Smart agriculture system with E–carbage using IoT

A Senthil Kumar, G Suresh, S Lekashri… - … Journal of Modern …, 2021 - eprints.tiu.edu.iq
Farming is the foundation of India. These days because of populace, mishaps and
contamination subsequently level of the agribusiness field in India are diminishing. So we …

Prediction of COVID-19 growth and trend using machine learning approach

E Gothai, R Thamilselvan, RR Rajalaxmi… - Materials Today …, 2023 - Elsevier
Abstract The Covid-19 Corona Virus, also known as SARS-CoV-2, has wreaked havoc
around the world, and the condition is only getting worse. It is a pandemic disease …

Improving air pollution detection accuracy and quality monitoring based on bidirectional RNN and the Internet of Things

D Saravanan, KS Kumar - Materials Today: Proceedings, 2023 - Elsevier
Apart from the detection of air pollution, the accuracy in obtained data has to be focussed,
and quality has to be monitored. This can be achieved by analyzing the environment …

Data Traffic Trust Model for Clustered Wireless Sensor Network

A Senthilkumar, S Lekashri… - … Technology in Industry, 2021 - it-in-industry.org
Trust is an essential parameter among sensor nodes to provide secured and successful
communication. Many trust management schemes have been proposed earlier for large …

Improving the state of materials in cybersecurity attack detection in 5G wireless systems using machine learning

S Sumathy, M Revathy, R Manikandan - Materials Today: Proceedings, 2023 - Elsevier
The utilization of information from the radio channel is useful in detecting the spoofing
attacksin 5G wireless communications. This concept has been used for a wide range of uses …

Distributed context tree weighting (ctw) for route prediction

VS Tiwari, A Arya - Open Geospatial Data, Software and Standards, 2018 - Springer
Route prediction play a vital role in many important location-based applications like
resource prediction in grid computing, traffic congestion estimation, vehicular ad-hoc …

Cyber Security and Privacy Internal Attacks Measurements Through Block Chain

KSAI MANOJ, PS Aithal - Information Technology in Industry, 2021 - it-in-industry.org
Cyber Security plays critical role in privacy and now a day's its assumesanimportanttask in
the field of data security. Security concern Block chain gives best fruitful results to overcome …

An advanced and effective encryption methodology used for modern IoT security

P Velmurugan, SS Sridhar, E Gotham - Materials Today: Proceedings, 2023 - Elsevier
IoT has started capturing the market all over the world. Nearly all household appliances are
available and consumer can buy them. Lack of security leaves the customer potentially …

A Systematic Review on Personal Route Prediction Techniques based on Trajectory data

D Goel, N Duhan, KK Bhatia - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
With the advancement of location-acquisition and mobile computing devices in today's life,
the trajectory data obtained from Global Positioning System (GPS) is becoming large which …

Land-use and Water body Delineation of Chennai and Kerala Lake with PSO, CSO and FCM

A Sivasankari, S Jayalakshmi - 2021 5th International …, 2021 - ieeexplore.ieee.org
Delineation of land cover, and water body is challenging because of mixed pixels near the
boundary regions of different land elements. The delineation near the boundary regions in …