2014
DOI: 10.1155/2014/476176
|View full text |Cite
|
Sign up to set email alerts
|

Sensor-Based Turmeric Finger Growth Characteristics Monitoring Using Embedded System under Soil

Abstract: Modern agribusiness is becoming increasingly reliant on computer-based systems which was formerly performed by humans. One such technological innovation is the embedded system-based sensor array module such as flex sensor, temperature sensor, and pH sensor that have been used to monitor the turmeric finger growth characteristics. The experimental work has been tested with five different nodes and the average flex sensor resistance changes in five nodes are calculated. Among the five nodes, nodes II and V were … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…FN employs receiving based message algorithm and decrypts the aggregated data for analysis. EPPA (Efficient and privacy preserving aggregation) [31][32][33] method aggregates the data efficiently using Paillier cryptosystem. To construct multidimensional data cypher text, super increasing sequence method used.…”
Section: Literature Workmentioning
confidence: 99%
“…FN employs receiving based message algorithm and decrypts the aggregated data for analysis. EPPA (Efficient and privacy preserving aggregation) [31][32][33] method aggregates the data efficiently using Paillier cryptosystem. To construct multidimensional data cypher text, super increasing sequence method used.…”
Section: Literature Workmentioning
confidence: 99%
“…It is believed that the 128 bit key is sufficient for encryption and decryption in constrained devices of IoT system as they have low processing capabilities. AES encryption with 192 bit key and 256 bit key are having high computational complexity and demand advanced software and hardware platforms [21][22][23]. 256 bit key AES encryption takes 1.5 times more energy than 128 bit key AES encryption [18].…”
Section: Coap Payload Based Lightweight Authenticationmentioning
confidence: 99%
“…Some of the techniques reviewed the usage of authentication protocols in the hardware to protect intellectual ideas. Wireless sensor networks used the authentication protocol with PUF to provide high security in radiofrequency identification systems [28]. Mutual security in PUF was suggested for the authentication protocols.…”
Section: Related Workmentioning
confidence: 99%