The Internet tomorrow is often understood as the Web 3.0, Boundless Pervasiveness, Ubiquity, SEmatic Computation, Privacy and Cyber Security.
The question you asked needs clarity
Hello, I am looking for a way to compare the feature vectors of two images that contain a person in it. The application should be able to output a high similarity score for the same person and a...
10 May 2020 3,137 1 View
Given the current dynamic developments in the field of Big Data, Massive Data Storage and Ubiquitous access to high speed Internet 24/7 for anyone worldwide, the term Smart Cyberspace is becoming...
05 April 2020 6,213 13 View
Given the dynamic developments and innovation in computing, IT and Information Systems Industry, it appears that there is a shortage of well qualified professionals who will push the edge of...
25 December 2019 5,319 6 View
Physical layer (PHY) authentication based on the unique channel properties has proven effective due to its simple, fast, and distributed procedures with the recent explosion of the Internet of...
15 August 2019 9,322 1 View
Smart manufacturing, sometimes referred to as Industry 4.0, heralds a new age of responsive supply networks and tailored products and services made possible by advanced technologies such as the...
12 June 2019 4,963 2 View
12 June 2019 2,573 2 View
Text classification (TC) is a popular technique in the data mining and it used to get valuable information from the vast amount of data. The process of classifying or grouping documents into...
01 May 2019 1,789 3 View
Conducting research in the field of Cyber Security generate large volume of data that require large volume of computation and data analytics.
10 January 2019 192 1 View
The issue of agriculture is an important topic in particular in developing countries, this is because it will be influential in improving the quality of human resources and is also a means to...
22 October 2018 1,274 3 View
The low power is important in electronics industry especially in Very Large Scale Integration (VLSI) field. The multiplier utilize multiplication process with 70nm Complementary Metal Oxide...
14 October 2018 2,837 2 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
Which is suitable for use with Python? MySQL or SQL Server? What is your suggestion?
01 March 2021 3,422 3 View
Hi, everyone I'm working on a privacy-preserving algorithm that will apply to IoT devices. So, I need to measure the power consumption by implementing this algorithm. Any suggestion, advice,...
25 February 2021 8,749 6 View
Im looking for any papers, reports,articles, links etc on information on How vulnerable is water and wastewater infrastructure to cyber terrorism in an age of IoT.
24 February 2021 2,750 4 View
Dear Research Gaters, Let me first add context to the question. I am looking to simulate the waste management system and resources of a city. The hardware devices I need to simulate include,...
21 February 2021 2,333 4 View
I am working on a university project so, I m looking for a good Simulator compatible with LoRa and LoRaWAN protocol to simulate an IoT scenario. Thanks in Advance
20 February 2021 6,352 6 View
Hello, it is about creating a dataset for semantic segmentation with three classes. The problem is that one class dominates with >90% and one class is
18 February 2021 4,254 5 View
I asked recommended real-time or nearly real-time data source for any parameters for flood risk on a microscale analysis for urban area cases in developing countries that had agglomeration urban...
18 February 2021 2,617 2 View
The data collected from various measurement devices often contains erroneous values - such as noise, missing values, etc. What are the popular techniques for pre-processing measurement data in...
14 February 2021 4,642 2 View
I am using the 'Revised Cyber Bullying Inventory'. This instrument has 2 sub-scales (bully scale and victim scale). From the responses, they will be divided into 4 groups (pure cyberbullies, pure...
13 February 2021 5,787 4 View