<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Only For Tech | Site-Wide Activity</title>
	<link>https://onlyfor.tech/activity/</link>
	<atom:link href="https://onlyfor.tech/activity/feed" rel="self" type="application/rss+xml" />
	<description>Activity feed for the entire site.</description>
	<lastBuildDate>Mon, 06 Apr 2026 21:39:29 +0000</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">5c7ebf87ba1281d86fcf0900e5438edb</guid>
				<title>Mourad ELGORMA posted an update in the group Network engineers</title>
				<link>https://onlyfor.tech/activity/p/1372/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:58 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">2e1c98714fe175a4794d9576b63bb775</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1371/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:32 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4d1ed540c8423d692e332e0833468fd8</guid>
				<title>https://doi.org/10.1109/DAT.2017.7889183</title>
				<link>https://onlyfor.tech/activity/p/1370/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/DAT.2017.7889183" rel="nofollow ugc">https://doi.org/10.1109/DAT.2017.7889183</a></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://doi.org/10.1109/DAT.2017.7889183" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://ieeexplore.ieee.org/assets/img/ieee_logo_smedia_200X200.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">Embedded BeagleBone based Wi-Fi intrusions detector and vulnerabilities checker</div>				<div class="youzify-wall-link-desc">It is common in any institution to deploy several wireless nodes allowing access to local network resources and the Internet. All deployed wireless access nodes may suffer from vulnerabilities and data integrity. This paper aims to present the development we have done for wireless device based on BeagleBone embedded board, to detect existent nearby malicious use on Wi-Fi wireless networks. Our developed embedded device is able to test the security and integrity level of nearby wireless access points based on the Wi-Fi stack protocols.</div>				<div class="youzify-wall-link-url">doi.org</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">48439258aa8aeb1fa7c7533ad2969afd</guid>
				<title>https://doi.org/10.1109/DAT.2017.7889183</title>
				<link>https://onlyfor.tech/activity/p/1369/</link>
				<pubDate>Sat, 28 Mar 2026 18:33:56 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/DAT.2017.7889183" rel="nofollow ugc">https://doi.org/10.1109/DAT.2017.7889183</a></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">33e3c050ad8885a3d845864d39d31130</guid>
				<title>https://doi.org/10.1109/ICEEAC61226.2024.10576534</title>
				<link>https://onlyfor.tech/activity/p/1368/</link>
				<pubDate>Sat, 28 Mar 2026 18:33:25 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/ICEEAC61226.2024.10576534" rel="nofollow ugc">https://doi.org/10.1109/ICEEAC61226.2024.10576534</a></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://doi.org/10.1109/ICEEAC61226.2024.10576534" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://ieeexplore.ieee.org/assets/img/ieee_logo_smedia_200X200.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">A Review of Methods for Detecting and Preventing Drowning Incorporating Various Techniques, Devices and Technologies</div>				<div class="youzify-wall-link-desc">Security and saving humans have been important subjects for humanity for years, and as we know, there are many reasons to die. One of these reasons is drowning. The World Health Organization estimates that 236,000 people die because of drowning every year, and 90% of these incidents are situated in low and middle-income countries. In relation to that, we define earlier technologically assisted methodologies to prevent drowning. In recent years, two kinds of approaches have emerged as solutions to detect previous drowning incidents. The first approach involves the use of video processing technology in conjunction with cameras to identify individuals in distress. The second approach uses Internet of Things (IoT) objects to detect and alert to drowning incidents. In this survey paper, we evaluate the performance and weaknesses of these two methods and provide insights into their potential for improving drowning detection and prevention efforts.</div>				<div class="youzify-wall-link-url">doi.org</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7e418f316e61644810a76e3703cdf66a</guid>
				<title>10.1109/ICEEAC61226.2024.10576534</title>
				<link>https://onlyfor.tech/activity/p/1367/</link>
				<pubDate>Sat, 28 Mar 2026 18:32:21 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>10.1109/ICEEAC61226.2024.10576534</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a638925b8f7ccbcdc8b27fd488428428</guid>
				<title>https://doi.org/10.1007/s00607-026-01631-2</title>
				<link>https://onlyfor.tech/activity/p/1366/</link>
				<pubDate>Fri, 27 Mar 2026 00:08:05 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1007/s00607-026-01631-2" rel="nofollow ugc">https://doi.org/10.1007/s00607-026-01631-2</a></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://doi.org/10.1007/s00607-026-01631-2" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://static-content.springer.com/image/art%3A10.1007%2Fs00607-026-01631-2/MediaObjects/607_2026_1631_Fig1_HTML.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">Feasibility evaluation of a LoRa-based IoT framework for real-time drowning detection and prevention - Computing</div>				<div class="youzify-wall-link-desc">The framework of this paper focuses on the evaluation of the performance of LoRa technology, particularly for individuals exposed to drowning risks in a real environment. It concerns the conception and development of a prototype for monitoring swimmers in a large area, allowing for the prevention of the ongoing drowning situation. This system allows long-range data transfer from multiple sensors to the server via an MQTT broker and then analyzes them for proper decision-making (SOS mode or not). This paper discusses a full low-power communication setup (LoRa network) that uses the Internet of Things and looks at important technical details like RSSI, latency, and packet loss. The experimental results demonstrate a communication range of about 150 m, an average latency between 4.5 and 17 ms, a packet loss rate below 12%, and RSSI values ranging from − 50 dBm to -127 dBm. The device operates with an average power consumption of approximately 80 mA, and the overall prototype completion rate reached nearly 80%, confirming its functional reliability. The study also examines the impact of varying environmental conditions on the performance of the LoRa network, providing researchers useful information for optimizing its deployment in real-world scenarios. Additionally, the PPG sensor monitors vital signs like heart rate, blood pressure, and oxygen levels. Thus, this architecture implements a GPS module to locate the drowning. Consequently, the potential benefits of implementing such systems are numerous, including the anti-drowning measures, lifeguards, staff, and society in general.</div>				<div class="youzify-wall-link-url">doi.org</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">707518d55843b667aa3a18f6c99b3ac6</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1365/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:17 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2062<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1365"><a target="_blank" href="https://onlyfor.tech/activity/p/1365/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">35e03c91bca8c4f23ef3adcae7a1ac92</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1364/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:16 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 124<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1364"><a target="_blank" href="https://onlyfor.tech/activity/p/1364/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">520ed774b7624d178728e7f5753cd118</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1363/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:16 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1363"><a target="_blank" href="https://onlyfor.tech/activity/p/1363/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">36d1b2ca9e360597617cb0ba93b02f5d</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1362/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:15 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1362"><a target="_blank" href="https://onlyfor.tech/activity/p/1362/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b7625678794915a5b6177110a7ab6a88</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1361/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:15 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1361"><a target="_blank" href="https://onlyfor.tech/activity/p/1361/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">546e972155f41dc43762af1bd65acb69</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1360/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:31 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2061<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1360"><a target="_blank" href="https://onlyfor.tech/activity/p/1360/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">83b6ed5693e42694c7b70c5eb7f3e105</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1359/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:31 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1359"><a target="_blank" href="https://onlyfor.tech/activity/p/1359/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ca36747620846352da7b86cd0d98e008</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1358/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:30 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1358"><a target="_blank" href="https://onlyfor.tech/activity/p/1358/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">5246e5eb80f4ccf12ba13567a6704dbe</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1357/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:30 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1357"><a target="_blank" href="https://onlyfor.tech/activity/p/1357/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">10367a3dbf5cceaaaa49ca97d2f25bf3</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1356/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:29 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1356"><a target="_blank" href="https://onlyfor.tech/activity/p/1356/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">13a2030b6f7774f06e8b07b9adcbfe02</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1355/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:12 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1355"><a target="_blank" href="https://onlyfor.tech/activity/p/1355/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f3c0faf5b3ccbaada38f20cf3abb6ac3</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1354/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1354"><a target="_blank" href="https://onlyfor.tech/activity/p/1354/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ec9de1397b281a4b16d4a5e88d314771</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1353/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1353"><a target="_blank" href="https://onlyfor.tech/activity/p/1353/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a0a1044682767781a7dcb951177daf33</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1352/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:10 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1352"><a target="_blank" href="https://onlyfor.tech/activity/p/1352/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fee6c33eace3657bb7243b512733dbc1</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1351/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:10 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1351"><a target="_blank" href="https://onlyfor.tech/activity/p/1351/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c9c1c0fc463cc54711c8743b755f2fca</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1350/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:49 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1350"><a target="_blank" href="https://onlyfor.tech/activity/p/1350/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">99eeb72944700fe9533f7858f4e0e750</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1349/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:48 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1349"><a target="_blank" href="https://onlyfor.tech/activity/p/1349/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">eb8b74ed0e1d16e6570e29765f70c3da</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1348/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1348"><a target="_blank" href="https://onlyfor.tech/activity/p/1348/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d56f4b821459e0699e001b79f58efd81</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1347/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1347"><a target="_blank" href="https://onlyfor.tech/activity/p/1347/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9190a4c3848852d00fa1b1539efe8bc1</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1346/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1346"><a target="_blank" href="https://onlyfor.tech/activity/p/1346/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7baab98c935c8bb1aefe9c18f1eda4d6</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1345/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1345"><a target="_blank" href="https://onlyfor.tech/activity/p/1345/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d326da93d23be969fda3b3621f08c5de</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1344/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1344"><a target="_blank" href="https://onlyfor.tech/activity/p/1344/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b279ec5e6538cc6ba4cad23ace179297</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1343/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1343"><a target="_blank" href="https://onlyfor.tech/activity/p/1343/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e89cd008be0256a2d5ad8783cdcb9ba8</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1342/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1342"><a target="_blank" href="https://onlyfor.tech/activity/p/1342/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f38936e710ad5223f010617fd44a54a0</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1341/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1341"><a target="_blank" href="https://onlyfor.tech/activity/p/1341/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fa23d640ca3c6b233a1d0873e9c53583</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of Artificial [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1340/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0c2562b1941e26cfefba7fdb91ecba56</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and Sensor [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1339/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3ad2f9c85ec740ee42b74127ae3daf49</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated security [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1338/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513; Closed</p>
<p>    AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8ee69cb4624d1848e5f8ee3df4102229</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1337/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    Data traffic management in AI-IoT network to reduce congestion</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">43300d7f1a53cbcdcbb62c8dba7acd77</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software Defined [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1336/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ed4325529e6f895fc48fdf66f4d4dad1</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of Artificial [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1335/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">502b11442361427c67f49a6fd8f0577d</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and Sensor [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1334/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7edf30d87a6560eb1b0516332784db5f</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated security [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1333/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513; Closed</p>
<p>    AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f33557bb49aac748f51227cb17f91c72</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1332/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    Data traffic management in AI-IoT network to reduce congestion</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7dc9f90fb81c66e9855b8636d0cdb009</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software Defined [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1331/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ed791836b445e6a6d17c5ec176fe3eb6</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1310/</link>
				<pubDate>Tue, 20 Jan 2026 14:07:00 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9a3f8820657741dc2fa195375dbe806a</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1309/</link>
				<pubDate>Tue, 20 Jan 2026 14:04:53 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">dccb55bd6209dd8db20e7ec69318affa</guid>
				<title>The evolution of broadcast technology has shifted live video contribution from satellite and dedicated fiber links to flexible, software-driven IP networks. One of the most representative systems of this transformation is TVU One, a portable live video transmitter designed for reliable, low-latency broadcasting over heterogeneous and unstable networks.

https://onlyfor.tech/tvu-one-technology-explained-live-ip-video-broadcasting-over-bonded-cellular-networks/</title>
				<link>https://onlyfor.tech/activity/p/1308/</link>
				<pubDate>Tue, 20 Jan 2026 14:03:08 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>The evolution of broadcast technology has shifted live video contribution from satellite and dedicated fiber links to flexible, software-driven IP networks. One of the most representative systems of this transformation is TVU One, a portable live video transmitter designed for reliable, low-latency broadcasting over heterogeneous and unstable&hellip;<span class="activity-read-more" id="activity-read-more-1308"><a target="_blank" href="https://onlyfor.tech/activity/p/1308/" rel="nofollow ugc">Read More</a></span></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://onlyfor.tech/tvu-one-technology-explained-live-ip-video-broadcasting-over-bonded-cellular-networks/" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/2025/02/cropped-cropped-cropped-onlyfor.etch_.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">TVU One Technology Explained: Live IP Video Broadcasting Over Bonded Cellular Networks – Only For Tech</div>				<div class="youzify-wall-link-desc">In-depth technical explanation of TVU One technology, including architecture, OSI model mapping, protocols, bonded cellular networking, and low-latency live IP video broadcasting.</div>				<div class="youzify-wall-link-url">onlyfor.tech</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b22d9a89c8fe4d85ca0f72652273d8e6</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1237/</link>
				<pubDate>Tue, 16 Sep 2025 17:58:43 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">08769415745bda1886340ca9d388c0e7</guid>
				<title>installation scheme for parabolic antenna + UHF/VHF antenna combined into one TV distribution network.</title>
				<link>https://onlyfor.tech/activity/p/1236/</link>
				<pubDate>Tue, 16 Sep 2025 11:49:13 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>installation scheme for parabolic antenna + UHF/VHF antenna combined into one TV distribution network.</p>
</div><div class="youzify-post-attachments">
			<a href="https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023327963.jpg" rel="nofollow" class="youzify-img-with-padding" data-youzify-lightbox="youzify-post-1236"><img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023327963.jpg' alt=""></a>

			</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">56a3b45f1ebfb857e26e8405975660e5</guid>
				<title>Electrical engineer Eldo C. Koenig operating an AC network analyzer¹ analog computer² he designed at the Electrical Department of the Allis-Chalmers Manufacturing Company 1951.
From 1929 to the late 1960s, large alternating current power systems³ were modelled and studied on AC network analyzers or transient network analyzers. They were also called alternating current network calculators or AC calculating boards. These special-purpose analog computers were an outgrowth of the DC calculating boards used in the very earliest power system analysis. Using resistors and capacitors, AC network analyzers were much used for power-flow studies, short circuit calculations, and system stability studies, but were ultimately replaced by numerical solutions⁴ running on digital computers.
Eventually powerful digital computers replaced analog network analyzers for practical calculations, but analog physical models for studying electrical transients⁵ are still in use.
https://en.wikipedia.org/wiki/Network_analyzer_(AC_power)
https://en.wikipedia.org/wiki/Analog_computer
https://en.wikipedia.org/wiki/Electric_power_system
https://en.wikipedia.org/wiki/Numerical_analysis
https://en.wikipedia.org/wiki/Voltage_spike</title>
				<link>https://onlyfor.tech/activity/p/1235/</link>
				<pubDate>Tue, 16 Sep 2025 11:47:20 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>Electrical engineer Eldo C. Koenig operating an AC network analyzer¹ analog computer² he designed at the Electrical Department of the Allis-Chalmers Manufacturing Company 1951.<br />
From 1929 to the late 1960s, large alternating current power systems³ were modelled and studied on AC network analyzers or transient network analyzers. They were also ca&hellip;<span class="activity-read-more" id="activity-read-more-1235"><a target="_blank" href="https://onlyfor.tech/activity/p/1235/" rel="nofollow ugc">Read More</a></span></p>
</div><div class="youzify-post-attachments">
			<a href="https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023185257.jpg" rel="nofollow" class="youzify-img-with-padding" data-youzify-lightbox="youzify-post-1235"><img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023185257.jpg' alt=""></a>

			</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">cf80789750310b89c1d88b07e429f422</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1234/</link>
				<pubDate>Mon, 15 Sep 2025 21:15:14 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">24a7c5c0ddaa189271ce1d0c833c90df</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1233/</link>
				<pubDate>Mon, 15 Sep 2025 18:10:14 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>