Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
 Abstract: Reuse of existing deteriorated bituminous pavement material in construction and maintenance of flexible pavement is called recycling of bituminous pavement. Removed and reprocessed deteriorated pavement material which is... more
    • by 
    •   13  
      Image ProcessingGlobalizationMachine LearningWireless Communications
    • by 
    •   8  
      Information SecurityPrivacyInformation Security and PrivacyHealthcare
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
    • by 
    •   6  
      Computer SecurityCloud ComputingCloud Computing SecurityInternet of Things (IoT)
    • by 
    •   9  
      Computer ScienceInformation SecurityPrivacyInformation Security and Privacy
The drainage system is the action of draining waste water and sticky liquid components towards the rivers using particular patterns, drainage channels and streams. Drainage system basically refers to all the piping within the private and... more
    • by  and +2
    •   14  
      IOTN , orthodontic treatment needInternet of Things (IoT)IOTModified IOTN
ABSTACT Fog computing is a prime example that extends Cloud computing and Internet of Things (IoT) application services to the edge of the network. Correlated to Cloud, Fog computing provides data transferring, larger and more immediate... more
    • by 
    •   13  
      The Internet of ThingsCloud ComputingMobile Cloud ComputingCloud Computing Security
ETL stands for extraction, transformation and loading, where extraction is done to active data from the source, transformation involve data cleansing, data filtering, data validation and finally application of certain rules and loading... more
    • by 
    •   3  
      Hospitality ManagementHotel ManagementIoT Security
6LowPAN was introduced by the IETF as a standard protocol to interconnect tiny and constrained devices across IPv6 clouds. 6LowPAN supports a QoS feature based on two priority bits. So far, little interest has been granted and this QoS... more
    • by 
    •   20  
      The Internet of Thingsa-IGZO TFTsUV light a-IGZO TFTsTFT-LCDs
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to... more
    • by 
    •   11  
      Computer ScienceHuman Computer InteractionComputer VisionComputer Engineering
Controlled and precise delivery of fluid is one of the essential requirement in many fluid flow applications such as micro fluidics, Micro Electro Mechanical Systems, micro-machining and in medicinal biological systems. Such deliveries... more
    • by  and +3
    •   16  
      Internet of Things (IoT)Resin infusionDigestive infusionsNeedle Syringe Program-Based Primary HealthCare Centers: Advantages and Disadvantages
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or "tweeting" your activities from your vacation. Today it is being used everywhere, now imagine a device that... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation SecurityMachine Learning
2nd International Conference on Cloud Computing and IOT (CCCIOT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Cloud computing and IoT. The aim of the... more
    • by 
    •   9  
      Cloud ComputingCloud Computing SecurityInternet of Things (IoT)Cloud-based web applications
This paper proposed a new method to attack the NTRU cryptosystem [Hof00a, Hof98b]. It tried to exploit the public information about the parameters of NTRU cryptosystem and using the public key, to recover the private keys without delving... more
    • by 
    •   6  
      Internet of ThingsCryptographyCryptanalysisCiphertext-Only Attacks
Internet of things (IoT) is the epitome of sustainable development. It has facilitated the development of smart systems, industrialization, and the state-of-the-art quality of life. IoT architecture is one of the essential baselines of... more
    • by 
    •   7  
      Computer SecurityCyber SecurityInternet of Things (IoT)IoT architecture
In this paper, we explain the most important phase of security architecture for Internet of Things (IoT) based on software-defined networking (SDN). In this context, the SDN-based architecture is executed with or without the... more
    • by  and +2
    •   17  
      SecurityAuthenticityComputer Hardware and NetworkingComputer Networking
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate... more
    • by 
    •   20  
      Computer ScienceArtificial IntelligenceStructural Health MonitoringHealth
IoT in human services is the central member in giving better clinical offices to the patients and encourages specialists and hospitals. The proposed framework here comprises different clinical gadgets, for example, sensors and online or... more
    • by 
    •   7  
      Computer ScienceComputer EngineeringStructural Health MonitoringHealth monitoring
The main hypothesis is that the blockchain establishes a system of creating a distributed consensus i n the digital online world. This allows participating entities to know for certain that a digital event happened by creating an... more
    • by 
    •   18  
      Quantum ComputingCryptographyQuantum CryptographyArtificial Inteligent
In today’s lifestyle, Health has become a serious issue which directly affects quality of LIFE of a person. Health problems like cardiac failure, high blood pressure and diabetic patient needs to monitor problem on regular basis. This... more
    • by  and +1
    •   20  
      Computer ScienceHealth SciencesComputer EngineeringData Analysis
In present scenario of the world, controlling air pollution is one of the leading challenges. Most often the educational institutions and organizations in developing countries suffer from contaminated environment due to improper planning... more
    • by  and +1
    •   18  
      The Internet of ThingsInternet of ThingsWastewater engineering, Green Buildings, Air Pollution MonitoringEnvironmental (soil and water) pollution prevention and monitoring.
Agriculture is an important factor especially for developing countries like India. Issues related to agriculture have been always hindering the county’s growth. The solution for this problem is using smart agriculture by modernizing the... more
    • by  and +1
    •   12  
      Computer ScienceInternet of Things (IoT)COMPUTER SCIENCE & ENGINEERINGRaspberry Pi
Now-a-days, a growing number of people in a developing countries like India forces to look for new solutions for the continuous monitoring of health checkup. It has become a necessity to visit hospitals frequently for doctor's... more
    • by  and +1
    •   25  
      Remote Patient MonitoringIOTN , orthodontic treatment needPatient MonitoringAdvanced Coma Patient Monitoring System
The Internet of Things (IoT) is becoming an emerging trend and has significant potential to replace other technologies, where researchers consider it as the future of the internet. It has given tremendous support and become the building... more
    • by 
    •   9  
      Ubiquitous ComputingPublic HealthHealth Care ManagementWSN (Wireless sensor network)
In present world all of us are facing global warming crisis of water. Main causesfor these issues are growing population, improper management of water utilization. This problem is quietly related to poor allocation, inefficient use and... more
    • by  and +4
    •   20  
      Image ProcessingMedical Image ProcessingBiomedical signal and image processingAndroid Science
Acute Myeloid Leukemia (AML) is one of cancer type that attack White Blood Cells in myeloid descendants. On the clinical examination of leukemia, the number of each blast cell in the laboratory is calculated. However, in some subtype of... more
    • by 
    •   20  
      LeukemiaChildhood Acute Lymphoblastic LeukemiaAcute Myeloid LeukemiaChronic Lymphocytic Leukemia
With advancement of Automation technology, life is getting simpler and easier in all aspects. In Today's world Automatic systems are being preferred over manual system. With the rapid increase in the number of users of internet over the... more
    • by 
    •   18  
      RefrigeratorsInternet of Things (IoT)Thermoacoustic refrigeratorRefrigerator
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation SecurityMachine Learning
Pavement performance is generally influenced by traffic, moisture, and quality of construction and maintenance. Deterioration on road surface can develop due to one or combination of these factors. In order to improve pavement... more
    • by 
    •   4  
      Image ProcessingHospitality ManagementHotel ManagementIoT Security
Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle... more
    • by 
    •   3  
      Network Security (Networks)Cyber SecurityIoT Security
Sa brzim razvojem tehnologije i interneta došlo je do stvaranja nove vizije – Internet of Things (IoT) – Interneta stvari, koncepta koji, povezivanjem pametnih uređaja i konvencionalnih potrošačkih elemenata putem interneta, nudi novi... more
    • by 
    •   3  
      Internet of Things (IoT)Sensor Networks and IoTIoT Security
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
    • by 
    •   5  
      Internet of Things (IoT)Sybil AttacksIoT SecurityIoT Authentication
    • by 
    •   15  
      RefrigeratorsInternet of Things (IoT)Thermoacoustic refrigeratorRefrigerator
Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute... more
    • by 
    •   3  
      IOTInternet of Things (IoTs)IoT Security
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically... more
    • by 
    •   9  
      Internet of Things (IoT)wireless applications with Internet of Thing (IoT) within Internet environmentInternet of Things (IoTs)Sensor Based Samrt Home
Internet of Things is a platform where every day devices become smarter, every day processing becomes intellectual, and every day communication becomes revealing. While the Internet of Things is still seeking its own platform, its effects... more
    • by 
    •   13  
      Internet of Things (IoT)IOTModified IOTNwireless applications with Internet of Thing (IoT) within Internet environment
Monitoring of the health plays a crucial role in the medical industry; an application for monitoring the children from distances by their parents is developed. Different types of sensors are used like; a temperature sensor is a device... more
    • by  and +1
    •   12  
      The Internet of ThingsInternet of ThingsInternet of Things (IoT)IOT
By the virtue of blooming automation industry and wireless connectivity, all the devices within the home can be connected. Today's World is moving to digitalization where everything is made easy and comfortable for people i.e. Young youth... more
    • by 
    •   5  
      Internet of Things (IoT)IOTIoT/M2MInternet of Things (IoTs)
IoT (Internet of Things) ya da diğer adıyla Nesnelerin İnterneti kavramı, internete bağlanan ve diğer cihazlarla iletişimde olan her nesneyi kapsamaktadır. Artık hayatımızın bir parçası haline gelecek otonom araçlar, akıllı buzdolabılar,... more
    • by 
    •   11  
      Internet of ThingsInternet of Things (IoT)Wsn SecurityIoT/M2M
The rapid growth in technology and internet connected devices has enabled Internet of Things (IoT) to be one of the important fields in computing. Standards, technologies and platforms targeting IoT ecosystem are being developed at a very... more
    • by 
    •   2  
      Internet of Things (IoT)IoT Security
    • by 
    •   10  
      Computer ScienceMachine LearningDiffusion of InnovationsTechnology Acceptance
This article is focused on the economic impact assessment of Internet of Things (IoT) and its associated cyber risks vectors and vertices-a reinterpretation of IoT verticals. We adapt to IoT both the Cyber Value at Risk model, a... more
    • by 
    •   5  
      Artificial IntelligenceCybercrimeCyber SecurityInternet of Things (IoTs)
    • by 
    •   11  
      Cognitive ScienceComputer ScienceApplications of Machine LearningCybersecurity
Solution-optimized smart cities that are focused on improving cross-city services, transportation management systems and energy use are now having a tangible and positive effect on city-based quality of life. There are many components of... more
    • by  and +1
    •   31  
      Smart CityeGovernment measurement, Smart City, BenchmarkingIOTN , orthodontic treatment needInternet of Things (IoT)
In the modern age, there is a constraint of a system with connected devices, persons, time, places and networks, which is completely integrated is called as Internet of Things (IoT). Internet of Things has become the vital building blocks... more
    • by  and +2
    •   15  
      RFIDRFID Security and PrivacyRFID localizationrfid TRACKING
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
    • by 
    •   12  
      Network SecurityBiometricsCryptographyBiometrics Authentication Technologies
Internet of Things (IoT) is a network of human Meshing with everything that exists around us like our daily life communication through mobiles or the internet. In the next two or three years of (2020), the internet will be changed to IoT.... more
    • by 
    •   17  
      Computer ScienceInformation TechnologyWireless CommunicationsiOS Application Development
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT. Authors are solicited to contribute to the... more
    • by 
    •   19  
      Social NetworksSignal ProcessingWireless CommunicationsComputer Networks
3rd International Conference on Cloud, Big Data and IoT (CBIoT 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also... more
    • by 
    •   13  
      Information SecurityComputer NetworksComputer SecurityCloud Computing
In every developing and developed nation the utilization of automobiles is a maximising day by day and apparently the accidents relating to automobiles have increased drastically too. In our projectawe identify the problem of leakages of... more
    • by  and +2
    •   19  
      The Internet of ThingsInternet of ThingsWireless sensor network- lifetime and coverage4G, New generations networks, QoS, protocolos IPv6 and extensions, Application in new generation networks, routing protocolos, congestion control, Wireless, MANET, sensor networks