The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face ...
详细信息
The Wireless IoT sensor network (IWSN) has significant potential in industrial settings, but to fully realize its benefits, a robust and scalable computer system is required to handle the continuous influx of data fro...
详细信息
The Wireless IoT sensor network (IWSN) has significant potential in industrial settings, but to fully realize its benefits, a robust and scalable computer system is required to handle the continuous influx of data from various applications. In this research study, we propose an IoT sensor-cloud architecture that integrates WSN with cloud technology, providing a unique data analytics framework for highly secure analysis of sensor data. The proposed architecture emphasizes effective interoperability mechanisms in the cloud, and provides an IPv6 extensible enterprise WSN design and simulation technique. To demonstrate the effectiveness of our proposed architecture, we track the pH, resistivity, and dissolved oxygen levels of industrial effluents that are discharged into water sources. We use AT instructions in conjunction with the HTTP GET technique to gather and upload detector data to the ThingSpeak cloud through a GPRS internet connection, enabling real-time online monitoring and control using IoT functionality. The proposed architecture uses a distributed approach to handle high volumes of incoming data from the IoT sensors, storing the data in a scalable and accessible way for analysis. Real-time analysis is performed using a combination of batch and stream processing frameworks and machine learning algorithms, and the results are visualized using a web-based dashboard that provides real-time updates on key metrics and allows users to explore the data in different ways. Security is a top priority in our proposed architecture, and we use encryption technologies such as SSL/TLS and access control mechanisms such as OAuth2 to ensure the secure transmission and storage of sensitive industrial IoT data. The architecture is designed to be scalable and adaptable to handle a wide range of IoT use cases in industrial settings. The proposed IoT sensor-cloud architecture provides a robust and scalable solution for the collection, analysis, and exchange of significant amounts
A wireless sensor network (WSN) encompasses a huge set of sensor nodes employed to collect data and transmit it to a base station (BS). Due to its compact, inexpensive, and scalable nature of sensors, WSN finds its ap...
详细信息
Predictive maintenance in the automotive sector has received a lot of attention because of its potential to improve operating efficiency and lower maintenance costs. This paper presents an approach for predictive...
详细信息
A system for smart vehicle emissions monitoring and analysis using cloud computing and neural networks is presented in this paper. As global environmental concerns develop, monitoring and reducing vehicle emissions is...
详细信息
A sin laryngeal carcinoma is the most common kind of head and neck cancer to damage the soft tissues of the larynx. To prevent further medical difficulties and to provide better patient care, early stage laryngeal can...
详细信息
Autonomous vehicles in industrial parks can provide intelligent,efficient,and environmentally friendly transportation services,making them crucial tools for solving internal transportation *** the characteristics of i...
详细信息
Autonomous vehicles in industrial parks can provide intelligent,efficient,and environmentally friendly transportation services,making them crucial tools for solving internal transportation *** the characteristics of industrial park scenarios and limited resources,designing and implementing autonomous driving solutions for autonomous vehicles in these areas has become a research *** paper proposes an efficient autonomous driving solution based on path planning,target recognition,and driving decision-making as its core *** designs for path planning,lane positioning,driving decision-making,and anti-collision algorithms are *** analysis and experimental validation of the proposed solution demonstrate its effectiveness in meeting the autonomous driving needs within resource-constrained environments in industrial *** solution provides important references for enhancing the performance of autonomous vehicles in these areas.
Fast and reliable wireless communication has become a critical demand in human life. In the case of mission-critical (MC) scenarios, for instance, when natural disasters strike, providing ubiquitous connectivity becom...
详细信息
Ship detection in SAR images is a challenging task due to the small target size, background noise, near-coastline noise, etc. In this paper, we propose to employ existing SAR dataset as a transitive dataset to improve...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
暂无评论