|
|
|
Tse-Chuan Hsu
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and d...
ver más
|
|
|
|
|
|
|
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig...
ver más
|
|
|
|
|
|
|
Varsha S. Lalapura, Veerender Reddy Bhimavarapu, J. Amudha and Hariram Selvamurugan Satheesh
The Recurrent Neural Networks (RNNs) are an essential class of supervised learning algorithms. Complex tasks like speech recognition, machine translation, sentiment classification, weather prediction, etc., are now performed by well-trained RNNs. Local o...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Luca Leonardi, Lucia Lo Bello, Gaetano Patti, Alessio Pirri and Mattia Pirri
The work presents an extensive simulative assessment of a LoRaWAN network that adopts the Listen Before Talk (LBT) Adaptive Frequency Agility (AFA) channel access technique in compliance with the ETSI regulations. The paper presents the results obtained ...
ver más
|
|
|
|
|
|
|
Emmanuel Effah, Ousmane Thiare and Alexander M. Wyglinski
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Tao Feng, Chengfan Liu, Xiang Gong and Ye Lu
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency. However, with the increasing interconnection of sys...
ver más
|
|
|
|
|
|
|
Mazen Juma, Fuad Alattar and Basim Touqan
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected vi...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|