The rapid development of the Internet of Things (IoT) has brought about the processing and storage of sensitive information on resource-constrained devices, which are susceptible to …
Abstract The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their …
MYSK Yasaswy, T Manimegalai… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
To predict the crop yield rate using Innovative Gradient Boosting over Random Forest in Agriculture. Random Forest and Gradient Boosting with sample size (N= 20) were iter-ated …
S Balakrishnan, AD Azman, J Nisar… - International Conference …, 2023 - Springer
The demand for efficient and secure warehouse operations has significantly increased due to growing customer expectations and competition in modern businesses. Smart …
This chapter has simulated and designed the intrusion detection and border surveillance system using mobile WSN technology. Due to increased terrorism globally, border protection …
YJ Seng, TY Cen, MAH bin Mohd Raslan… - 2024 - preprints.org
Ransomware, a combination of" ransom" and" malware," is a type of malicious software designed to encrypt or block access to a victim's data or system, demanding a ransom for its …
MYSK Yasaswy, A Sivagami… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
To reduce round trip times of vehicular grounding for intelligent transport administration using Ad Hoc On Demand Vector (AODV) in urban and semi-urban areas using smart …
In this work girl child security system using a GPS tracker in lOT with Thingspeak (Group 1) is going to be designed and compared with the girl child security device using fuzzy …
KR DR, H Kumar, K Ayyappaswamy, C Ravindramurthy… - 2024 - researchsquare.com
QR code access is required for payment transactions, these details should be protected with enhanced security. Implementation of IoT devices in retail needs to have good …