E-Books durchsuchen

4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019 [2020]

1
A Structural Feature Based Automatic Vehicle Classification System at Toll Plaza
2
Classification of Chronic Kidney Disease with Genetic Search Intersection Based Feature Selection Technique
3
Analysis of Wormhole Detection Features in Wireless Sensor Networks
4
Propagating Minimal Messages Using Multi Set-Cover in Wireless Ad-Hoc Network
5
Multi Header Based Ultra Low Power MTCMOS Technique to Reduce NBTI Effect in Combinational Circuit
6
Task Allocation in Distributed Real Time Database Systems in IoT
7
Optimization of Block Diagonalization for MU-MIMO Downlink System Using PSO
8
Simulation Analysis of DDoS Attack in IoT Environment
9
Blockchain Application Framework for Priority Metric Based Academic Record Repository
10
Design of Attribute Based Authenticated Group Key Agreement Protocol Without Pairing
11
A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECC
12
Analysis of MEMS and Metamaterial Based Sensors and Its Involvement in Nanotechnology
13
High Gain Patch Array Antenna for 5G Network Communication and IoT Applications
14
Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review
15
An IoT Based Agri-Cloud Architectural Framework for Monitoring Presence of Fertilizer Under Multilayered Soil Farming
16
Analysis of Web Usage Patterns to Identify Most Frequently Accessed Web Page by Multiple Users
17
A Composite Technique to Fortify Security for DaaS Services in Cloud Environment
18
Performance of Dual-Input Storage Based Induction Motor Drive for Electric and Fuel Cell Hybrid Electrical Vehicle Applications
19
A Lightweight Authentication Scheme for RFID Using ECC
20
Lean and Industry 4.0 Strive to Create Smart Factory Through Integration of Systems: An Exploratory Review
21
User Authentication in VANET Using SGSK (Self Generated Session Key)
22
Grid Scrutinize Based Heuristic Sensor Node Scheduling Protocol with Partial Coverage Constraint in WSN
23
Intensity Transformation Fusion of Landsat 8 Thermal Infrared (TIR) Imagery
24
Efficient Spectrum Provisioning in Elastic Optical Networks
25
Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs
26
Hardware Design of 8 × 8 and 16 × 16 2D Discrete Cosine Transform with N/2 Equations for Image Compression
27
Security and Efficiency Analysis of Anti-jamming Techniques
28
Generalized Dynamic Multilayer Fog Computing Architecture
29
An Efficient Quantum Key Management Scheme
30
Privacy Threat Model for IoT
31
IoT Based Smart Luggage Monitor Alarm System
32
Text Steganography Based on Parallel Encryption Using Cover Text (PECT)
33
Intelligence in Station-of-Things
34
Mathematical Modeling and Numerical Simulation of a Double Touch-Mode Pressure Sensor with Graphene as the Sensing Element
35
Quality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research Directions
36
A Study of Intrusion Detection System in Wireless Sensor Network
37
Energy Oriented Routing in Wireless Sensor Networks: Hardware Implementation
38
Text Detection Using Maximally Stable External Regions and Stroke Width Variation
39
Digital Image Steganography Using Modified LSB and AES Cryptography
40
Design and Implementation of AES on FPGA for Security of IOT Data
Feedback