Trends in Computational Intelligence, Security and Internet of Things: Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings

Sudoku is a Japanese logical puzzle solved using brain power. In this puzzle, the player places a digit among 1 to n in such a way that no cell in the same row, grid and column have the same value. In an n × n grid, there exists n possibilities of placing a value in a cell. This puzzle is available at different difficulty level. Generating a Sudoku puzzle with a specific difficulty level is a challenging task. Though there are various algorithms exist in the literature for generating the brainteaser, all of them either uses Backtracking technique or patterns for problem generation. This leads to exponential time complexity. Hence, there is a need for a polynomial-time solution that takes care of all possible cases. In this paper, we propose a polynomial time algorithm for generating the Sudoku puzzle in DNA computing using the Adleman-Lipton model. The puzzle is initially represented as a graph, later graph colouring algorithm is applied to it. From the obtained solution, randomly few cells are removed to obtain the puzzle with required difficulty level.

[1]  M. B. Clowes,et al.  A New Technique in Automatic Character Recognition , 1961, Comput. J..

[2]  S. Yoshizawa,et al.  An Active Pulse Transmission Line Simulating Nerve Axon , 1962, Proceedings of the IRE.

[3]  Ming-Kuei Hu,et al.  Visual pattern recognition by moment invariants , 1962, IRE Trans. Inf. Theory.

[4]  H. McKean Nagumo's equation , 1970 .

[5]  Stuart P. Nishenko,et al.  Seismic gaps and plate tectonics: Seismic potential for major boundaries , 1979 .

[6]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[7]  Andrea Sgarro Error probabilities for simple substitution ciphers , 1983, IEEE Trans. Inf. Theory.

[8]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[9]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[10]  Vladimir Kossobokov,et al.  Intermediate term earthquake prediction in the area of Greece: Application of the algorithm M8 , 1990 .

[11]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[12]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[13]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[14]  J. Deas Fly-By-Wire for Experimental Aircraft ? , 1993 .

[15]  L M Adleman,et al.  Molecular computation of solutions to combinatorial problems. , 1994, Science.

[16]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[17]  Thomas P. Jakobsen,et al.  A Fast Method for the Cryptanalysis of Substitution Ciphers , 1995 .

[18]  G. L. Morgan,et al.  Quantum Cryptography over Underground Optical Fibers , 1996, CRYPTO.

[19]  N. Gisin,et al.  “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.

[20]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[21]  Sir James Lighthill A Critical Review of Van: Earthquake Prediction From Seismic Electrical Signals , 1996 .

[22]  Dave Jaggar,et al.  Arm Architecture And Systems , 1997, IEEE Micro.

[23]  Johannes Fürnkranz,et al.  A Study Using $n$-gram Features for Text Categorization , 1998 .

[24]  Yehuda Ben-Zion,et al.  Transitions between Gutenberg-Richter and Characteristic Earthquake behavior in Simple Mean-Field Models of Heterogeneous Faults , 1998 .

[25]  Soteris A. Kalogirou,et al.  Applications of artificial neural networks in energy systems , 1999 .

[26]  Robert W. Simpson,et al.  A physically-based earthquake recurrence model for estimation of long-term earthquake probabilities , 1999 .

[27]  L. Knopoff,et al.  The magnitude distribution of declustered earthquakes in Southern California. , 2000, Proceedings of the National Academy of Sciences of the United States of America.

[28]  J. Kirschvink Earthquake Prediction by Animals: Evolution and Sensory Perception , 2000 .

[29]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[30]  Paul A. Viola,et al.  Robust Real-time Object Detection , 2001 .

[31]  Francisco Herrera,et al.  Generating the knowledge base of a fuzzy rule-based system by the genetic learning of the data base , 2001, IEEE Trans. Fuzzy Syst..

[32]  V. P. Plagianakos,et al.  Chaotic analysis of seismic time series and short term forecasting using neural networks , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).

[33]  Yali Amit,et al.  2D Object Detection and Recognition: Models, Algorithms, and Networks , 2002 .

[34]  P. G. Vicente,et al.  Heat transfer and pressure drop for low Reynolds turbulent flow in helically dimpled tubes , 2002 .

[35]  P. G. Vicente,et al.  Experimental study of mixed convection and pressure drop in helically dimpled tubes for laminar and transition flow , 2002 .

[36]  P. Varotsos,et al.  Physical properties of the variations of the electric field of the earth preceding earthquakes, I , 1984 .

[37]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[38]  Nathalie Japkowicz,et al.  The class imbalance problem: A systematic study , 2002, Intell. Data Anal..

[39]  A. Bergles ExHFT for fourth generation heat transfer technology , 2002 .

[40]  T. Yato,et al.  Complexity and Completeness of Finding Another Solution and Its Application to Puzzles , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[41]  Daniel M. Germán,et al.  The GNOME project: a case study of open source, global software development , 2003, Softw. Process. Improv. Pract..

[42]  Jose A. Gutierrez,et al.  Low-Rate Wireless Personal Area Networks: Enabling Wireless Sensors with IEEE 802.15.4 , 2003 .

[43]  Jingjing Lu,et al.  Comparing naive Bayes, decision trees, and SVM with AUC and accuracy , 2003, Third IEEE International Conference on Data Mining.

[44]  P. G. Vicente,et al.  Experimental investigation on heat transfer and frictional characteristics of spirally corrugated tubes in turbulent flow at different Prandtl numbers , 2004 .

[45]  V. Zimparov Prediction of friction factors and heat transfer coefficients for turbulent flow in corrugated tubes combined with twisted tape inserts. Part 2: heat transfer coefficients , 2004 .

[46]  Ashish Goel,et al.  Multi-processor scheduling to minimize flow time with ε resource augmentation , 2004, STOC '04.

[47]  Myung J. Lee,et al.  A Comprehensive Performance Study of IEEE 802 . 15 . 4 , 2004 .

[48]  Gustavo E. A. P. A. Batista,et al.  A study of the behavior of several methods for balancing machine learning training data , 2004, SKDD.

[49]  Anupam Dewan,et al.  Review of passive heat transfer augmentation techniques , 2004 .

[50]  P. G. Vicente,et al.  MIXED CONVECTION HEAT TRANSFER AND ISOTHERMAL PRESSURE DROP IN CORRUGATED TUBES FOR LAMINAR AND TRANSITION FLOW , 2004 .

[51]  Hamid R. Tizhoosh,et al.  Opposition-Based Learning: A New Scheme for Machine Intelligence , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).

[52]  A. Viedma,et al.  Experimental study of heat transfer enhancement with wire coil inserts in laminar-transition-turbulent regimes at different Prandtl numbers , 2005 .

[53]  H. Yasukawa,et al.  Multi-layer neural network for precursor signal detection in electromagnetic wave observation applied to great earthquake prediction , 2005 .

[54]  Hui Han,et al.  Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.

[55]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[56]  Hisao Ishibuchi,et al.  Rule weight specification in fuzzy rule-based classification systems , 2005, IEEE Transactions on Fuzzy Systems.

[57]  Eduardo Tovar,et al.  GTS allocation analysis in IEEE 802.15.4 for real-time wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[58]  Zhi-Hua Zhou,et al.  Ieee Transactions on Knowledge and Data Engineering 1 Training Cost-sensitive Neural Networks with Methods Addressing the Class Imbalance Problem , 2022 .

[59]  Sebastian Zander,et al.  A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.

[60]  Eduardo Tovar,et al.  i-GAME: an implicit GTS allocation mechanism in IEEE 802.15.4 for time-sensitive wireless sensor networks , 2006, 18th Euromicro Conference on Real-Time Systems (ECRTS'06).

[61]  Mehmet Siraç Özerdem,et al.  Self-organized maps based neural networks for detection of possible earthquake precursory electric field patterns , 2006, Adv. Eng. Softw..

[62]  Hiroki Takesue,et al.  Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.

[63]  S. Saha,et al.  Thermohydraulics of Laminar Flow Through Rectangular and Square Ducts With Transverse Ribs and Twisted Tapes , 2006 .

[64]  Gihwon Kwon,et al.  Optimized CNF Encoding for Sudoku Puzzles ? , 2006 .

[65]  Conor Ryan,et al.  Solving Sudoku with the GAuGE System , 2006, EuroGP.

[66]  Rhyd Lewis,et al.  Metaheuristics can solve sudoku puzzles , 2007, J. Heuristics.

[67]  Hiroki Takesue,et al.  Differential phase shift quantum key distribution using single-photon detectors based on a sinusoidally gated InGaAs∕InP avalanche photodiode , 2007 .

[68]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[69]  ASHIF PANAKKAT,et al.  Neural Network Models for Earthquake Magnitude Prediction Using Multiple seismicity Indicators , 2007, Int. J. Neural Syst..

[70]  Peter I. Corke,et al.  Transforming Agriculture through Pervasive Wireless Sensor Networks , 2007, IEEE Pervasive Computing.

[71]  Timo Mantere,et al.  Solving, rating and generating Sudoku puzzles with GA , 2007, 2007 IEEE Congress on Evolutionary Computation.

[72]  A. A. Sulaiman,et al.  Earthquake prediction technique based on GPS dual frequency system in equatorial region , 2008, 2008 IEEE International RF and Microwave Conference.

[73]  Haibo He,et al.  ADASYN: Adaptive synthetic sampling approach for imbalanced learning , 2008, 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence).

[74]  Ming-Shi Wang,et al.  Genetic-clustering algorithm for intrusion detection system , 2008, Int. J. Inf. Comput. Secur..

[75]  A. S. Dalkılıç,et al.  Intensive literature review of condensation inside smooth and enhanced tubes , 2009 .

[76]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[77]  S. Sri Lakshmi,et al.  Model dissection from earthquake time series: A comparative analysis using modern non-linear forecasting and artificial neural network approaches , 2009, Comput. Geosci..

[78]  J. F. Crook,et al.  A Pencil-and-Paper Algorithm for Solving Sudoku Puzzles , 2009 .

[79]  Gouda I. Salama,et al.  Performance Evaluation of a Genetic Algorithm Based Approach to Network Intrusion Detection System , 2009 .

[80]  Maneesha V. Ramesh,et al.  Real-Time Wireless Sensor Network for Landslide Detection , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[81]  Chinaruk Thianpong,et al.  Compound heat transfer enhancement of a dimpled tube with a twisted tape swirl generator , 2009 .

[82]  Jaysonne A. Pacurib,et al.  Solving Sudoku Puzzles Using Improved Artificial Bee Colony Algorithm , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[83]  S. Femmam,et al.  A Beacon-Aware Device For The Interconnection of Zig Bee Networks , 2009 .

[84]  Zhi-Hua Zhou,et al.  Exploratory Undersampling for Class-Imbalance Learning , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[85]  Sunil Prabhakar,et al.  A Rule-Based Classification Algorithm for Uncertain Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[86]  Michael D. Ernst,et al.  Automatically patching errors in deployed software , 2009, SOSP '09.

[87]  Dirk Pesch,et al.  MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through Distributed Beacon Scheduling , 2009, ADHOCNETS.

[88]  Ricardo Moraes,et al.  Dynamic GTS Scheduling of Periodic Skippable Slots in IEEE 802.15.4 Wireless Sensor Networks , 2009 .

[89]  Jie Qiu,et al.  The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[90]  Janez Brest,et al.  Dynamic optimization using Self-Adaptive Differential Evolution , 2009, 2009 IEEE Congress on Evolutionary Computation.

[91]  Victor C. M. Leung,et al.  Enabling technologies for wireless body area networks: A survey and outlook , 2009, IEEE Communications Magazine.

[92]  Ramarathnam Venkatesan,et al.  Tamper-Tolerant Software: Modeling and Implementation , 2009, IWSEC.

[93]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[94]  Abdulrahman Alarifi,et al.  Earthquakes magnitude predication using artificial neural network in northern Red Sea area , 2009 .

[95]  A. W. Date,et al.  Heat transfer and pressure drop in a spirally grooved tube with twisted tape insert , 2009 .

[96]  Jayanta Kumar Pal,et al.  A novel block cipher technique using binary field arithmetic based substitution (BCTBFABS) , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[97]  Chiara Buratti,et al.  Performance Analysis of IEEE 802.15.4 Beacon-Enabled Mode , 2010, IEEE Transactions on Vehicular Technology.

[98]  Abishek Thekkeyil Kunnath,et al.  Signal processing for Wireless Geophone Network to detect landslides , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[99]  Brendan T. O'Connor,et al.  From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series , 2010, ICWSM.

[100]  Terrence P. Fries,et al.  Evolutionary optimization of a fuzzy rule-based network intrusion detection system , 2010, 2010 Annual Meeting of the North American Fuzzy Information Processing Society.

[101]  Yakup Genc,et al.  Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection , 2010, 2010 20th International Conference on Pattern Recognition.

[102]  Yi Zhu,et al.  Application of power line communication in smart power Consumption , 2010, ISPLC2010.

[103]  Sujoy Kumar Saha,et al.  Thermal and friction characteristics of turbulent flow through rectangular and square ducts with transverse ribs and wire-coil inserts , 2010 .

[104]  Xin-She Yang,et al.  Review of Metaheuristics and Generalized Evolutionary Walk Algorithm , 2011, 1105.3668.

[105]  Abishek Thekkeyil Kunnath,et al.  Wireless Geophone Network for remote monitoring and detection of landslides , 2011, 2011 International Conference on Communications and Signal Processing.

[106]  Shyi-Ming Chen,et al.  Weighted Fuzzy Rule Interpolation Based on GA-Based Weight-Learning Techniques , 2011, IEEE Transactions on Fuzzy Systems.

[107]  Girts Strazdins,et al.  Real time pothole detection using Android smartphones with accelerometers , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[108]  Sakir Sezer,et al.  Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[109]  Hamid Mohamadi,et al.  Design and analysis of genetic fuzzy systems for intrusion detection in computer networks , 2011, Expert Syst. Appl..

[110]  Pedro Pina,et al.  Automatic detection of landslide features with remote sensing techniques: Application to Madeira Island , 2011, 2011 IEEE International Geoscience and Remote Sensing Symposium.

[111]  Johan Bollen,et al.  Twitter mood predicts the stock market , 2010, J. Comput. Sci..

[112]  Daniel Gayo-Avello,et al.  A Meta-Analysis of State-of-the-Art Electoral Prediction From Twitter Data , 2012, ArXiv.

[113]  S. Saha,et al.  Heat Transfer Enhancement of Laminar Flow Through a Circular Tube Having Wire Coil Inserts and Fitted With Center-Cleared Twisted Tape , 2012 .

[114]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[115]  Nelishia Pillay,et al.  Finding solutions to sudoku puzzles using human intuitive heuristics , 2012, South Afr. Comput. J..

[116]  Francisco Herrera,et al.  A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[117]  Wolfgang Busch,et al.  Heavy rainfall-induced landslide detection from very high resolution multi-aspect TerraSAR-X images in Dessie, Ethiopia , 2012, 2012 IEEE International Geoscience and Remote Sensing Symposium.

[118]  M. S. Thomas,et al.  Integration and security analysis of metering infrastructure , 2012, 2012 IEEE Fifth Power India Conference.

[119]  Arputharaj Kannan,et al.  A Novel Weighted Fuzzy C –Means Clustering Based on Immune Genetic Algorithm for Intrusion Detection , 2012 .

[120]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[121]  Masato Koashi,et al.  Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.

[122]  P. G. Vicente,et al.  The influence of artificial roughness shape on heat transfer enhancement: Corrugated tubes, dimpled tubes and wire coils , 2012 .

[123]  Salvatore Venticinque,et al.  Agents Based Cloud Computing Interface for Resource Provisioning and Management , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[124]  Yongtae Shin,et al.  A GTS allocation scheme for emergency data transmission in cluster-tree WSNs , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).

[125]  Gurjot Singh Gaba,et al.  Implementation of Image Enhancement Techniques , 2012 .

[126]  Seung Hyong Rhee,et al.  GTS allocation for emergency data in low-rate WPAN , 2012, 2012 18th Asia-Pacific Conference on Communications (APCC).

[127]  P. Dhavachelvan,et al.  Minimizing the makespan using Hybrid algorithm for cloud computing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[128]  Guobo Xie,et al.  Image Edge Detection Based On Opencv , 2013 .

[129]  Benjamin Kerr,et al.  Evolutionary rescue from extinction is contingent on a lower rate of environmental change , 2013, Nature.

[130]  R. Iyer,et al.  A Review of Sudoku Solving using Patterns , 2013 .

[131]  Maria Dolores Gil Montoya,et al.  A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems , 2013, Soft Comput..

[132]  Mikel Galar,et al.  Analysing the classification of imbalanced data-sets with multiple classes: Binarization techniques and ad-hoc approaches , 2013, Knowl. Based Syst..

[133]  Wei Li,et al.  Iowa State University From the SelectedWorks of James Aanstoos 2013 Landslide Detection on Earthen Levees with X-band and L-band Radar Data , 2018 .

[134]  S. Swamynathan,et al.  Agent based Resource Monitoring System in IaaS Cloud Environment , 2013 .

[135]  G. Fussmann,et al.  Evolutionary and plastic rescue in multitrophic model communities , 2013, Philosophical Transactions of the Royal Society B: Biological Sciences.

[136]  E. Buza,et al.  Pothole Detection with Image Processing and Spectral Clustering , 2013 .

[137]  Aliakbar Niknafs,et al.  A modified dna computing approach to tackle the exponential solution space of the graph coloring problem , 2013, FOCS 2013.

[138]  L. Zhang,et al.  Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.

[139]  M. Hochberg,et al.  Evolutionary rescue: an emerging focus at the intersection between ecology and evolution , 2013, Philosophical Transactions of the Royal Society B: Biological Sciences.

[140]  Francisco Martínez-Álvarez,et al.  Neural networks to predict earthquakes in Chile , 2013, Appl. Soft Comput..

[141]  Hossein Arefi,et al.  BUILDING EXTRACTION USING SURFACE MODEL CLASSIFICATION , 2013 .

[142]  Nuno Pereira,et al.  IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints , 2013, Springer Briefs in Electrical and Computer Engineering.

[143]  Gao Jinhua,et al.  ARP spoofing detection algorithm using ICMP protocol , 2013, 2013 International Conference on Computer Communication and Informatics.

[144]  Witold Pedrycz,et al.  A genetic design of linguistic terms for fuzzy rule based classifiers , 2013, Int. J. Approx. Reason..

[145]  Uzay Kaymak,et al.  Exploiting emoticons in sentiment analysis , 2013, SAC '13.

[146]  Radu Stoleru,et al.  On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..

[147]  Anupriya Gogna,et al.  Metaheuristics: review and application , 2013, J. Exp. Theor. Artif. Intell..

[148]  N. Jazdi,et al.  Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.

[149]  Taehyeong Kim,et al.  Review and Analysis of Pothole Detection Methods , 2014 .

[150]  Yu-cong Kuang,et al.  Communication between PLC and Arduino Based on Modbus Protocol , 2014, 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control.

[151]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[152]  G. Varaprasad,et al.  Pothole detection and inter vehicular communication , 2014, 2014 IEEE International Conference on Vehicular Electronics and Safety.

[153]  Curry J. Cunningham,et al.  Evolutionary rescue in a changing world. , 2014, Trends in ecology & evolution.

[154]  Birgitte Bak-Jensen,et al.  Attacks and their defenses for advanced metering infrastructure , 2014, 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[155]  Inderveer Chana,et al.  QRSF: QoS-aware resource scheduling framework in cloud computing , 2014, The Journal of Supercomputing.

[156]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[157]  Sandeep Venkatesh,et al.  An intelligent system to detect, avoid and maintain potholes: A graph theoretic approach , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).

[158]  Zsolt Csaba Johanyak,et al.  Rule base identification toolbox for fuzzy controllers , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).

[159]  E. Salvador Climate-Smart Agriculture in , 2014 .

[160]  Golla Varaprasad,et al.  Detection of potholes in autonomous vehicle , 2014 .

[161]  E. N. Onwuka,et al.  Image processing techniques for automated road defect detection: A survey , 2014, 2014 11th International Conference on Electronics, Computer and Computation (ICECCO).

[162]  Robert L. Unckless,et al.  The Population Genetics of Evolutionary Rescue , 2014, PLoS genetics.

[163]  Kanubhai K. Patel,et al.  Predictive Rule Discovery for Network Intrusion Detection , 2014, ISI.

[164]  Ashish Sharma,et al.  Data hiding using dictionary based substitution method in DNA sequences , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[165]  Myung Ho Kim,et al.  Towards Self-Awareness Privacy Protection for Internet of Things Data Collection , 2014, J. Appl. Math..

[166]  Deepa Kundur,et al.  Implementing attacks for modbus/TCP protocol in a real-time cyber physical system test bed , 2015, 2015 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).

[167]  Reinhard Klette,et al.  Robust Vehicle Detection and Distance Estimation Under Challenging Lighting Conditions , 2015, IEEE Transactions on Intelligent Transportation Systems.

[168]  S. Pal,et al.  Laminar fluid flow and heat transfer through a circular tube having spiral ribs and twisted tapes , 2015 .

[169]  Abdelmadjid Bouabdallah,et al.  Trusted Execution Environment: What It is, and What It is Not , 2015, TrustCom 2015.

[170]  Jing Li,et al.  Landslide detection with two satellite images of different spatial resolutions in a probabilistic topic model , 2015, 2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).

[171]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[172]  Ramjee Prasad,et al.  Bandwidth efficient cluster-based data aggregation for Wireless Sensor Network , 2015, Comput. Electr. Eng..

[173]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[174]  Marthinus J. Booysen,et al.  Detecting potholes using simple image processing techniques and real-world footage , 2015 .

[175]  Dhruba K. Bhattacharyya,et al.  Dance Gesture Recognition: A Survey , 2015 .

[176]  Afan Galih Salman,et al.  Weather forecasting using deep learning techniques , 2015, 2015 International Conference on Advanced Computer Science and Information Systems (ICACSIS).

[177]  Helen Partridge,et al.  Citizens and social media in times of natural disaster: exploring information experience , 2015, Inf. Res..

[178]  Victor C. M. Leung,et al.  Developing IoT applications in the Fog: A Distributed Dataflow approach , 2015, 2015 5th International Conference on the Internet of Things (IOT).

[179]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[180]  Inderveer Chana,et al.  Q-aware: Quality of service based cloud resource provisioning , 2015, Comput. Electr. Eng..

[181]  Hilary I. Okagbue,et al.  On Some Suggested Applications of Sudoku in Information Systems Security , 2015 .

[182]  Qi Shi,et al.  Big Data applications in real-time traffic operation and safety monitoring and improvement on urban expressways , 2015 .

[183]  Samir Bourekkache,et al.  An agent-based approach for resource allocation in the cloud computing environment , 2015, 2015 9th International Conference on Telecommunication Systems Services and Applications (TSSA).

[184]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[185]  Hee Beng Kuan Tan,et al.  Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[186]  Maysam F. Abbod,et al.  Automatic generation of fuzzy classification rules using granulation-based adaptive clustering , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[187]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[188]  Tudor Dumitras,et al.  Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.

[189]  Elisa Bertino Data privacy for IoT systems: Concepts, approaches, and research directions , 2016, 2016 IEEE International Conference on Big Data (Big Data).

[190]  Lin Shao,et al.  Hand movement and gesture recognition using Leap Motion Controller , 2016 .

[191]  Mariko Nakano-Miyatake,et al.  Security attack prediction based on user sentiment analysis of Twitter data , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[192]  Mariano Ceccato,et al.  Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks , 2016, SPRO@CCS.

[193]  Archana Ghotkar,et al.  Hand Gesture Recognition Using Leap Motion Controller , 2016 .

[194]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[195]  Khawaja M. Asim,et al.  Earthquake magnitude prediction in Hindukush region using machine learning techniques , 2016, Natural Hazards.

[196]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[197]  G. Bell,et al.  The ghosts of selection past reduces the probability of plastic rescue but increases the likelihood of evolutionary rescue to novel stressors in experimental populations of wild yeast. , 2016, Ecology letters.

[198]  Yi Shen,et al.  Energy-balanced compressive data gathering in Wireless Sensor Networks , 2016, J. Netw. Comput. Appl..

[199]  Carlos Sánchez-Azqueta,et al.  Secure communication system based on a logistic map and a linear feedback shift register , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[200]  Sarat Saharia,et al.  A two-level classification scheme for single-hand gestures of Sattriya dance , 2016, 2016 International Conference on Accessibility to Digital World (ICADW).

[201]  Philipp Leitner,et al.  Resource Provisioning for IoT Services in the Fog , 2016, 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA).

[202]  Erdogan Dogdu,et al.  An extended IoT framework with semantics, big data, and analytics , 2016, 2016 IEEE International Conference on Big Data (Big Data).

[203]  Asif Gill,et al.  Towards an IoT Big Data Analytics Framework: Smart Buildings Systems , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[204]  Khaled Ben Letaief,et al.  Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.

[205]  M. Anusha,et al.  Big Data-Survey , 2016 .

[206]  Marian B. Gorzalczany,et al.  A multi-objective genetic optimization for fast, fuzzy rule-based credit classification with balanced accuracy and interpretability , 2016, Appl. Soft Comput..

[207]  Devis Bianchini,et al.  Big Data As A Service For Monitoring Cyber-Physical Production Systems , 2016, ECMS.

[208]  Melannie B. Mendoza,et al.  Development of microcontroller-based landslide early warning system , 2016, 2016 IEEE Region 10 Conference (TENCON).

[209]  Thomas Kunz,et al.  Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[210]  R. Holt,et al.  Evolutionary rescue in novel environments: towards improving predictability , 2016 .

[211]  Muhammad Haroon Yousaf,et al.  Computer vision based detection and localization of potholes in asphalt pavement images , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[212]  Chee Peng Lim,et al.  A hybrid model of fuzzy ARTMAP and genetic algorithm for data classification and rule extraction , 2016, Expert Syst. Appl..

[213]  Ionel Staretu,et al.  Leap Motion Device Used to Control a Real Anthropomorphic Gripper , 2016 .

[214]  A. Jawahar,et al.  Smart agro system using wireless sensor networks , 2017, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS).

[215]  S. M. Chari,et al.  Development of Smart Network Using WSN and IoT for Precision Agriculture Monitoring System on Cloud , 2017 .

[216]  J. Manafian,et al.  Exact solutions for Fitzhugh–Nagumo model of nerve excitation via Kudryashov method , 2017 .

[217]  Shigeru Takayama,et al.  Detection of landslide disaster by telemetric sensing node network system , 2017, 2017 11th Asian Control Conference (ASCC).

[218]  Dumitru Baleanu,et al.  A new numerical algorithm for fractional Fitzhugh–Nagumo equation arising in transmission of nerve impulses , 2017 .

[219]  Juanru Li,et al.  Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices , 2017, 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME).

[220]  Sei-Wang Chen,et al.  A Novel Distance Estimation Method Leading a Forward Collision Avoidance Assist System for Vehicles on Highways , 2017, IEEE Transactions on Intelligent Transportation Systems.

[221]  Alexander Pretschner,et al.  Detecting Patching of Executables without System Calls , 2017, CODASPY.

[222]  Alexander Ling,et al.  Progress in satellite quantum key distribution , 2017, 1707.03613.

[223]  Arshad Jhumka,et al.  Many-to-many data aggregation scheduling in wireless sensor networks with two sinks , 2017, Comput. Networks.

[224]  Yee Kit Chan,et al.  A ground-based synthetic aperture radar system using portable VNA for landslide monitoring , 2017, 2017 International Symposium on Antennas and Propagation (ISAP).

[225]  Maurice Dawson,et al.  Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance , 2017 .

[226]  Rudolf Scitovski,et al.  Temporal analysis of croatian seismogenic zones to improve earthquake magnitude prediction , 2017, Earth Science Informatics.

[227]  Yanmei Kang,et al.  A Research on the IOT Perception Environment Security and Privacy Protection Technology , 2017 .

[228]  Krishna Subramanian,et al.  Opinion Mining Using Twitter Feeds for Political Analysis , 2017 .

[229]  Mohammad Zulkernine,et al.  Defending Application Cache Integrity of Android Runtime , 2017, ISPEC.

[230]  Léon Bottou,et al.  Wasserstein Generative Adversarial Networks , 2017, ICML.

[231]  Peng Li,et al.  A Novel Visual Cryptography Scheme with Different Importance of Shadows , 2017, IWDW.

[232]  Davide Magrin,et al.  Performance evaluation of LoRa networks in a smart city scenario , 2017, 2017 IEEE International Conference on Communications (ICC).

[233]  Suhang Wang,et al.  Fake News Detection on Social Media: A Data Mining Perspective , 2017, SKDD.

[234]  Andri Riid,et al.  Design of Fuzzy Rule-based Classifiers through Granulation and Consolidation , 2017, J. Artif. Intell. Soft Comput. Res..

[235]  Chun Yang,et al.  A Hybrid Multi-level Mechanism for Application Integrity Checking , 2017 .

[236]  Oliver Lemon,et al.  Challenging Neural Dialogue Models with Natural Data: Memory Networks Fail on Incremental Phenomena , 2017, ArXiv.

[237]  Saylee Gharge,et al.  Review on Various Visual Cryptography Schemes , 2017, 2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC).

[238]  Aaron C. Courville,et al.  Improved Training of Wasserstein GANs , 2017, NIPS.

[239]  H. Stone,et al.  Spatial gene drives and pushed genetic waves , 2017, Proceedings of the National Academy of Sciences.

[240]  Kristoko Dwi Hartomo,et al.  Spatial Model Design of Landslide Vulnerability Early Detection with Exponential Smoothing Method Using Google API , 2017, 2017 International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT).

[241]  Tamara Radivilova,et al.  Detecting cyber threats through social network analysis: short survey , 2018, ArXiv.

[242]  Musheer Ahmad,et al.  A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation , 2018, SSCC.

[243]  Vinitkumar K. Modi,et al.  Review of Taguchi Method, Design of Experiment (DOE) & Analysis Of Variance (ANOVA) For Quality Improvements through Optimization in Foundry , 2018 .

[244]  Rakhee,et al.  Energy Efficiency in Load Balancing of Nodes Using Soft Computing Approach in WBAN , 2018, Harmony Search and Nature Inspired Optimization Algorithms.

[245]  Arif I. Sarwat,et al.  Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid , 2018, 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D).

[246]  Francisco Martínez-Álvarez,et al.  Seismic indicators based earthquake predictor system using Genetic Programming and AdaBoost classification , 2018, Soil Dynamics and Earthquake Engineering.

[247]  Philippe Bolon,et al.  A Fast and Accurate Rule-Base Generation Method for Mamdani Fuzzy Systems , 2018, IEEE Transactions on Fuzzy Systems.

[248]  Hao Wang,et al.  Position based cryptography with location privacy: A step for Fog Computing , 2018, Future Gener. Comput. Syst..

[249]  Reuben Varghese,et al.  Affordable Smart Farming Using IoT and Machine Learning , 2018, 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS).

[250]  Farzad Kiani,et al.  Wireless Sensor Network and Internet of Things in Precision Agriculture , 2018 .

[251]  Andreas Schütze,et al.  Sensors 4.0 – smart sensors and measurement technology enable Industry 4.0 , 2018 .

[252]  Héctor M. Pérez Meana,et al.  Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization , 2018, Sensors.

[253]  Inès Kammoun,et al.  Redundancy Elimination for Data Aggregation in Wireless Sensor Networks , 2018, 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD).

[254]  Teresa Nicole Brooks,et al.  Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems , 2017, Advances in Intelligent Systems and Computing.

[255]  Sarbani Roy,et al.  Social Network Analysis of Cricket Community Using a Composite Distributed Framework: From Implementation Viewpoint , 2018, IEEE Transactions on Computational Social Systems.

[256]  Li Da Xu,et al.  Industry 4.0: state of the art and future trends , 2018, Int. J. Prod. Res..

[257]  Irfan Uddin,et al.  Reliable and Energy Efficient MAC Mechanism for Patient Monitoring in Hospitals , 2018 .

[258]  Filippo Scotti,et al.  Photonics-Based Dual-Band Radar for Landslides Monitoring in Presence of Multiple Scatterers , 2018, Journal of Lightwave Technology.

[259]  Cheol-Ho Hong,et al.  qCon: QoS-Aware Network Resource Management for Fog Computing , 2018, Sensors.

[260]  Approaches of Earthquake Magnitude Prediction Using Machine Learning Techniques , 2018 .

[261]  Munir Ahmad,et al.  Rainfall Prediction using Data Mining Techniques: A Systematic Literature Review , 2018 .

[262]  Kristina Lerman,et al.  Predicting Cyber Events by Leveraging Hacker Sentiment , 2018, Inf..

[263]  Mohana,et al.  Real Time Object Detection and Tracking Using Deep Learning and OpenCV , 2018, 2018 International Conference on Inventive Research in Computing Applications (ICIRCA).

[264]  Rajesh Kumar,et al.  Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.

[265]  Jangwoo Kwon,et al.  Detection of Potholes Using a Deep Convolutional Neural Network , 2018, J. Univers. Comput. Sci..

[266]  Mario Muñoz Organero,et al.  Automatic detection of traffic lights, street crossings and urban roundabouts combining outlier detection and deep learning classification techniques based on GPS traces while driving , 2018, Comput. Environ. Urban Syst..

[267]  Satoshi Tamura,et al.  A Deep Learning-Based Approach for Road Pothole Detection in Timor Leste , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).

[268]  Jian Yu,et al.  A Brief Survey on IoT Privacy: Taxonomy, Issues and Future Trends , 2018, ICSOC Workshops.

[269]  Dhruba Kumar Bhattacharyya,et al.  A Dataset of Single-Hand Gestures of Sattriya Dance , 2018, Heritage Preservation.

[270]  Praveen Kumar Mishra,et al.  Landslide Monitoring System Implementing IOT Using Video Camera , 2018, 2018 3rd International Conference for Convergence in Technology (I2CT).

[271]  Francisco Martínez-Álvarez,et al.  Earthquake prediction model using support vector regressor and hybrid neural networks , 2018, PloS one.

[272]  Bruno Volckaert,et al.  Towards Dynamic Fog Resource Provisioning for Smart City Applications , 2018, 2018 14th International Conference on Network and Service Management (CNSM).

[273]  Prashant M. Ambad,et al.  Industry 4.0 – A Glimpse , 2018 .

[274]  Wenzhong Shi,et al.  Landslide Inventory Mapping From Bitemporal High-Resolution Remote Sensing Images Using Change Detection and Multiscale Segmentation , 2018, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[275]  Huan Liu,et al.  Understanding Cyber Attack Behaviors with Sentiment Information on Social Media , 2018, SBP-BRiMS.

[276]  Asif Ekbal,et al.  IARM: Inter-Aspect Relation Modeling with Memory Networks in Aspect-Based Sentiment Analysis , 2018, EMNLP.

[277]  Jari-Matti Mäkelä,et al.  Diversification and obfuscation techniques for software security: A systematic literature review , 2018, Inf. Softw. Technol..

[278]  Himadri Tanaya Chidananda,et al.  Personalized Movie Recommendation System Using Twitter Data , 2018 .

[279]  Jitendra Kumar,et al.  Adaptive MAC Protocol in Wireless Sensor Networks for Disaster Detection , 2018 .

[280]  S. Galea,et al.  Spatio-Temporal Distribution of Negative Emotions in New York City After a Natural Disaster as Seen in Social Media , 2018, International journal of environmental research and public health.

[281]  G. S. Nagaraja,et al.  Security Architecture for IoT-Based Home Automation , 2019, Smart Intelligent Computing and Applications.

[282]  Jae-Yong Ko,et al.  Real-time Mandatory Access Control on SELinux for Internet of Things , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[283]  Ishaan Lodha,et al.  Secure Wireless Internet of Things Communication using Virtual Private Networks , 2019, ArXiv.

[284]  Stratis Kanarachos,et al.  The Correlation between Vehicle Vertical Dynamics and Deep Learning-Based Visual Target State Estimation: A Sensitivity Study , 2019, Sensors.

[285]  Guru Venkataramani,et al.  Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study , 2019, IEEE Access.

[286]  Guojun Wang,et al.  A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..

[287]  Chandan Giri,et al.  A Statistical Model to Determine the Behavior Adoption in Different Timestamps on Online Social Network , 2019, Int. J. Knowl. Syst. Sci..

[288]  Jong Bae Kim,et al.  Efficient Vehicle Detection and Distance Estimation Based on Aggregated Channel Features and Inverse Perspective Mapping from a Single Camera , 2019, Symmetry.

[289]  Dongmahn Seo,et al.  Experiment of Image Processing Algorithm for Efficient Pothole Detection , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[290]  Lida Xu,et al.  Big data for cyber physical systems in industry 4.0: a survey , 2019, Enterp. Inf. Syst..

[291]  Xiaodong Bai,et al.  A Low-Cost Internet of Things-Based Home Security System Using Computer Vision , 2020 .

[292]  Ramesh Bhakthavatchalu,et al.  Reseeding LFSR for Test Pattern Generation , 2019, 2019 International Conference on Communication and Signal Processing (ICCSP).

[293]  Luca De Nardis,et al.  ThingsLocate: A ThingSpeak-Based Indoor Positioning Platform for Academic Research on Location-Aware Internet of Things , 2019, Technologies.

[294]  Jian Wang,et al.  Learning Binary Representation for Automatic Patch Detection , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[295]  Anubha Parashar,et al.  IoT Based Automated Weather Report Generation and Prediction Using Machine Learning , 2019, 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT).

[296]  Biswajeet Pradhan,et al.  Landslide Detection Using Residual Networks and the Fusion of Spectral and Topographic Information , 2019, IEEE Access.

[297]  Aleksandra Gawlik,et al.  Solitary Wave Dynamics Governed by the Modified FitzHugh–Nagumo Equation , 2019, Journal of Computational and Nonlinear Dynamics.

[298]  Hamed Haddadi,et al.  Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[299]  João Paulo Papa,et al.  Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.

[300]  Jayendra Kumar,et al.  Automatic Plant Watering and Monitoring System using NodeMCU , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[301]  Pooja Krishnan,et al.  Intelligent Border Security Intrusion Detection using IoT and Embedded systems , 2019, 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC).

[302]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[303]  Phuong Hoai Ha,et al.  Advanced GTS Scheduling in IEEE 802.15.4 Networks for Industrial Application , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[304]  Josep Domingo-Ferrer,et al.  Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..

[305]  Victor C. M. Leung,et al.  Optimizing Content Dissemination for Real-Time Traffic Management in Large-Scale Internet of Vehicle Systems , 2019, IEEE Transactions on Vehicular Technology.

[306]  Nikos Fotiou,et al.  Improving the Privacy of IoT with Decentralised Identifiers (DIDs) , 2019, J. Comput. Networks Commun..

[307]  Sanjeev Kumar,et al.  Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack , 2019, 2019 2nd International Conference on Data Intelligence and Security (ICDIS).

[308]  Abdellatif Kobbane,et al.  A Resources Representation for Resource Allocation in Fog Computing Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[309]  Feng Shu,et al.  Novel Modbus Adaptation Method for IoT Gateway , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[310]  Gautam Srivastava,et al.  A Privacy-Enhancing Framework for Internet of Things Services , 2019, NSS.

[311]  Y. Khan A variational approach for novel solitary solutions of FitzHugh–Nagumo equation arising in the nonlinear reaction–diffusion equation , 2020 .

[312]  T. Ravi,et al.  Cluster Based Data Aggregation Scheme for Latency and Packet Loss Reduction in WSN , 2020, Comput. Commun..

[313]  C. P. Katti,et al.  Security architectures in wireless sensor network , 2020 .

[314]  Rui Zhang,et al.  Vehicle Detection and Ranging Using Two Different Focal Length Cameras , 2020, J. Sensors.

[315]  Abdellatif Hamdoun,et al.  Distance measurement system for autonomous vehicles using stereo camera , 2020, Array.

[316]  Ali Hassan,et al.  Real-time vehicle distance estimation using single view geometry , 2020, 2020 IEEE Winter Conference on Applications of Computer Vision (WACV).

[317]  R. Santhana Krishnan,et al.  Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks , 2019, Wireless Networks.

[318]  Philip James,et al.  ACCURATE VEHICLE SPEED ESTIMATION FROM MONOCULAR CAMERA FOOTAGE , 2020 .

[319]  J. Van Dyken,et al.  Evolutionary Rescue from a Wave of Biological Invasion , 2020, The American Naturalist.

[320]  Fadi Al-Turjman,et al.  Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies - an overview , 2020, Sustainable Cities and Society.

[321]  Guisheng Fan,et al.  Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture , 2020, Peer-to-Peer Netw. Appl..

[322]  Bhaskaran Raman,et al.  RoadCare: A Deep-learning Based Approach to Quantifying Road Surface Quality , 2020, COMPASS.

[323]  Gang Mei,et al.  A Survey of Internet of Things (IoT) for Geohazard Prevention: Applications, Technologies, and Challenges , 2020, IEEE Internet of Things Journal.

[324]  Soumik Ghosh,et al.  Priority Based GTS Allocation in Zigbee Wireless Sensor Network , 2020, Communications in Computer and Information Science.

[325]  Thar Baker,et al.  A secure fog‐based platform for SCADA‐based IoT critical infrastructure , 2020, Softw. Pract. Exp..

[326]  Aleksandra Gawlik,et al.  Existence of the solitary wave solutions supported by the modified FitzHugh–Nagumo system , 2020, Nonlinear Analysis: Modelling and Control.

[327]  Tong Li,et al.  Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification , 2020, Inf. Sci..

[328]  Bahar Farahani,et al.  Towards collaborative intelligent IoT eHealth: From device to fog, and cloud , 2020, Microprocess. Microsystems.

[329]  Hanshen Chen,et al.  Pothole detection using location-aware convolutional neural networks , 2020, International Journal of Machine Learning and Cybernetics.

[330]  Xiaolong Xu,et al.  Intelligent Offloading for Collaborative Smart City Services in Edge Computing , 2020, IEEE Internet of Things Journal.

[331]  Henrich C. Pöhls,et al.  Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications , 2020, 2020 Global Internet of Things Summit (GIoTS).

[332]  Guojun Wang,et al.  An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City , 2020, Comput. Electr. Eng..

[333]  Maryam Shoaran,et al.  Single–camera vehicle speed measurement using the geometry of the imaging system , 2020, Multimedia Tools and Applications.

[334]  Thar Baker,et al.  A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services , 2020, IEEE Transactions on Industrial Informatics.

[335]  Richardson Santiago Teles de Menezes,et al.  Vehicle Speed Detection and Safety Distance Estimation Using Aerial Images of Brazilian Highways , 2020 .

[336]  Pierfrancesco Bellini,et al.  Smart City IoT Platform Respecting GDPR Privacy and Security Aspects , 2020, IEEE Access.

[337]  B. Muthukumar,et al.  A Model for Low Power, High Speed and Energy Efficient Early Landslide Detection System Using IoT , 2019, Wireless Personal Communications.

[338]  Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls , .