过去一年中添加的文章,按日期排序

Federated PCA on Grassmann Manifold for IoT Anomaly Detection

TA Nguyen, LT Le, TD Nguyen, W Bao… - arXiv preprint arXiv …, 2024 - arxiv.org
2 天前 - … However, as the IoT ecosystem expands and becomes … network security emerges
as a paramount task, especially considering the inherent security vulnerabilities of many IoT

The Socio-Economic Determinants of Women Empowerment in Mgnrega Scheme: A Systematic Review Analysis and Prisma Framework

N Khanoda, DD Singh - Available at SSRN 4891461 - papers.ssrn.com
2 天前 - PurposeIn order to help researchers and policymakers alike, this review study aims
to (1) conduct a systematic analysis of the literature on the effect of MGNREGA on women's …

Novel model to authenticate role-based medical users for blockchain-based IoMT devices

…, A Altaf, F Iqbal, N Nigar, JC Galán, DG Aray, IT Díez… - PloS one, 2024 - journals.plos.org
2 天前 - IoT devices are limited in computational power, hence different techniques are
required to protect the data in IoT networks. In cloud-based networks, protection techniques can …

Digitalization of SCM in the Agriculture Industry

D Das, A Roy, A Chaudhuri, S Tripathy… - … Methods for Agri …, 2024 - igi-global.com
2 天前 - … chains, focusing on the utilization of Industry 4.0 and the internet of things (IoT).
Precision agriculture, coupled with IoT, addresses challenges in the industry, aiming to enhance …

Technological advances and trends in the mining industry: a systematic review

RO Flores-Castañeda, S Olaya-Cotera… - Mineral Economics, 2024 - Springer
2 天前 - safety, better working conditions, improved operational efficiency and reliability of
information. It … the environment and provide better working conditions. In other words, mining …

Implementation of an internet of things-based monitoring system on a rubber tyred gantry crane for human and environmental safety

AT Pamungkas, AK Muhammad, AZ Sultan… - AIP Conference …, 2024 - pubs.aip.org
2 天前 - … This study aims to design an Internet of Things – based monitoring system to
meet safety requirements for humans and the environment and to perform simulations and …

Comparison of Mitigating DDoS Attacks in Software Defined Networks and Iot Platforms

S Narayanan, N Parthiban, S Vijay… - Available at SSRN … - papers.ssrn.com
2 天前 - … of everyday IoT devices, functionality is prioritized over security features in the IoT
… and providing mitigate security threats in the network based on requirement. Therefore, …

[HTML][HTML] Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)

J Marchang, J McDonald, S Keishing, K Zoughalian… - Telecom, 2024 - mdpi.com
3 天前 - … The proposed RTPM focuses on addressing the major security requirements for
an IoMT system, ie, the CIA Triad, and conducts device authentication, protects from Denial of …

[PDF][PDF] Machine Learning Applications in Mobile Device Management (MDM)

A Gupta - J Artif Intell Mach Learn & Data Sci 2022 - urfjournals.org
3 天前 - … • Feedback:According to Google’s IT team, the usage of ML in MDM has resulted
in a … to security issues, and enhanced device performance. This has enabled IT resources to …

Enhancing Security in Satellite-Based IoT-HPC Cloud Architectures: A Hybrid AI based Security Framework Approach

SZ Ahmad, F Qamar - 2024 - researchsquare.com
3 天前 - … By implementing EHID, we strive to enhance the security of IoT devices operating
in … Technique specifically tailored around the requirements of IoT devices that are connected …