IoT
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel’s coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implement the full SKG chain in four indoor experimental campaigns.
- Categories:
Cattle health monitoring is essential in the modern world, because of the high demand for dairy products. Regular monitoring is essential to extend the lifecycle of cattle and maintain the quality of dairy products. Unfortunately, Observing the health of cattle regularly is difficult in large farms where workers do not have enough time to do so. This paper described IoT devices such as skin temperature, heart rate, and motion sensor. Using this device, you can monitor cattle’s heart rate, activity level, heat stress, the surrounding temperature, and sleep tracking.
- Categories:
In this investigation, the researchers have used a commercially available millimeter-wave (MMW) radar to collect data and assess the performance of deep learning algorithms in distinguishing different objects. The research looks at how varied ambiance factors, such as height, distance, and lighting, affect object recognition ability in both static and dynamic stages of the radar.
- Categories:
Sales data collection is a crucial aspect of any manufacturing industry as it provides valuable insights about the performance of products, customer behaviour, and market trends. By gathering and analysing this data, manufacturers can make informed decisions about product development, pricing, and marketing strategies in Internet of Things (IoT) business environments like the dairy supply chain.
- Categories:
Smart home automation is part of the Internet of Things that enables house remote control via the use of smart devices, sensors, and actuators. Despite its convenience, vulnerabilities in smart home devices provide attackers with an opportunity to break into the smart home infrastructure without permission. In fact, millions of Z-Wave smart home legacy devices are vulnerable to wireless injection attacks due to the lack of encryption support and the lack of firmware updates.
- Categories:
ImgFi converts wifi channel state information into images, improving feature extraction and achieving 99.5% accuracy in human activity recognition using only three layers of convolution. In addition to the self-test dataset, three publicly available high-quality datasets, WiAR, SAR and Widar3.0, are used. WiAR collects 16 activity-reflected WiFi signals; SAR collects WiFi signals in response to 6 actions performed by 9 volunteers over 6 days, while Widar3.0 collects 6 action signals from 5 volunteers at different locations and antenna orientations.
- Categories:
This dataset presents the measurement results for the evaluation study on the performance of an inductor-based and a switched capacitor-based energy harvesting boost converter PMICs by their charging efficiencies when connected to photovoltaic cells and Li-ion batteries under indoor lighting conditions.
- Categories:
Pictures and simulation file for the Zero dynamics anomaly behaviour paper is attached
- Categories:
Pictures and simulation file for the Zero dynamics anomaly behaviour paper is attached
- Categories:
Pictures and simulation file for the Zero dynamics anomaly behaviour paper is attached
- Categories: