Agriculture is vital to food security and economic stability, but weeds reduce crop yields by competing for sunlight, water, and nutrients. Manual weeding and herbicides are often ineffective and environmentally harmf...
详细信息
For a safe and effective commuting experience in the near future, autonomous vehicles are a growing technology. 85% or more of traffic accidents could potentially be avoided with the use of autonomous vehicles. Driver...
详细信息
The proceedings contain 63 papers. The special focus in this conference is on Internet of Things. The topics include: Blockchain-Based Secure Noninvasive Glucometer and Automatic Insulin Delivery System for ...
ISBN:
(纸本)9783031458774
The proceedings contain 63 papers. The special focus in this conference is on Internet of Things. The topics include: Blockchain-Based Secure Noninvasive Glucometer and Automatic Insulin Delivery System for Diabetes Management;an Efficient and Secure Mechanism for Ubiquitous Sustainable computing System;understanding Security Challenges and Defending Access control Models for Cloud-Based Internet of Things Network;fog computing in the Internet of Things: Challenges and Opportunities;A 2-Colorable DODAG Structured Hybrid Mode of Operations Architecture for RPL Protocol to Reduce communication Overhead;role-Based Access control in Private Blockchain for IoT Integrated Smart Contract;VXorPUF: A Vedic Principles - Based Hybrid XOR Arbiter PUF for Robust Security in IoMT;Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles;fortiRx: Distributed Ledger Based Verifiable and Trustworthy Electronic Prescription Sharing;a Survey of Pedestrian to Infrastructure communication System for Pedestrian Safety: System Components and Design Challenges;survival: A Smart Way to Locate Help;federated Edge-Cloud Framework for Heart Disease Risk Prediction Using Blockchain;understanding Cybersecurity Challenges and Detection Algorithms for False Data Injection Attacks in Smart Grids;comprehensive Survey of Machine Learning Techniques for Detecting and Preventing Network Layer DoS Attacks;power Analysis Side-Channel Attacks on Same and Cross-Device Settings: A Survey of Machine Learning Techniques;Lite-Agro: Exploring Light-Duty computing Platforms for IoAT-Edge AI in Plant Disease Identification;farmIns: Blockchain Leveraged Secure and Reliable Crop Insurance Management System;PTSD Detection Using Physiological Markers;a Signal Conditioning Circuit with Integrated Bandgap Reference for Glucose Concentration Measurement;detection of Aircraft in Satellite Images using Multilayer Convolution Neural Network;computer Vision Based 3D Model Floor Construction
This research presents a novel method that uses a Fractional Order Tilt-Integral-Derivative (FOTID) controller optimized with the Chaotic Salp Swarm Optimization (CSO) algorithm to improve frequency regulation and tra...
详细信息
The constrained application protocol CoAP is an IoT communication protocol proposed by the CoRE working group of IETF. It is widely used in the IoT field due to its features such as lightweight, low power consumption,...
详细信息
With the ever-increasing Internet usage, people have shifted their purchasing habits from offline to online. This has led to the rapid rise in electronic word-of-mouth (eWOM), which plays a good role in determining pu...
详细信息
This research creates an NFC-inclusive website-based inventory management system that enhances tracking and management of stock. Scanning these tags allows users to obtain a specific product description without wastin...
详细信息
Common simulation experiment evaluation is mostly static post-evaluation, which takes a long time and cannot meet the requirement of concurrent experiment and evaluation. To solve the above problems, this paper design...
详细信息
In this paper, a new method of adjusting the resistance value of the memristor is proposed by studying the existing resistance control methods and improving the variable gate voltage control method. The experimental r...
详细信息
暂无评论