Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitatio...
详细信息
ISBN:
(纸本)9781665456456
Due to its many uses and ability to save and restore data, whether for businesses or individuals, cloud computing has become one of the mainstays in the technology world over the past few years. However, the limitations on speeds and sizes as well as the evolving of the Internet of things made it challenging to rely on the cloud due to the extremely slow data processing. therefore, to store and interpret the massive amount of data rapidly, programmers switched towards a new technology which is fog computing. this mini survey paper will outline fog computing as an integral part of cloud and edge computing for improving security and data protection. A systematic literature review of selected research papers that include findings and algorithms used to enhance security-related problems such as availability, latency, and intrusion detection will be discussed. this mini review paper finds out a state-of-the-art on the cybersecurity issues in fog computing using blockchain.
Security is the important problem in wireless sensornetworks. the nodes are deployed in environment without any security measures. One of the important attacks in wireless sensornetworks is node replication attack. ...
详细信息
the categorization of papaya fruit varieties is important within the agricultural industry. there is a need for a system that can accurately evaluate the different varieties of papaya fruits to save labor expenses ass...
详细信息
Filter pruning is a common method to achieve model compression and acceleration in deep neural networks (DNNs). Some research regarded filter pruning as a combinatorial optimization problem and thus used evolutionary ...
详细信息
the coverage problem of wireless sensornetworks (WSNs) for dynamic areas is studied. It is explicitly observed that most of the existing studies focus on static areas. However the areas of interest for many WSNs appl...
详细信息
Pipelines are vital infrastructure for the transportation of water, sewage, oil, and gas because they offer a better safety option and fit into the minimum environmental hazardous than other modes. But pipelines are a...
详细信息
the proceedings contain 43 papers. the topics discussed include: performance comparison of seven pretrained models on a text classification task;decorrelation proportionate normalized least mean M-estimate algorithm w...
ISBN:
(纸本)9781450396912
the proceedings contain 43 papers. the topics discussed include: performance comparison of seven pretrained models on a text classification task;decorrelation proportionate normalized least mean M-estimate algorithm with variable step-size;cluster analysis for cancer omics data using neural network with data augmentation;sentiment analysis for e-commerce reviews based on deep learning hybrid model;aspect-sited hybrid graph neural networks for sentiment classification;handling concept drift in financial time series data: recurrent Xavier on-line sequential extreme learning machine;an investigation of feature difference between child and adult voices using line spectral pairs;wideband beamspace robust capon beamformer;application of adaptive sub-band filters on active noise control;a unifying framework for blind source separation algorithms based on generalized eigen-value decomposition;research on visual recognition technology of damaged navigation mark based on improved Efficientnet;and human activity recognition based on convolutional neural network via smart-phone sensors.
Wireless sensornetworks have become so widespread where they have become an important part of our daily lives. Wireless sensornetworks have characteristics that distinguish them from other communication systems. How...
详细信息
Wireless sensornetworks have become so widespread where they have become an important part of our daily lives. Wireless sensornetworks have characteristics that distinguish them from other communication systems. However, these networks suffer from security gaps and threats such as presence of malicious nodes. the main objective of this work is detecting the presence of such nodes in sensornetworks. Detecting malicious nodes helps in reducing power consumption, delay, and packet drop rate. this in turn reflects positively on the performance of these networks. throughput, power consumption, and delay have been studied for the purpose of detecting the presence of the malicious node in a sensor network. Empirical study has been performed in this work using NS-2 simulator.
the proceedings contain 92 papers. the topics discussed include: analog approximation of functions using generalized polynomials;secure images transmission using a three-dimensional s-box-based encryption algorithm;de...
ISBN:
(纸本)9781665427357
the proceedings contain 92 papers. the topics discussed include: analog approximation of functions using generalized polynomials;secure images transmission using a three-dimensional s-box-based encryption algorithm;development of a wind turbine digital-twin for failure prognosis: first results;an efficient design of 1:2 demultiplexer based on QCA technology;automatic software engineering position resume screening using natural language processing, word matching, character positioning, and regex;modeling of three-tank hybrid system using mixed logical dynamical formalism;optimal configurations of a photovoltaic-diesel electrical production system with electrochemical and inertial storage for an isolated agricultural site electrification;optimal configurations of a photovoltaic-diesel electrical production system with electrochemical and inertial storage for an isolated agricultural site electrification;sun sensor design for full field of view coverage;and sliding mode observer for fractional order nonlinear dynamical systems.
Smart technologies have revolutionized home automation, enhancing the way people interact withthe environment. this study introduces an innovative home automation system that combines voice and gesture recognition te...
详细信息
ISBN:
(数字)9798350367171
ISBN:
(纸本)9798350367188
Smart technologies have revolutionized home automation, enhancing the way people interact withthe environment. this study introduces an innovative home automation system that combines voice and gesture recognition technologies for seamless control of household appliances. the proposed system integrates various hardware components, including a gesture sensor, Bluetooth module, Arduino, LCD display, and a 4-channel relay module to manage devices such as fans, lights, plugs, and AC/TV units. Voice commands and hand gestures are processed via Arduino, activating or deactivating appliances through relay modules. the Bluetooth module allows remote operation via smartphones, enhancing convenience and accessibility. the LCD display provides real-time feedback and status updates, improving user experience with clear and concise information. this smart and user-friendly system offers an efficient solution for managing home environments, leveraging advanced recognition technologies and intelligent hardware integration.
暂无评论