privacy controlling scheme (MPCS) which is different from traditional approaches. MPCS is divided into two parts: (i) behavior pattern privacy degree (BehaviorPrivacyDeg), which works as follows: firstly, frequent pattern mining‐based time‐duration algorithm (FPMTA) finds the normal pattern of activity by adopting unsupervised learning. Secondly, patterns compact algorithm (PCA) is proposed to store and compact the mined pattern in each sensor device. Then, abnormal activity detection time‐duration algorithm (AADTA) is used by current triggered sensors, in order to compare the current activity with normal activity by computing similarity among them; (ii) multilevel privacy design model: we have divided privacy of users into four levels in smart IoT environment, and by using these levels, the server can configure privacy level for users according to their concern. Multilevel privacy design model consists of privacy‐level configuration protocol (PLCP) and activity design model. PLCP provides fine privacy controls to users while enabling users to set privacy level. In PLCP, we introduce level concern privacy algorithm (LCPA) and location privacy algorithm (LPA), so that adversary could not damage the data of user’s behavior pattern. Experiments are performed to evaluate the accuracy and feasibility of MPCS in both simulation and real‐case studies. Results show that our proposed scheme can significantly protect the user’s behavior pattern by detecting abnormality in real time.

  • Research Article
  • Cite Count Icon 27
  • 10.1007/s11277-020-07369-0
Intelligent Data Fusion for Smart IoT Environment: A Survey
  • Apr 18, 2020
  • Wireless Personal Communications
  • Ihsan Ullah + 1 more

Efficient data collection and communication are key tasks in smart IoT environment consisting of a large number of devices. Here imprecise data are generated due to the interferences between the devices and harsh operation condition, and therefore data fusion is needed to gather and extract useful data from multiple sources. A number of approaches for data fusion have been proposed which are based on probability, artificial intelligence, or evidence theory to efficiently aggregate the data. The techniques allow the system to be cognitive and intelligent in terms of decision-making under the uncertainty of data and limited resource. In this paper a comprehensive survey on the data fusion techniques for smart IoT system is presented. The challenges and opportunities with data fusion are also delineated. It will be useful for the researchers in developing the applications and services based on smart IoT environment, which require intelligent decision making.

  • Research Article
  • 10.1038/s41598-025-17497-x
A vision transformer with recurrent neural network-based fall activity recognition system for disabled persons in smart IoT environments
  • Sep 26, 2025
  • Scientific Reports
  • Abdulrahman Alzahrani + 1 more

Falls are the primary basis of autonomy loss, injuries, and deaths among disabled persons and the elderly. With the development of technologies, falls are extensively researched by scientists to diminish severe consequences and adverse effects. Reliable fall recognition is crucial in humanoid robotics and healthcare research, as it helps minimize damage. The detection methods for falls are classified into three categories: wearable sensors, ambient sensors, and vision-based sensors. Over the last few years, computer vision and deep learning (DL) have been widely applied to fall detection systems. The application of DL for fall activity recognition has led to major developments in detection accuracy by overcoming numerous obstacles met by conventional models. This study presents a Vision Transformer and Self-Attention Mechanism with Recurrent Neural Network-Based Fall Activity Recognition System (VTSAMRNN-FARS) method. The primary objective of the VTSAMRNN-FARS method is to improve the fall detection and classification method for individuals with disabilities in smart IoT environments. Initially, the bilateral filtering (BF) model is used for image pre-processing to remove the noise in input image data. Furthermore, the feature extraction process is performed by the Vision Transformer (ViT) model to convert raw data into a reduced set of relevant features, thereby enhancing model performance and efficiency. For detecting fall activities, a bidirectional gated recurrent unit with a self-attention mechanism (BiGRU-SAM) model is implemented. Finally, the enhanced wombat optimization algorithm (EWOA) model optimally adjusts the hyperparameter values of the BiGRU-SAM approach, resulting in improved classification results. The simulation analysis of the VTSAMRNN-FARS methodology is examined under the UR_Fall_Dataset_Subset dataset. The comparison study of the VTSAMRNN-FARS methodology is reviewed and found to be 99.67% more effective than existing models.

  • Research Article
  • Cite Count Icon 2
  • 10.53106/160792642022072304022
Detection and Blocking Method against DLL Injection Attack Using PEB-LDR of ICS EWS in Smart IoT Environments
  • Jul 1, 2022
  • 網際網路技術學刊
  • Junwon Kim Junwon Kim + 2 more

<p>Modern Industrial Control System (ICS) can provide vast functions as the introduction of IT technology is established along with the introduction of the IoT environment. Engineering Workstation (EWS) used by ICS is widely used to efficiently manage and control industrial devices including smart IoT devices. However, the DLL injection attack in ICS is not high in difficulty compared to the risk, but it can cause fatal malfunction. If an attack is carried out targeting the EWS, it may cause erroneous operation in many control devices, including IoT devices, cause fatal accidents throughout the Supervisory Control and Data Acquisition (SCADA) system. In this paper, we present a method to detect DLL injection attacks by specializing in EWS used in ICS in IoT environment and purpose a method to detect data changes due to DLL injection attacks by analyzing and utilizing PEB-LDR data. Also, we purpose a method to detect and block execution when a malicious DLL is suspected to be loaded by DLL injection.</p> <p> </p>

  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-030-96040-7_44
Machine Learning Models for Predicting Indoor Air Temperature of Smart Building
  • Jan 1, 2022
  • Salam Traboulsi + 1 more

The indoor air temperature is one of the key factors to improve the performance of energy efficiency of buildings and quality of life in a very smart IoT environment. Therefore, a periodic and accurate prediction of the minimum and maximum indoor air temperature allows taking necessary precautions to handle the variations’ impact and tendencies. During this assessment, we developed minimum and maximum indoor air temperature prediction models using multiple statistical regression (MLR), multilayered perceptron (MLP), and random forest (RF, where Rf is achieved once with tree depth 10 (RFdepth10), and once with tree depth 50 (RFdepth50)). The study was conducted at a building located within the University of Applied Sciences, Stuttgart, in Germany. Sensors were accustomed to aggregate data, which were used because of the input variables for the prediction. The variables are outdoor air temperature, indoor air temperature, humidity, and heating temperature. Performance of the models was evaluated with the coefficient of determination \({R}^{2}\) and therefore the root means square error (RMSE). The simulation results showed that the prediction by the MLP algorithm, based on minimum indoor air temperature models and also maximum indoor air temperature models, provides better accuracy with the very best \({R}^{2}\) and lowest RMSE in the independent test dataset. This survey developed a straightforward and powerful MLP model to predict the minimum and therefore the maximum indoor air temperature, which may integrate into smart building management system technology in the future.

  • Book Chapter
  • Cite Count Icon 3
  • 10.1007/978-3-030-67241-6_14
Assistive Technologies in Function of Visual Impaired Person Mobility Increases in Smart Shopping Environment
  • Aug 3, 2021
  • Marko Periša + 8 more

Development of information and communication technologies enabled more efficient development of assistive technologies and their application in visually impaired people everyday living. For that purpose, in this research, the user needs of visually impaired people during the purchasing process are defined. On the basis of the user needs conceptual architecture of the system is proposed for the service delivery of guidance and information of users during the use of smart shopping cart in shops. The key elements of the architecture are applicative solutions for smartphones and smart shopping carts, which interact which each other in smart IoT environment. The purpose of the mentioned service which uses the proposed architecture is improvement visually impaired persons’ quality of life and raising the degree of mobility in everyday activities. Mentioned service also presents model of assistive technology in Society 5.0 surrounding.

  • Research Article
  • 10.6029/smartcr.2015.04.008
Design of Data Communication Scheme for Privacy Protection in Smart IoT Environment
  • Aug 31, 2015
  • The Smart Computing Review
  • Byung Wook Jin + 2 more

The Internet of Things is a wide-ranging concept that applies not only to objects but also in our everyday life. Home networks utilizing smart devices, automobile technology, and treatment at medical institutions are typical examples of implementations of the Internet of Things in everyday life. However, there are issues about fragile security that stand in stark contrast to the rapid popularization of the Internet of Things. There was a case of a hacked chip in a user device that spread malignant code and spam mail followed by a data leak. Besides, Internet of Things devices like the ones used as domestic smart home devices are found to be more prone to be the target of distributed denial of service attacks. Therefore, in this paper, we present a plan for the registration of a device, the formation of a session key, and user authentication to ensure secure communication. Additionally, we present a plan for a message communication protocol. The communication scheme proposed here is also analyzed for data stability and encryption efficiency.

  • Research Article
  • Cite Count Icon 2
  • 10.3390/app9234993
Geo-Sensor Framework and Composition Toolbox for Efficient Deployment of Multiple Spatial Context Service Platforms in Sensor Networks
  • Nov 20, 2019
  • Applied Sciences
  • Malik + 1 more

Geo-sensor is the term used for the deployment of a wireless sensor network (WSN) in a real environment, which can be a hideous task due to many influential variables in a given environment. The spatial context of a sensor in a smart environment can be of huge significance and can also play an important role in improving the smart services provision. In this work, we propose a DIY geo-sensor framework and data composition toolbox for the deployment of sensors data in smart IoT environments along with geographical context. A geo-sensor framework is deployed, which enables the registration of multiple geo-sensor networks by providing multiple geo-sensor platforms. The framework’s logic is based on the combination of a geo-sensor service registry, geo-sensor composition toolbox, and geo-sensor platforms. A geo-sensor platform provides the content to the toolbox, enabling relaxed real-time geo-sensor data management. Our proposed work is two-fold. Firstly, we propose the design details for the geo-sensor framework and composition toolbox. The proposed design for the geo-sensor framework aims to provide a DIY platform for multiple geo-sensor networks and services deployment, giving access to multiple users resulting in reuse of resources and reduction in deployment costs by avoiding duplicate deployments. Secondly, we implement the proposed design based on RESTful web services and SOAP web services. Performance comparison analysis is then performed among the two web services to find the best suited implementation for given scenarios. The results of the performance analysis prove that RESTful web services are the better choice for ease of implementation, access, and light-weightiness.

  • Front Matter
  • 10.1111/exsy.12946
COVID-19 special issue: Intelligent solutions for computer communication-assisted infectious disease diagnosis.
  • Feb 24, 2022
  • Expert systems
  • Fadi Al‐Turjman

COVID-19 special issue: Intelligent solutions for computer communication-assisted infectious disease diagnosis.

  • Research Article
  • 10.35940/ijitee.f1446.0981119
Towards Improved Random Forest based Feature Selection for Intrusion Detection in Smart IOT Environment
  • Sep 30, 2019
  • International Journal of Innovative Technology and Exploring Engineering
  • Mr.B Suresh + 2 more

of Things (IoT) is raised as most adaptive technologies for the end users in past few years. Indeed of being popular, security in IoT turned out to be a crucial research challenge and a sensible topic which is discussed very often. Denial of Service (DoS) attack is encountered in IoT sensor networks by perpetrators with numerous compromised nodes to flood certain targeted IoT device and thus resulting in vulnerability or service unavailability. Features that are encountered from the malicious node can be utilized effectually to recognize recurring patterns or attack signature of network based or host based attacks. Henceforth, feature extraction using machine learning approaches for modelling of Intrusion detection system (IDS) have been cast off for identification of threats in IoT devices. In this investigation, Kaggle dataset is measured as benchmark dataset for detecting intrusion is considered initially. These dataset includes 41 essential attributes for intrusion identification. Next, selection of features for classifiers is done with an improved Weighted Random Forest Information extraction (IW-RFI). This proposed WRFI approach evaluates the mutual information amongst the attributes of features and select the optimal features for further computation. This work primarily concentrates on feature selection as effectual feature selection leads to effectual classification. Finally, performance metrics like accuracy, sensitivity, specificity is computed for determining enhanced feature selection. The anticipated model is simulated in MATLAB environment, which outperforms than the existing approaches. This model shows better trade off in contrary to prevailing approaches in terms of accurate detection of threats in IoT devices and offers better transmission over those networks.

  • Research Article
  • Cite Count Icon 28
  • 10.1016/j.jss.2018.11.022
Semantics-based platform for context-aware and personalized robot interaction in the internet of robotic things
  • Nov 17, 2018
  • Journal of Systems and Software
  • Christof Mahieu + 5 more

Semantics-based platform for context-aware and personalized robot interaction in the internet of robotic things

  • Research Article
  • Cite Count Icon 24
  • 10.1109/tifs.2024.3350379
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments
  • Jan 1, 2024
  • IEEE Transactions on Information Forensics and Security
  • Jueun Jeon + 3 more

Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments

  • Conference Article
  • 10.1109/icpcsn65854.2025.11035594
An Integrated Network Model with Sequential Approach to Elevate Irrigation in Smart IoT Environment
  • May 14, 2025
  • Baskar M + 1 more

An Integrated Network Model with Sequential Approach to Elevate Irrigation in Smart IoT Environment

  • Research Article
  • 10.4314/njt.v44i2.18
Evaluating deep learning models for real-time waste classification in smart IoT environment
  • Sep 30, 2025
  • Nigerian Journal of Technology
  • E Omonayin + 3 more

Automatic municipal solid waste management systems are integral to every smart city worldwide. They help to separate wastes into different categories for further recycling or effective disposal. This way, waste authorities could mitigate the effect of rapid urbanization, population growth, and the escalating consumption patterns associated with modern living. Deep learning models could play a critical role in the identification and classification of these wastes into their respective categories. Therefore, this study evaluates the performance of three deep learning models: MobileNet, InceptionV3, and VGG16 for waste classification. The evaluation was done under two separate model configurations while their classification accuracy, execution time, precision, recall, and F1-Score were computed across a range of 10 to 100 epochs. MobileNet consistently demonstrated the highest classification accuracy, reaching approximately 90% at 100 epochs, while also maintaining the shortest execution time, starting at 2.13 minutes for 10 epochs and increasing to about 14.34 minutes for 100 epochs. InceptionV3 exhibited a balanced performance, achieving around 83% accuracy at 100 epochs with execution times ranging from 3.57 minutes to 49.42 minutes. VGG16, although started with the lowest accuracy, improved significantly to about 88% at 100 epochs, but at the cost of the longest execution time, starting at 9.45 minutes and rising to 68.72 minutes. The results indicate that MobileNet is the most efficient model for applications requiring both high accuracy and low computational cost, while InceptionV3 and VGG16 are suitable for scenarios where accuracy is prioritized over execution time. This comparative analysis provides valuable insights for selecting appropriate deep-learning models based on specific task requirements and resource constraints.

  • Book Chapter
  • Cite Count Icon 2
  • 10.1007/978-3-319-67235-9_6
Activity Signatures in Smart IoT Environments
  • Jan 1, 2017
  • Ravi Kokku

IoT enabled smart environments typically include large number of simple sensors that are designed to detect specific events. In many environments, however, not one but combinations of sensor events represent activities of interest (such as activities of daily living of a patient in a smarthome). Detecting and monitoring these activities of interest result in both application-specific benefits and operational benefits. However, human activities often overlap, thereby making activity detection from the collected sensor events a challenging problem. In this paper, we first present the various benefits of such materialization of sensor events into activities, and then discuss the challenges in detecting diverse activities taken up by humans. More interestingly, the diversity of human activities and the time-variability of a given activity by the same human, makes reliable detection of activities even harder, and open up interesting avenues for future research.

More from: International Journal of Crowd Science
  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2024.9100025
Monitoring Changes to Small-Sized Lakes Using Medium Spatial and Temporal Satellite Imagery in the Badain Jaran Desert from 2015 to 2020
  • May 1, 2025
  • International Journal of Crowd Science
  • Qinyu Zhao + 4 more

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2024.9100007
B5G Applications and Emerging Services in Smart IoT Environments
  • May 1, 2025
  • International Journal of Crowd Science
  • Hani Attar + 5 more

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2023.9100004
Predictive Emojis for User Cognitive Response to Dynamic Behaviour of Webpages Using Pupil and Click Reinforcement
  • May 1, 2025
  • International Journal of Crowd Science
  • Fatima Isiaka

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2024.9100014
Lightweight Human Behavior Recognition Method for Visual Communication AGV Based on CNN-LSTM
  • May 1, 2025
  • International Journal of Crowd Science
  • Shuhua Zhao + 4 more

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2023.9100019
Remote Monitoring System of Patient Status in Social IoT Environments Using Amazon Web Services Technologies and Smart Health Care
  • May 1, 2025
  • International Journal of Crowd Science
  • Amer Tahseen Abu-Jassar + 5 more

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2024.9100016
Survey on AI-Assisted Power Transmission Line Fault Detection
  • May 1, 2025
  • International Journal of Crowd Science
  • Yue Zhang + 2 more

  • Research Article
  • 10.26599/ijcs.2023.9100015
CGLS Method for Efficient Equalization of OFDM Systems Under Doubly Dispersive Fading Channels with an Application Into 6G Communications in Smart Overcrowded
  • Jan 1, 2025
  • International Journal of Crowd Science
  • Issa Haitham M Ata

  • Open Access Icon
  • Research Article
  • Cite Count Icon 2
  • 10.26599/ijcs.2023.9100022
Improving Energy Harvesting System from Ambient RF Sources in Social Systems with Overcrowding
  • Jan 1, 2025
  • International Journal of Crowd Science
  • Ramy Agieb + 5 more

  • Research Article
  • 10.26599/ijcs.2023.9100018
Development and Investigation of Vision System for a Small-Sized Mobile Humanoid Robot in a Smart Environment
  • Jan 1, 2025
  • International Journal of Crowd Science
  • Amer Tahseen Abu-Jassar + 5 more

  • Open Access Icon
  • Research Article
  • 10.26599/ijcs.2024.9100045
Editorial of Cyber-Physical Social Systems and Smart Environments
  • Jan 1, 2025
  • International Journal of Crowd Science
  • Mohamadreza Khosravi + 1 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon