2021 5th International Conference on Computing Methodologies and Communication (ICCMC) 2021
DOI: 10.1109/iccmc51019.2021.9418392
|View full text |Cite
|
Sign up to set email alerts
|

Smart Agriculture Based on IoT and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Various animal categorization prototype and an app-based agriculture tracking system were the two goals that were effectively attained by this work. (3) In order to produce an effective outcome, this article (4) proposes a vital survey of several techniques including crop choice, planting, invasive identification, and tracking the system. The study combined picture handling, ML, IOT, & use of AI to focus on the complete system.…”
Section: Discussionmentioning
confidence: 99%
“…Various animal categorization prototype and an app-based agriculture tracking system were the two goals that were effectively attained by this work. (3) In order to produce an effective outcome, this article (4) proposes a vital survey of several techniques including crop choice, planting, invasive identification, and tracking the system. The study combined picture handling, ML, IOT, & use of AI to focus on the complete system.…”
Section: Discussionmentioning
confidence: 99%
“…Accordingly, the TinyML sensor can't change itself to the specific setting in which it will be utilized. As per [5] there are two objectives covered. Initial, a versatile application based arrangement that shows the latest sensor readings and successfully empowers field organization from a good ways is shown.…”
Section: IImentioning
confidence: 99%
“…The most common attack in smart farming is the distributed denial of service (DDoS) attack, which can generate fake traffic on the network. This attack intensifies by compromising multiple devices in the network to generate fake traffic to overwhelm the network [19,20]. Therefore, this paper focuses on developing an effective intrusion detection system (IDS) that can accurately detect and classify the DDoS attack on the network.…”
Section: Introductionmentioning
confidence: 99%