Pedestrian crossings have also been highlighted as one of the most dangerous locations in the transportation field. Because people and vehicles share the road, a crosswalk improves …
IoT is a smart-device environment; it acts smarter and gives higher quality to enhance the user experience. IoT is an open network environment. However, IoT's security challenges …
Addressing the security concerns of constrained Internet of Things (IoT) devices, such as client-side encryption and secure provisioning remains a work in progress. IoT devices …
VK Roy, GK Roy, V Thakur, N Baliyan… - 2023 3rd …, 2023 - ieeexplore.ieee.org
To carry out vigorous and effective fruit recognition in farming is difficult since there are a number of variations. Lately, various deep-learning approaches presented an outstanding …
AM Al-Ghaili, H Kasim, NM Al-Hada, Z Hassan… - … Science and Technology, 2022 - Springer
This study designs a secret Key using an Algebraic Procedure (KAP). KAP has the capability to act in a different manner dependent on the plaintext input. Two different secret key length …
R Shwetha, RJSKAC Srinivas… - …, 2022 - search.proquest.com
Background: The use of blockchain technology is sweeping the globe. Using its unique, transparent and secure characteristics, in the next generation of several industrial …