Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Vijender Busi Reddy"'
Autor:
Athota Kavitha, Vijender Busi Reddy, Ninni Singh, Vinit Kumar Gunjan, Kuruva Lakshmanna, Arfat Ahmad Khan, Chitapong Wechtaisong
Publikováno v:
IEEE Access, Vol 10, Pp 121712-121724 (2022)
Internet of Things (IoT) Mesh networks are becoming very popular to enable IoT devices to communicate without relying on dedicated PC services. The Internet of Things (IoT) implicitly uses mesh networks. IoT connectivity to cloud and edge computing i
Externí odkaz:
https://doaj.org/article/38f60d005d724a878e24bdd2a36a9dd7
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811533822
Deep learning technology has grown vastly in the present era and penetrating to all research fields. Deep learning mechanism for objection detection is gaining prominence in remote sensing data analysis. The main challenge of object detection in remo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::087c7a7bc3b2c33cc33968bc6d870f69
https://doi.org/10.1007/978-981-15-3383-9_16
https://doi.org/10.1007/978-981-15-3383-9_16
Publikováno v:
IEEE Sensors Journal. 17:3921-3929
Wireless sensor networks (WSNs) are usually deployed in insecure remote and open environments. Nodes could be attacked and compromised. The attacker can use compromised sensor nodes to disrupt communications or inject misleading sensor values. Mislea
Publikováno v:
WF-IoT
In Internet of Things (IoT) each object is addressable, trackable and accessible on the Internet. To be useful, objects in IoT co-operate and exchange information. IoT networks are open, anonymous, dynamic in nature so, a malicious object may enter i
Publikováno v:
2018 IEEE SENSORS.
Wireless Sensor Networks (WSNs) play very important role in development of smart cities and communication infrastructure. However due to its open nature WSNs are vulnerable to several kinds of attacks. One of the most important concern is a node insi
Publikováno v:
International Journal of Advancements in Computing Technology. 5:56-64
Publikováno v:
2016 IEEE 6th International Conference on Advanced Computing (IACC).
Trust is a soft security solution for Ad-hoc Wireless Networks such as Mobile Adhoc Networks (MANETs), Wireless Sensor networks (WSNs). Due to openness of the networks a malicious node can easily join and disrupt the network. Trust models are used to
Autor:
Rachana Reddy M, Vijender Busi Reddy
Publikováno v:
2015 IEEE International Advance Computing Conference (IACC).
Security is the main concern in today's wireless network environment. However, cipher algorithms consume a lot of resources to provide the required confidentiality. Ad-Hoc wireless networks are one area where the devices are extremely resource constr
Autor:
Anil K. Sarje, Vijender Busi Reddy
Publikováno v:
COMSWARE
TCP is the most commonly used data transfer protocol. It assumes every packet loss to be congestion loss and reduces the sending rate. This will decrease the sender's throughput when there is an appreciable rate of packet loss due to link error and n