We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Anticipative and Non-anticipative Controller Design for Network Control Systems

    We propose a numerical procedure to design a linear output-feedback controller for a remote linear plant in which the loop is closed through a...
    Payam Naghshtabrizi, João P. Hespanha in Networked Embedded Sensing and Control
    Chapter
  2. On Communication Requirements for Multi-agent Consensus Seeking

    Several consensus protocols have been proposed in the literature and their convergence properties studied via a variety of methods. In all these...
    Lei Fang, Panos J. Antsaklis in Networked Embedded Sensing and Control
    Chapter
  3. Air- and Sound-Quality Monitoring with Alert System Using Node MCU

    The primary objective of the Noise and Air Quality Measurement System is to address the escalating issues of sound and air pollution in contemporary...
    Ch. Bhupati, J. Rajasekhar, ... A. Bhanu Chand in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  4. IoT-Enabled Patient Assisting Device Using Ubidots Webserver

    This project is to design a new medical device, which helps to monitor medications for aged and disable people to take medicine at correct time. For...
    Chella Santhosh, P. Kanakaraja, ... Y. Asish in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  5. An IoT Framework to Support Rural Population with Diabetic Related Issues via Optimization Algorithms

    Currently, image processing and IoT technologies are notable in unravelling various challenges for medical imaging. The use of the proposed method is...
    Vinit Kumar Gunjan, Fahimuddin Shaik, Rashmi Pathak in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  6. Agricultural Monitoring and Control of a System Using Smart IoT Devices

    Our objective is to improve modern arable practices by using cutting-edge technology in agriculture to modernize the agricultural system with better...
    Y. Padma, M. Sailaja, ... Mohammed Ali Hussain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  7. IoT Security and Privacy

    Internet of Things (IoT) is one of the dominating technologies in today’s era and is adopted in a wide range of domains such as industry, business,...
    Jitendra V. Tembhurne, Tausif Diwan, Tapan Kumar Jain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  8. IOT for Healthcare

    In today’s modern environment of networking, with the growth of the Internet of Things (IoT), both individuals are linked to one another through some...
    G. Suryanarayana, L. N. C. Prakash K, ... Vinit Kumar Gunjan in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  9. Smart Home-Based Smoke Detection with Image Surveillance System

    Smoke detection senses smoke, which is typically an indicator/upcoming indicator of fire to be aware in order to prevent the loss of life,...
    K. Kiran Kumar, P. S. G. Aruna Sri, ... G. Murali in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  10. Learning Approaches for Security and Privacy in Internet of Things

    The Internet of Things (IoT) is an evolving pattern that concentrates on the links between machine, “things,” the internet, and users. One of the...
    T. Daniya, M. Geetha, ... Ch. Madhu Babu in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  11. IoT-Based Heart Disease Prediction System

    Health is wealth and it cannot be discarded. Among the many diseases, we see heart disease as the major cause of deaths. Advancement in technology...
    Vemula Manvitha, Syed Musthak Ahmed, ... Vinit Kumar Gunjan in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  12. Internet of Everything: Applications

    Internet of Things (IoT) is a network of physical things, which includes variety of smart sensing devices connected over the internet. These devices...
    Rakhi Wajgi, Jitendra V. Tembhurne, ... Tapan Jain in Modern Approaches in IoT and Machine Learning for Cyber Security
    Chapter 2024
  13. Decentralized Key Management for Digital Identity Wallets

    Self-sovereign identity (SSI) is considered by experts as the next step in the evolution of digital identity management systems. Blockchain and...
    Abylay Satybaldy, Anushka Subedi, Sheikh Mohammad Idrees in Blockchain Transformations
    Chapter 2024
  14. Blockchain Technology Acceptance in Agribusiness Industry

    Blockchain technology is gaining popularity and demonstrating its use in numerous cryptocurrencies. Several organizations and other entities want to...
    C. Ganeshkumar, Arokiaraj David, Jeganthan Gomathi Sankar in Blockchain Transformations
    Chapter 2024
  15. Decentralized Identity Management Using Blockchain Technology: Challenges and Solutions

    Blockchain technology could help businesses improve their operations and increase their profits. Nevertheless, in this age of decentralized...
    Ahmed Mateen Buttar, Muhammad Anwar Shahid, ... Muhammad Azeem Akbar in Blockchain Transformations
    Chapter 2024
  16. Decentralized Technology and Blockchain in Healthcare Administration

    The healthcare industry faces a myriad of challenges, from interoperability issues to data security concerns. In recent years, decentralized...
    Anamika Tiwari, Alisha Sikri, ... Roshan Jameel in Blockchain Transformations
    Chapter 2024
  17. Verificate – Transforming Certificate Verification Using Blockchain Technology

    Verificate is a proposed system that leverages blockchain technology to securely store verified certificates, both of an educational nature and...
    Tanmay Thakare, Tanay Phatak, ... R. L. Priya in Blockchain Transformations
    Chapter 2024
  18. Blockchain and IPFS-Based Solution for KYC

    We use a centralised financial system in India. The ‘Know Your Customer’ (KYC) process, which requires customers to update their credentials, has...
    Conference paper 2024
  19. Metaheuristics Feature Selection Algorithms for Identification and Classification of Mango Pests Diseases

    Research in image processing and artificial intelligence (AI) is crucial for enhancing the caliber of agricultural output. A control step must be...
    Conference paper 2024
Did you find what you were looking for? Share feedback.