The fast growth of the 'Internet of Things' (IoT) has impacted on several sectors, including fuel management. This paper describes the design, fabrication, and implementation of an IoT-based smart fuel monitor...
详细信息
Significant progress in medical research in recent years has led to the successful treatment of numerous illnesses. Unfortunately, effective treatments for several neurological disorders—particularly those affecting ...
详细信息
Significant progress in medical research in recent years has led to the successful treatment of numerous illnesses. Unfortunately, effective treatments for several neurological disorders—particularly those affecting motor neurons—remain elusive, not only significantly impairing patients' quality of life but also placing a substantial financial burden on both individuals and society. To address this gap, scientists are focusing on model organisms to unravel pathogenic mechanisms and develop treatment strategies. Among various model organisms, Caenorhabditis elegans ( C. elegans) has shown special relevance in neurological disorder research. Escape responses, including reversals and omega turns, are controlled by motor neurons. Thus, the escape response in C. elegans provides researchers with a reliable observational metric to evaluate the functional state of motor neurons. We developed a head and tail position localization model to determine the positions of the nematode's head and tail, enabling automated counting of escape responses. We further clarified the association between escape response and motor neuron function by comparing the escape response of normal nematodes to those with motor neuron deficiencies. Consequently, the automated counting of C. elegans escape responses is a useful tool for assessing the health of motor neurons. It may offer strong backing for the exploration of neurodegenerative disease therapeutics.
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy t...
详细信息
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy to utilize data without citizens’*** this study,we took a technological approach to these *** access(UMA)is a well-known framework for delegating resource access rights to others on the *** UMA,authorization mechanisms are designed to be centralized so that resource owners can centrally manage access rights for various resources stored in different ***,the lack of transparency in the authorization mechanism is a barrier to its implementation in large-scale systems such as smart *** this study,we developed a blockchain-based cross-domain authorization architecture that enables a resource-sharing ecosystem in which organizations that wish to utilize data can freely trade with each *** proposed architecture solves the transparency problem that conventional authorization systems have had by designing the authorization mechanism on blockchain *** implemented the proposed architecture as smart contracts and evaluated its processing *** resultant time required for delegating access rights and accessing resources was less than 500 ***,we found that the fluctuation in the processing time overhead was *** on these results,we concluded that performance degradation with the proposed architecture is minor.
The Internet of Things (IoT) is considered the base factor, that helps in developing many sectors. Additionally, IoT provides novel applications and services, i.e. smart homes, connected cars, and industrial automatio...
详细信息
The trend of conducting property safety inspections is increasingly being recognized and adopted by governments and the public. In this research, a comparison of various supervised learning models based on Convolution...
详细信息
Developing ultra-low-power devices requires low-power components, algorithms, and communication protocols. For environmental monitoring along the supply chain, products may travel a long way from the distributor to th...
Developing ultra-low-power devices requires low-power components, algorithms, and communication protocols. For environmental monitoring along the supply chain, products may travel a long way from the distributor to the customer. In addition, extreme climatic circumstances, such as temperatures below 0°C, affect battery capacity. In order to monitor package’s environment, it is crucial to ensure that all embedded system parts use as little energy as possible. This paper addresses how much power the SPI and I2C communication protocols use. These protocols are widely used in low-power embedded devices for sensor communication. Based on its results, this research article presented recommendations for developing ultra-low power embedded devices that use the SPI/I2C protocol.
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.
In recent times, the number of spam reviews through various online platforms has emerged as a prime challenge, profoundly impacting businesses and consumers. These fake reviews not only distort clients' perception...
详细信息
Innovative rehabilitation treatments are needed since stroke is a major cause of long-term impairment globally. In this paper, it presents a smart robotics-assisted rehabilitation system for stroke patients that uses ...
详细信息
This comprehensive article explores the integration of reconfigurable intelligent surfaces (RIS) with massive multiple input and multiple output (mMIMO) systems for future wireless networks, focusing on millimeter-wav...
详细信息
暂无评论