Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data query mechanism based on hash computing power of blockchain in internet of things
In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics
constantly generate data with complex attributes. These data have low heterogeneity and …
constantly generate data with complex attributes. These data have low heterogeneity and …
Towards pattern-based change verification framework for cloud-enabled healthcare component-based
To survive in the competitive environment, most organizations have adopted component-
based software development strategies in the rapid technology advancement era and the …
based software development strategies in the rapid technology advancement era and the …
A blockchain based decentralized data security mechanism for the Internet of Things
Abstract The Internet of Things (IoT) is the core infrastructure of the smart city information
system. With the explosive growth of IoT devices, how to securely maintain the important …
system. With the explosive growth of IoT devices, how to securely maintain the important …
Enabling ambient intelligence of things (AIoT) healthcare system architectures
During the last decade, significant research has been conducted in the fields of healthcare
and the administration of cutting-edge ambient intelligence (AmI) technology. Healthcare …
and the administration of cutting-edge ambient intelligence (AmI) technology. Healthcare …
Integrity verification mechanism of sensor data based on bilinear map accumulator
Y Ren, J Qi, Y Liu, J Wang, GJ Kim - ACM Transactions on Internet …, 2021 - dl.acm.org
With the explosive growth in the number of IoT devices, ensuring the integrity of the massive
data generated by these devices has become an important issue. Due to the limitation of …
data generated by these devices has become an important issue. Due to the limitation of …
Generative Adversarial Networks for Secure Data Transmission in Wireless Network.
E Jayabalan, R Pugazendi - Intelligent Automation & Soft …, 2023 - search.ebscohost.com
In this paper, a communication model in cognitive radios is developed and uses machine
learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to …
learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to …
[PDF][PDF] Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms.
PK Sharma, US Modani - Computer Systems Science & …, 2023 - cdn.techscience.cn
The mobile transient and sensor network's routing algorithm detects available multi-hop
paths between source and destination nodes. However, some methods are not as reliable or …
paths between source and destination nodes. However, some methods are not as reliable or …
[PDF][PDF] DeepQ based automated irrigation systems using deep belief WSN
E Gokulakannan - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
Deep learning is the subset of artificial intelligence and it is used for effective decision
making. Wireless Sensor based automated irrigation system is proposed to monitor and …
making. Wireless Sensor based automated irrigation system is proposed to monitor and …
[PDF][PDF] Distance Matrix and Markov Chain Based Sensor Localization in WSN.
Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in
monitoring a particular geographic area of interest. Relevant geometries of the surrounding …
monitoring a particular geographic area of interest. Relevant geometries of the surrounding …
In-Network Processing of Skyline Join Queries in Wireless Sensor Networks Using Synopses of Skyline Attribute Value Ranges
H Kang - Sensors, 2023 - mdpi.com
We investigate the in-network processing of a skyline join query in wireless sensor networks
(WSNs). While much research was conducted on processing skyline queries in WSNs …
(WSNs). While much research was conducted on processing skyline queries in WSNs …