標(biāo)題: Titlebook: Internet of Things – ICIOT 2019; 4th International Co Valerie Issarny,Balaji Palanisamy,Liang-Jie Zhang Conference proceedings 2019 Springe [打印本頁] 作者: Halcyon 時間: 2025-3-21 19:01
書目名稱Internet of Things – ICIOT 2019影響因子(影響力)
書目名稱Internet of Things – ICIOT 2019影響因子(影響力)學(xué)科排名
書目名稱Internet of Things – ICIOT 2019網(wǎng)絡(luò)公開度
書目名稱Internet of Things – ICIOT 2019網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Internet of Things – ICIOT 2019被引頻次
書目名稱Internet of Things – ICIOT 2019被引頻次學(xué)科排名
書目名稱Internet of Things – ICIOT 2019年度引用
書目名稱Internet of Things – ICIOT 2019年度引用學(xué)科排名
書目名稱Internet of Things – ICIOT 2019讀者反饋
書目名稱Internet of Things – ICIOT 2019讀者反饋學(xué)科排名
作者: 預(yù)兆好 時間: 2025-3-21 22:36 作者: 雄辯 時間: 2025-3-22 02:09
Smart IoT In-Car Life Detector System to Prevent Car Deaths, make the appropriate actions to prevent any death. These actions include sending an alert message to the parents and the emergency department, rolling down the windows, or starting the engine and turning on the air conditioner.作者: 流逝 時間: 2025-3-22 05:40 作者: GRAIN 時間: 2025-3-22 10:31
IoT for Fault Detection in Thailand,s paper, we proposed concept using wireless sensor networks that could sense the faulty event in the distribution line, display to the web application as well as send an alarm notification to area distribution dispatching center and service crew, by LoRa network that a low cost, low power, and long-range communication via IoT.作者: 水獺 時間: 2025-3-22 16:11 作者: 單純 時間: 2025-3-22 18:38
0302-9743 orms and tools, data processing/visualization/analysis and integration engines, and other components of traditional IoT are interconnected through innovative services to realize the value of connected things, people, and virtual Internet spaces..978-3-030-23356-3978-3-030-23357-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: IRS 時間: 2025-3-23 01:06
Context-Aware Continuous Authentication and Dynamic Device Pairing for Enterprise IoT,from various sensors on the smartphones and in the IoT domains. We also propose a dynamic device pairing method to support the mobility of users and IoT devices based on data (e.g., contexts, access history, etc.) sharing among the IoT domain, the enterprise server, and the mobile users.作者: STING 時間: 2025-3-23 04:12
Underground Environment Aware MIMO Design Using Transmit and Receive Beamforming in Internet of Undree different paths in the underground soil medium through which the waves propagates to reach at the receiver. When the UG receiver receives a desired data stream only from the desired path, then the UG MIMO channel becomes three path (lateral, direct, and reflected) interference channel. According作者: GLIDE 時間: 2025-3-23 08:48 作者: 牲畜欄 時間: 2025-3-23 12:57
A Method to Secure IoT Devices Against Botnet Attacks,s botnet. The proliferation of IoT devices with an unsecured/weak authentication mechanism has increased the threat of using a huge number of IoT devices as botnets for large-scale DDoS attacks. Default credential pairs (like ‘root-root’ or ‘a(chǎn)dmin-admin’) for the Telnet or SSH connections are still 作者: 變色龍 時間: 2025-3-23 15:58 作者: 起草 時間: 2025-3-23 19:40 作者: 抵制 時間: 2025-3-23 22:24
IoT for Fault Detection in Thailand,tion technology, largely rural area, and so many points of sensor installation, there are limited and difficult to monitoring and data sending. In this paper, we proposed concept using wireless sensor networks that could sense the faulty event in the distribution line, display to the web application作者: 歡樂東方 時間: 2025-3-24 04:16 作者: promote 時間: 2025-3-24 08:18
Online Conditions Monitoring of End-Mill Based on Sensor Integrated Smart Holder,nditions causes downtime and consequently reduce productive efficiency. In order to sense and monitor the conditions of end-mill in real time, an intelligent Internet of Things (IoT) system dedicated to online conditions monitoring of end-mill has been developed in this research work. The designed s作者: Axon895 時間: 2025-3-24 13:44
Context-Aware Continuous Authentication and Dynamic Device Pairing for Enterprise IoT,se assets and their devices with backend application services and frontend user interactions. While it is more complicated and more impactful than smart home, it faces several challenges such as a large number of IoT devices deployed at various locations and also multiple users to be granted with di作者: countenance 時間: 2025-3-24 15:52
Smart IoT In-Car Life Detector System to Prevent Car Deaths,is paper is proposing a simple smart IoT system for in car detection of a living subject and taking the necessary actions to prevent their life loss. The system has a wide range of sensors including microwave sensors to collect a large set of data inside the car. The system will analyze the data and作者: 性學(xué)院 時間: 2025-3-24 19:43
Cloud-Based IoT Smart Parking System for Minimum Parking Delays on Campus,mpty parking spots. To overcome the problem, this paper proposes a simple solution using a low-cost cloud-based system design. The design will be initially implemented on campus in one parking lot at the University of Central Oklahoma. The goal is to make the faculties and students life easier by gu作者: 無聊的人 時間: 2025-3-25 01:06 作者: correspondent 時間: 2025-3-25 03:41 作者: 生命 時間: 2025-3-25 11:07 作者: 兒童 時間: 2025-3-25 15:00 作者: 可耕種 時間: 2025-3-25 18:27
https://doi.org/10.1007/978-3-030-23357-0communication channels (information theory); data mining; data security; Human-Computer Interaction (HC作者: cataract 時間: 2025-3-25 22:58 作者: Orchiectomy 時間: 2025-3-26 00:45
978-3-030-23356-3Springer Nature Switzerland AG 2019作者: 高度表 時間: 2025-3-26 07:53
Internet of Things – ICIOT 2019978-3-030-23357-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: insurgent 時間: 2025-3-26 10:28 作者: legacy 時間: 2025-3-26 16:39 作者: chronology 時間: 2025-3-26 20:29
A Method to Secure IoT Devices Against Botnet Attacks,zle, which presents a puzzle to the remote device during the login process to prevent unrestricted log-in attempts. Login puzzle is a set of multiple mini puzzles with a variable complexity, which the remote device is required to solve before logging into any IoT device. Every unsuccessful log-in at作者: 來這真柔軟 時間: 2025-3-26 22:18
Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems,e developed and implemented a learning-based system that captures and demodulates wireless packets from IoT devices over a period of time, extracts the features specified in the normal behaviour specification, and uses a learning algorithm to create a normal model of each device. Our implementation 作者: 新義 時間: 2025-3-27 02:02
A WS-Agreement Based SLA Ontology for IoT Services,and WSLA, to take advantage of their complementary features. This ontology is used to formalize the SLAs and SLA negotiation offers, which further facilitates the service selection and automatic SLA negotiation. It can also be used by a monitoring engine to detect SLA violations by providing the sem作者: Evacuate 時間: 2025-3-27 08:39
IoT-Based Monitoring and Control Systems for Window Energy Management: Design and Implementation,nd anything can connect together anytime and anywhere [.]. It is realizable through sensing and communication technologies [.]. The IoT approach was adopted to achieve our goal due to the availability of sensing technology, wireless communication technologies, and standard computer networking protoc作者: enhance 時間: 2025-3-27 12:35 作者: 厚臉皮 時間: 2025-3-27 15:26 作者: amplitude 時間: 2025-3-27 18:14
Fan Li,Christian Cabrera,Siobhán Clarke create a new form of coaching by just attaching the word coaching to his old profession. Do we really not know where it comes from? Is coaching really so reductive or linear? There exists a body of knowledge that proves that coaching is none of these and its origins are also well documented.作者: Atrium 時間: 2025-3-28 00:56
Nesreen Alsbou,Ka Hei Samuel Chan,Mohamed Afify The operational control of complaint management tasks can be carried out using the Complaint Management Index (BMI) which provides a quick overview of to what degree the defined quality and productivity targets have been reached..Cost-benefit-controlling serves to assess the profitability of compla作者: 宣稱 時間: 2025-3-28 02:42
sit two prominent data structures of computational geometry, namely arrangements (Chap. 1) and Voronoi diagrams (Chap. 2) in order 978-3-642-06987-1978-3-540-33259-6Series ISSN 1612-3786 Series E-ISSN 2197-666X 作者: 小母馬 時間: 2025-3-28 09:36 作者: Contort 時間: 2025-3-28 10:53 作者: eustachian-tube 時間: 2025-3-28 17:39 作者: ARENA 時間: 2025-3-28 21:00 作者: Lymphocyte 時間: 2025-3-29 00:17 作者: 滴注 時間: 2025-3-29 05:45 作者: Panacea 時間: 2025-3-29 08:18 作者: 蛤肉 時間: 2025-3-29 12:41
0302-9743 ented ?rst, followed by research reports, papers from the Educational Symposium, and papers from the Ph.D. Symposium. The presentations given during three panel978-3-540-40215-2978-3-540-44870-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: byline 時間: 2025-3-29 16:11
1431-1933 the reforms‘ progress and the economic prospects of the EuroThe European economy is still in recession, even though there are some weak indications of stabilization. This book examines important aspects of the crisis in selected countries of Southern Europe, the Balkans and Eastern Europe. The inten作者: constellation 時間: 2025-3-29 21:48
Longhui Chang,Huaikou Miao,Gongzheng Lus, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses..978-981-15-2722-7978-981-15-2720-3作者: Range-Of-Motion 時間: 2025-3-30 01:02