Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physi...
详细信息
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physicalmechanism has attracted extensive *** to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical *** this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is *** order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same *** analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
In furtherance to this, this research work focuses on the role of applying machine learning techniques in predicting the price of Gold using price data along with three macroeconomic variables. Thirteen models were te...
详细信息
Autism Spectrum Disorder (ASD) is a neurodevelopmental disorder that significantly impacts social interaction and communication. Early detection and intervention are crucial for optimal outcomes. This research investi...
详细信息
These days, e-commerce and online transactions are spreading quickly throughout our nation. It has a significant impact on India's digitalization. In this study, we will examine rural residents' awareness of o...
详细信息
作者:
Latha, R.Bommi, R.M.Simats
Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
Enhancing manufacturing and industrial processes are achieved using smart sensors and actuators known as the industrial internet or things or IIoT. By implementing IIoT, machines transform into smart devices, communic...
详细信息
In this note, a new structure of Right Coprime Factorization (RCF) for nonlinear systems with uncertainty has been proposed based on a time-varying Bezout identity. This is inspired from the concept of dilation from h...
详细信息
This paper presents a novel system for smart waste management using IoT technology. With the rapid growth of urban areas and population, proper waste management has become a crucial issue for maintaining a healthy env...
详细信息
A comprehensive overview of Identity-Based Encryption (IBE) and its applications in cloud computing has been provided in this study. It covers the basic concept of IBE and its advantages over traditional public-key cr...
详细信息
Human Pose Estimation is the task of estimating the human joints in a 2D or 3D coordinate plane from an input RGB image. The 2D HPE are of two types: top-down and bottom-up. The 3D Human Pose Estimation gives better u...
详细信息
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos...
详细信息
暂无评论