An Optimized Bio-inspired Localization Routing Technique for Sustainable IIoT Networks & Green Cities

P Chithaluru, F Al-Turjman, T Stephan, M Kumar… - Sustainable Cities and …, 2023 - Elsevier
Abstract The industrial Internet of Things (IIoTs) network life is shortened due to sensor node
(SN) energy limitations and computational capability. As a result, optimum node location …

A cooperation federated forwarder selection technique for maximizing network lifetime in wireless sensor network

R Tiwari, P Chithaluru, K Kumar, M Kumar, T Stephan - Sādhanā, 2023 - Springer
Abstract Wireless Sensor Network (WSN) fulfills the requirements to solve real-life
applications due to their unattended nature. But, the main constraint faced by researchers is …

Surveillance Approaches to Intrusion Detection, Crop Health, and Disease Prevention in Agriculture

NB Nong, M Tarek - Quarterly Journal of Emerging Technologies and …, 2023 - vectoral.org
Agriculture is facing numerous challenges in the 21st century, including crop damage from
intrusions, water stress, weed infestation, and disease outbreaks. This study examines the …

Comprehensive simulation-based workflow to assess the performance of occupancy-based controls and operations in office buildings

S Azimi - 2023 - repository.library.carleton.ca
Most building services provided, from ventilation to cleaning, should be a function of
occupancy. Yet occupancy is seldom measured in a comprehensive way such that the data …

Realtime Intrusion Detection System Using Open CV

AS Teja, GC Mohini, D Dhanunjay… - Journal of Survey in …, 2023 - sifisheriessciences.com
Security in restricted areas is essential for protecting valuable assets, sensitive information,
ensuring the safety of personnel from intruders. Traditional security systems have many …