Towards Information Flows in Recognition and Prediction Tasks with Internet of Things
Abstract
Keywords
Full Text:
PDF (Українська)References
1. Li, F.-F., Cao, H., Hao, C.-F., & Qiu, J. (2021). Daily Streamflow Forecasting Based on Flow Pattern Recognition. Water Resources Management, 35(13), 4601–4620. doi: 10.1007/s11269-021-02971-8
2. Lee, S., & Bajić, I. (2021). Analysis of Information Flow Through U-Nets. Retrieved from https://arxiv.org/abs/2101.08427
3. Wang, H., & Yuan, L. (2022). Software engineering defect detection and classification system based on artificial intelligence. Nonlinear Engineering, 11(1), 380–386. doi: 10.1515/nleng-2022-0042
4. Zheng, Z., Wang, L., Cao, Y., Zhuang, Y., & Tao, X. (2019). Towards Non-Invasive Recognition of Developers' Flow States with Computer Interaction Traces. 2019 26th Asia-Pacific Software Engineering Conference (APSEC). doi: 10.1109/apsec48747.2019.00048
5. Anton, N., & Nedelcu, A. (2019). Analysis of information and information flow in technological processes. Method of transmitting information unaltered. IOP Conference Series: Materials Science and Engineering, 564(1), 012094. doi: 10.1088/1757-899x/564/1/012094
6. Sakai, T., Hata, K., Wada, T., & Naito, K. (2022). IoT platform using information flow to reduce load on cloud. 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). doi: 10.1109/compsac54236.2022.00191
7. Elouali, A., Mora Mora, H., & Mora-Gimeno, F. J. (2023). Data transmission reduction formalisation for cloud offloading-based IoT systems. Journal of Cloud Computing, 12(1). doi: 10.1186/s13677-023-00424-8
8. Mysiuk, R., Yuzevych, V., Mysiuk, I., Tyrkalo, Y., Pavlenchyk, A., & Dalyk, V. (2023). Detection of Surface Defects Inside Concrete Pipelines Using Trained Model on JetRacer Kit. 2023 IEEE 13th International Conference on Electronics and Information Technologies (ELIT). doi: 10.1109/elit61488.2023.10310691
9. Mysiuk, R. (2023). Pipeline Damage Assessment Based on Corrosion Segmentation Using JetRacer Kit. Path of Science, 9(8), 6001–6006. doi: 10.22178/pos.95-15
10. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Transactions on Image Processing, 13(4), 600–612. doi: 10.1109/tip.2003.819861
11. Munawar, H. S., Ullah, F., Shahzad, D., Heravi, A., Qayyum, S., & Akram, J. (2022). Civil Infrastructure Damage and Corrosion Detection: An Application of Machine Learning. Buildings, 12(2), 156. 10.3390/buildings12020156
12. Al-Ghaili, A. M., Gunasekaran, S. S., Jamil, N., Alyasseri, Z. A. A., Al-Hada, N. M., Ibrahim, Z.-A. B., Bakar, A. A., Kasim, H., Hosseini, E., Omar, R., Kasmani, R. Md., & Razali, R. A. (2023). A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications. IEEE Access, 11, 101924–101948. doi: 10.1109/access.2023.3312682
13. Hadidi, R., Cao, J., Woodward, M., Ryoo, M. S., & Kim, H. (2018). Real-Time Image Recognition Using Collaborative IoT Devices. Proceedings of the 1st on Reproducible Quality-Efficient Systems Tournament on Co-Designing Pareto-Efficient Deep Learning. doi: 10.1145/3229762.3229765
14. Deng, T., Li, X., Jin, B., Chen, L., & Lin, J. (2021). Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT. Security and Communication Networks, 2021, 1–13. doi: 10.1155/2021/5519558
15. Al Sibahee, M. A., Lu, S., Abduljabbar, Z. A., Ibrahim, A., Hussien, Z. A., Mutlaq, K. A.-A., & Hussain, M. A. (2018). Efficient encrypted image retrieval in IoT-cloud with multi-user authentication. International Journal of Distributed Sensor Networks, 14(2), 155014771876181. doi: 10.1177/1550147718761814
Article Metrics
Metrics powered by PLOS ALM
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Roman Mysiuk

This work is licensed under a Creative Commons Attribution 4.0 International License.




