- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Cryptography and Data Security
- Distributed systems and fault tolerance
- Precipitation Measurement and Analysis
- Cryospheric studies and observations
- Greenhouse Technology and Climate Control
- Privacy-Preserving Technologies in Data
- Soil Moisture and Remote Sensing
- Privacy, Security, and Data Protection
- Energy Efficient Wireless Sensor Networks
- Hydrological Forecasting Using AI
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- FinTech, Crowdfunding, Digital Finance
- Software-Defined Networks and 5G
- Plant Surface Properties and Treatments
- Plant Water Relations and Carbon Dynamics
- Smart Agriculture and AI
- Advanced Wireless Communication Technologies
University of Technology Sydney
2019-2024
Applications and technologies of the Internet Things are in high demand with increase network devices. With development such as 5G, machine learning, edge computing, Industry 4.0, has evolved. This survey article discusses evolution presents vision for 2.0. The 2.0 is discussed across seven major fields. These fields learning intelligence, mission critical communication, scalability, energy harvesting-based sustainability, interoperability, user friendly IoT, security. Other than these...
Machine learning is a powerful technology for extracting information from data of diverse nature and origin. As its deployment increasingly depends on multiple entities, ensuring privacy these contributors becomes paramount the integrity fairness machine endeavors. This review looks into recent advancements in secure multi-party computation (SMPC) learning, pivotal championing privacy. We evaluate applications various aspects, including security models, requirements, system types, service...
Frost damage in broadacre cropping and horticulture (including viticulture) results substantial economic losses to producers may also disrupt associated product value chains. risk windows are changing timing, frequency, duration. Faced with the increasing cost of mitigation infrastructure competition for resources (e.g., water energy), multiperil insurance, need supply chain certainty, under pressure innovate order manage mitigate risk. protection systems cyber-physical (CPSs) consisting...
Future 6G wireless communication systems are expected to feature intelligence and automation. Knowledge-defined networking (KDN) is an evolutionary step toward autonomous self-driving networks. The building blocks of the KDN paradigm in achieving networks software-defined (SDN), packet-level network telemetry, machine learning (ML). intends integrate manage control automatically. In this study, we first introduce disadvantages current technologies. Then, associated technologies explored with...
As a tool for human technological advancement, the peer-review system acts as gateway ensuring academic paper qualities. However, has proven to be slow and expensive. Also, biasedness remains an unsolved problem. Such issues could become major bottleneck, which can adversely impact research progress dissemination of knowledge. This aims propose double-blind review preserve authors reviewers anonymity. also addresses concerning payment, inconsistent metrics, biased reviews. The proposed...
Exhibition of malicious behavior during blockchain consensus, threats against reputation systems, and high TX latency are significant issues for blockchain-based IoT systems. Hence, to mitigate such challenges we propose "Pledge", a unique Proof-of-Honesty based consensus protocol. Initial experimentation shows that Pledge is economical with low computations communications complexity in transaction confirmation.
The ubiquitous use of Internet Things (IoT) ranges from industrial control systems to e-Health, e-commerce, smart cities, supply chain management, cars, cyber-physical and a lot more. However, the data collected processed by IoT especially ones with centralized are vulnerable availability, integrity, privacy threats. Hence, we present “PrivySharing,” blockchain-based innovative framework for integrity privacy-preserving sharing in city environment. proposed scheme is distinct existing...
The existing lottery-based consensus algorithms, such as Proof-of-Work, and Proof-of-Stake, are mostly used for blockchain-based financial technology applications. Similarly, the Byzantine Fault Tolerance algorithms do provide finality, yet they either communications intensive, vulnerable to Denial-of-Service attacks, poorly scalable, or have a low faulty node tolerance level. Moreover, these not designed Internet of Things systems that require near-real-time transaction confirmation,...
Frost events incur substantial economic losses to farmers. These could induce damage plants and crops by damaging the cells. In this article, a recurrent neural network-based method, automating frost prediction process, is proposed. The models leveraged in article include standard network, long short-term memory, gated unit. proposed method aims increase frequency from once per 12–24 h for next day or night minute-wise predictions hour events. To achieve goal, datasets NSW ACT of Australia...
The weather phenomenon of frost poses great threats to agriculture. As recent prediction methods are based on on-site historical data and sensors, extra development deployment time required for collection in any new site. aim this article is eliminate the dependency sensors methods. In article, a method spatial interpolation proposed. models use climate from existing stations, digital elevation surveys, normalized difference vegetation index estimate target site's next hour minimum...