Integrating Blockchain Technology with IoT - Abstract
Texte intégral
(2) 82. 3. Organisers. Roshan Singh received his Diploma in Computer Engineering from Central Institute of Technology, Kokrajhar, India in 2016, and a B.Tech degree in Computer Science and Engineering in the year 2019. He is an Assistant Project Engineer in Open Source Intelligence Lab at the Indian Institute of Technology, Guwahati, India. He is a certified elite in "Blockchain Architecture and Design" by NPTEL, India. His research interests are in the domains of Blockchain Technology, Internet of Things, and Social Network Analytics. Over the years he has made several contributions to his areas of interest at various conferences and journals.. Pranav Kumar Singh is working as an Assistant Professor in the Department of Computer Science and Engineering, Central Institute of Technology Kokrajhar, India. He is having more than 12 years of Teaching Experience. He has also served as Nodal officer NKN and IPv6 Road Map of CITK, an initiative by the Government of India. He received the B.Tech and M.Tech Degree in Computer Science and Engineering. He is pursuing his Ph.D. in the Department of Computer Science and Engineering, Indian Institute of Technology Guwahati, India. His research interests include Vehicular Communications, Security and Privacy, Software-Defined Vehicular Networking, QoS and QoE in Wireless Communication, Intelligent Transportation System, Blockchain, and IoT..
(3)
Documents relatifs
small projects in the domain of home automation. They organised themselves in teams of two. Within a week they were presented with their own arduino- compatible device,
Observer based Model Predictive Control of the Water Based Painting Drying using a Humidity Profile Soft Sensor and a Temperature Measurement.In International
Richard Bett, Integrating Governance, Risk, and Compliance Management (GRCM) to Enhance Requirements Engineering in Information Technology Projects.. (Under the direction of
With the reduction in execution times of complex arithmetic operations roughly by factors of 50–800 % in digital signal and image processing applications, it is possible to
Whenever a new applica- tion such as a communications controller (see embedded system ) was developed, it typically had its own special- ized programming language.
Table 5.7 lists potential actions as suggested by the optimization algorithm over the Maximal Utility model (Fig. 5.5) with dynamic benefit function and infinite change cost for
In order to incorporate security into a Web Engineering curriculum, it is necessary to appreciate the current state of security methodology research and to acknowledge
Legendre sequences (Polyphase Legendre sequences), L-sequences (PL-sequences) for short, and modified Jacobi sequences (modifies polyphase Jacobi sequences),