[HTML][HTML] Integrated identity and auditing management using blockchain mechanism
An integrated identity is a centralized identifier that makes it possible for customers to get
access to a variety of business services from a single network. The risks and assaults …
access to a variety of business services from a single network. The risks and assaults …
[HTML][HTML] Implementation of number plate detection system for vehicle registration using IOT and recognition using CNN
In the intelligent transportation system the automatic license plate recognition and detection
plays a very important role. This application could be used for traffic control security e …
plays a very important role. This application could be used for traffic control security e …
Assessment of human activity recognition based on impact of feature extraction prediction accuracy
Recognition of human activities by analyzing smartphone data which is being collected via
accelerometer and gyroscopic sensors has been a critical area of research and it has been …
accelerometer and gyroscopic sensors has been a critical area of research and it has been …
Artificial Intelligence based Models to Support Water Quality Prediction using Machine Learning Approach
The purpose of this study is to simulate the propagation of bio-contamination risk in Water
Distribution System (WDS). This will be accomplished by putting an emphasis on source …
Distribution System (WDS). This will be accomplished by putting an emphasis on source …
Framework of air pollution assessment in smart cities using IoT with machine learning approach
Exhale and inhale filthy air has major health consequences. Air pollution's influence may be
mitigated by conducting regular monitoring and keeping a record of it. Government …
mitigated by conducting regular monitoring and keeping a record of it. Government …
Implementation of machine learning classification techniques for intrusion detection system
P William, VNR Inukollu, V Ramasamy… - 2023 4th …, 2023 - ieeexplore.ieee.org
In the region internet including service, flaws of software design that is present on the device
on its own, protocol, and also in control. These vulnerabilities of the community can be very …
on its own, protocol, and also in control. These vulnerabilities of the community can be very …
Framework for implementation of android automation tool in agro business sector
As we know, India is an Agricultural dominated country. According to survey of National
Statistical Office's Situation Assessment of Agricultural Households (SAAH) report for 2018 …
Statistical Office's Situation Assessment of Agricultural Households (SAAH) report for 2018 …
Framework for integrating the synergies of blockchain with AI and IoT for secure distributed systems
The development of new, groundbreaking applications has been made possible by the
merging of AI, IoT, and blockchain technology. Yet, as the number of people who rely on …
merging of AI, IoT, and blockchain technology. Yet, as the number of people who rely on …
Blockchain-based cloud storage using secure and decentralised solution
The fusion of blockchain with cloud computing is an exciting new area of research that could
dramatically alter how businesses handle their data now and in the future. In this paper, we'll …
dramatically alter how businesses handle their data now and in the future. In this paper, we'll …
Edge Computing based Traffic Control Management for Distributed Environment
Mobile Edge Computing (MEC) users' quality of service (QoS) may be significantly improved
by local communication. The backbone of 5G communication is the Radio Access Network …
by local communication. The backbone of 5G communication is the Radio Access Network …