Proceedings

Find matching any: Reset
Won, K
Wehrle, R
Walsh, M
Add filter to result:
Authors
Walsh, M
PÄTZOLD, S
Heggemann, T.W
Wehrle, R
Alahe, M
Kemeshi, J.O
Chang, Y
Won, K
Yang, X
Sher, M
Topics
Precision A to Z for Practitioners
Proximal and Remote Sensing of Soil and Crop (including Phenotyping)
Edge Computing and Cloud Solutions
Type
Poster
Oral
Year
2012
2022
2024
Home » Authors » Results

Authors

Filter results3 paper(s) found.

1. Precision Agriculture and Springer

Maryse Walsh will be presenting Precision Agriculture, the Springer journal, but also the discipline and its place in the Springer publications overall. The community attending the ICPA has a major role in ensuring the positive development of these publications and the affiliation of the journal to the ISPA will only help. ... M. Walsh

2. On-the-go Gamma Spectrometry and Its Evaluation Via Support Vector Machines: Really a Valuable Tool for Site-independent Soil Texture Prediction?

With progressive implementation of precision agriculture (PA) techniques in current agricultural/ viticultural practice, the need for high-resolution information on soil properties at low effort and cost is increasing. Moreover, climate change and extended drought periods do even increase this demand. Evaluating soil fertility and carbon storage potential of arable fields and vineyards, e.g. for future economic assessment of ecosystem services, requires spatially resolved soil data. Soil texture... S. PÄtzold, T.W. Heggemann, R. Wehrle

3. Securing Agricultural Data with Encryption Algorithms on Embedded GPU Based Edge Computing Devices

Smart Agriculture (SA) has captured the interest of both the agricultural business and the scientific community in recent years. Overall, SA aims to help the agricultural and food industry to avoid crop failures, loss of revenues as well as help farmers use inputs (such as fertilizers and pesticides) more efficiently by utilizing Internet of Things (IoT) devices and computing systems. However, rapid digitization and reliance on data-driven technologies create new security threats that can defeat... M. Alahe, J.O. Kemeshi, Y. Chang, K. Won, X. Yang, M. Sher