The emergence of pandemic diseases like Covid-19 in recent years has made it more important for Internet of Medical Things (IoMT) environments to build contact between patients and doctors in order to control their he...
详细信息
Cognitive Radio Network provides opportunistic spectrum access to unlicensed users in the absence of licensed users using dynamic spectrum access technology. The key challenge here is to impartially share the existing...
详细信息
The holiday season brings out the crowds at shopping centers in major cities. When there are substantial savings to be obtained, this becomes even more true. People today often fill their shopping carts with a wide se...
详细信息
ISBN:
(纸本)9798350303339
The holiday season brings out the crowds at shopping centers in major cities. When there are substantial savings to be obtained, this becomes even more true. People today often fill their shopping carts with a wide selection of products. Once a customer has finished shopping, he or she should head to the counter to settle the payment. It takes time for the cashier to create the bill using a barcode scanner. Because of this, there are often substantial wait times at the cash registers. This project proposes a solution for retail centers to address the issues mentioned above. This might be accomplished by installing RFID tags on all mall merchandise and retrofitting all shopping carts with a radio-frequency identification reader and a liquid crystal display. Any item placed in the shopping cart will have its barcode scanned automatically, and the trolley's digital signboard will update to show the item's name and price. When an item is removed from a shopping cart, its cost is subtracted from the grand total, and the relevant data is transmitted to the central billing unit through radio-frequency (RF) modules. Customers may save a ton of time since billing can be done right on the tram. The researchers worked on developing a shopping cart, which is smart, and this system allows for faster checkout and payment of the bill in a secure manner, and the adoption of technology in the store increases the demand for it continuously, the computer will remember the barcode data you enter and compare it to its database, from which it will get the necessary data. The database and RF model will be connected through software. Small radio-frequency (RF) electrical modules called a 'transmitter' and 'receiver' can be used to transmit and receive signals between any two devices. The data is sent from the transmitter module to the receiver module, which then processes the data. The group believes that the intelligent shopping cart will result in a more dependable checkout procedure and
作者:
Petkar, Taniya
Faculty of Engineering and Technology Department of Computer Science And Medical Engineering Maharashtra Wardha442001 India
This paper presents a novel line-of-control (LoC) monitoring system that leverages the Internet of Things (IoT) to improve border security. The system creates a strong infrastructure for real-time monitoring throughou...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret...
详细信息
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoreticalmodels aim to study and analyze the strategic behaviors of individuals within a crowd and their interactionsduring the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. Thesemodels consider a group of individuals as homogeneous objects with the same goals, involve complex mathematicalformulation, and cannot model real-world scenarios such as panic, environmental information, crowds that movedynamically, etc. The proposed work presents a game theoretic model integrating an agent-based model to removethe obstacles from exits. The proposed model considered the parameters named: (1) obstacle size, length, andwidth, (2) removal time, (3) evacuation time, (4) crowd density, (5) obstacle identification, and (6) route *** proposed work conducts various experiments considering different conditions, such as obstacle types, obstacleremoval, and several obstacles. Evaluation results show the proposed model’s effectiveness compared with existingliterature in reducing the overall evacuation time, cell selection, and obstacle removal. The study is potentially usefulfor public safety situations such as emergency evacuations during disasters and calamities.
One of the principal cause of mortality in the countryis liver disease. Each year, liver disease kills more than 2.4 percent of all Indians. As a result,for the early intervention of liver disease, anautomated program...
详细信息
In this work,a modified weak Galerkin finite element method is proposed for solving second order linear parabolic singularly perturbed convection-diffusion *** key feature of the proposed method is to replace the clas...
详细信息
In this work,a modified weak Galerkin finite element method is proposed for solving second order linear parabolic singularly perturbed convection-diffusion *** key feature of the proposed method is to replace the classical gradient and divergence operators by the modified weak gradient and modified divergence operators,*** apply the backward finite difference method in time and the modified weak Galerkin finite element method in space on uniform *** stability analyses are presented for both semi-discrete and fully-discrete modified weak Galerkin finite element *** order of convergences are obtained in suitable *** have achieved the same accuracy with the weak Galerkin method while the degrees of freedom are reduced in our *** numerical examples are presented to support the theoretical *** is theoretically and numerically shown that the method is quite stable.
As cloud computing evolves, traditional resilience strategies must adapt to new challenges. This paper introduces CRISP, Cloud Resilient Infrastructure for Self-Healing Platforms, a pioneering framework designed to en...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
Internet of things (IoT) has opened new horizons in connecting all sorts of devices to the internet. However, continuous demand for connectivity increases the cybersecurity risks, rendering IoT devices more prone to c...
详细信息
暂无评论