The proceedings contain papers. The special focus in this conference is on . The topics include: Impact of artificial intelligence on high-penetration renewable physical infrastructure;collaborative attacks and defens...
ISBN:
(纸本)9781032738659
The proceedings contain papers. The special focus in this conference is on . The topics include: Impact of artificial intelligence on high-penetration renewable physical infrastructure;collaborative attacks and defense;building a safe and secure metaverse;distributed-computing based versatile healthcare services framework for diagnostic markers;supervised context-aware Latent Dirichlet allocation-based drug recommendation model;combination kernel support vector machine based digital twin model for prediction of dyslexia in distributed environment;Time series analysis of vegetation change using remote sensing, GIS and FB prophet;advances in smart farming for precision agriculture: Green-IoT and machine learning as a solution;Towards a serverless computing and edge-intelligence architecture for the Personal-internet-of-Things (PIoT);IOT and developed deep learning based road accident detection system and societal knowledge management;Healthcare CAD model for hierarchical processing of surgical navigation system;applicability of eye tracking technology in virtual keyboard for human-computer interactions;a digital twin framework for smart contract-based DeFi applications in the metaverse: Towards interoperability, service scaleup & resilience;a novel approach to glass identification using ensemble learning for forensics;deep learning-based cognitive digital twin system for wrist pulse diagnostic and classification;Multi-class instance segmentation for the detection of cervical cancer cells using modified mask RCNN;dilated convolution model for lightweight neural network;artificial intelligence based Monte Carlo model for epidemic forecasting for societal aspect;efficient data visualization through novel recurrent neural network-based dimension reduction;An optimized CNN-based model for pneumonia detection;EEG-based emotion recognition: Leveraging CNNs for precision;A seven layer DNN approach for social-media multilevel image-based text classification.
Recently, there has been a boom in imaginative medical services technologies that have enhanced the delivery of medical care data. Human-to-human and gadget-to-gadget networks are crucial in people’s lives and functi...
详细信息
With the rapid development of sensors, wireless communication, andcomputingtechnology, internet of Things (IoT) has gained significant research interest. In particular, increasing people-oriented applications and sy...
详细信息
The internet of Things (IoT) is considered an evolving technology, consisting of different types of connected devices that have sensors, specialized hardware, and software. However, considerable challenges related to ...
详细信息
ISBN:
(数字)9798331506995
ISBN:
(纸本)9798331507008
The internet of Things (IoT) is considered an evolving technology, consisting of different types of connected devices that have sensors, specialized hardware, and software. However, considerable challenges related to user data privacy, security, and device integrity are presented by this swift expansion, with digital identity being identified as a significant concern in the online landscape. Established by the World Wide Web Consortium (W3C) [2], Decentralized Identifiers (DIDs) represent a standardized format for defining identity. A peer-to-peer model for managing identity and credentials through self-sovereign identity is facilitated by DIDs, in conjunction with blockchain technology and public-key cryptography. The development of verifiable credentials is enabled by the combination of DIDs and blockchain technology, allowing for the verification of the identities of transacting parties through distributed identity registration and the identification of cryptographic keys necessary for validating electronic authentication during transactions. This integrated framework is regarded as both reliable and trusted. Device registration, verification, and credential revocation are enabled by it. In addition, security is ensured, the privacy of participating nodes is respected, and data integrity is upheld to address several existing challenges, such as data scalability and confidentiality. Trusted management and transaction of IoT data are ensured by the presented IoT data platform. Blockchain, decentralized identifiers, and public key cryptography are integrated by the authors to develop this platform. Self-sovereign identity is granted to each participating device, and dynamic changes in components like consensus algorithms and databases are supported by key features. Different IoT communication protocols are evaluated within a decentralized blockchain infrastructure for identity verification by the authors, focusing on interactions between IoT devices and networked se
The internet of Things (IoT) has swept the linked globe. internet of Things devices are growing exponentially globally due to their great practicality. Securing such gadgets, however, has received surprisingly little ...
详细信息
The distributedcomputing track of icdcit 2005 received 181 papers. Based on the review by the members of the Program Committee, 16 full and 9 short papers were selected for inclusion in the proceedings of the confere...
详细信息
The proceedings contain 66 papers. The topics discussed include: distributedcomputing track chair's message;efficient binding lifetime determination schemes in HMIPv6;a fast search and advanced marking scheme for...
详细信息
ISBN:
(纸本)3540309993
The proceedings contain 66 papers. The topics discussed include: distributedcomputing track chair's message;efficient binding lifetime determination schemes in HMIPv6;a fast search and advanced marking scheme for network IP traceback model;self-stabilizing energy-aware routing algorithm in wireless sensors network with limited mobility;position based gradient routing in mobile ad hoc networks;self-stabilizing deterministic TDMA for sensor networks;distributed time slot assignment in wireless ad hoc networks for STDMA;secure two-party context free language recognition;cleaning an arbitrary regular network with mobile agents;and a tool for automated resource consumption profiling of distributed transactions.
internettechnology Track received around 60 papers and the papers were reviewed by the international program committee and finally 9 papers have been selected for presentation (6 full and 3 short papers). As the trac...
详细信息
In this paper, we consider the problem of multiple hypothesis testing by a bandwidth and power constrained sensor network with a fusion center. We propose a scheme, where each sensor is restricted to send a 1-bit mess...
详细信息
In this paper, we report some experiments and observations to make browsing of images more adaptable using small devices. We highlight the usability of such an alternative in mobile e-commerce and bandwidth-constraine...
详细信息
暂无评论