the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecas...
the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecasting;unbiased text categorization in IoT-based digital content using a word-to-graph model;multimodal sentiment analysis based on video and audio inputs;asynchronous inter-class project collaboration adaptation method to agile practices in university context;resource consumption analysis of distributed machine learning for the security of future networks;modeling Wazuh rules with weighted timed automata;evaluating safe region sizes for accuracy in approximate continuous nearest neighbor queries;and intrusion detection systems in IoT based on machine learning: a state of the art.
the current study presents a risk assessment and mitigation framework based on augmented reality (AR) used in healthcare systems to improve human-computer interaction and assistive technology. the proposed approach is...
详细信息
Cloud Computing has reformed the way agencies manage and store their data by offering scalable and flexible computing resources. However, data security and trustworthiness in the cloud remain major concerns. Trust-bas...
详细信息
To address the storage capacity limitations and high costs inherent in the existing single-chain storage model of blockchain-based traceability systems, a strategy combining on-chain and off-chain storage using IPFS a...
详细信息
Internet of things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT ...
详细信息
Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. these limitations compromise transparency, security, and data integrity. this paper proposes a decentralized and se...
详细信息
Smart environments are worried about private keys and security problems. To prevent security attacks, which take benefit of a few of these intrusion detection systems (IDSs) and security vulnerabilities, were modeled....
详细信息
In the Internet of things, Power consumption has always been an issue, particularly for small wireless devices. the device requires a consistent flow of electricity. For the development of sustainable and energy-effic...
详细信息
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci...
详细信息
the Internet of things integrate various electronics devices on common platform as objects over the Internet. IoT devices have limited capabilities, such as low power, less memory, and low computational processing. Be...
详细信息
暂无评论