Mumble 发表于 2025-3-23 09:50:30

https://doi.org/10.1007/978-1-4757-1987-1ntage of simulation to provide estimation for expected energy saving rates; in contrary to previous works depending only on rough calculations or real-time results after implementation. According to simulation results, the proposed system can save up to 57.4% of power consumption compared to conventional lighting systems.

含水层 发表于 2025-3-23 15:20:05

http://reply.papertrans.cn/16/1593/159256/159256_12.png

septicemia 发表于 2025-3-23 19:03:39

Emotions and Risky Technologiesvices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.

Commonplace 发表于 2025-3-24 00:13:37

Towards a Smart Highway Lighting System Based on Road Occupancy: Model Design and Simulationntage of simulation to provide estimation for expected energy saving rates; in contrary to previous works depending only on rough calculations or real-time results after implementation. According to simulation results, the proposed system can save up to 57.4% of power consumption compared to conventional lighting systems.

conjunctiva 发表于 2025-3-24 02:32:58

An Experimental Evaluation of IoT Technologies in Precision Viticulturetion and communication technologies in the agricultural industry. This paper reports on the main findings acquired through the deployment and experimental evaluation of IoT technologies in a vineyard. Our results also provide insight into future directions on the use of IoT technologies in precision viticulture.

chuckle 发表于 2025-3-24 08:21:19

GARMDROID: IoT Potential Security Threats Analysis Through the Inference of Android Applications Harvices are strongly required. In this context, this paper presents a web tool, named GARMDROID, aimed to help IoT software developers and integrators to evaluate IoT security threats based on the visualization of Android application hardware requests. This procedure is based on the static analysis of permissions requested by Android applications.

Aboveboard 发表于 2025-3-24 12:39:20

The Moral Risks of Risky Technologiesmization scheduling problem as a distributed constraint optimization problem (DCOP). We compare different multi-agent DCOP algorithms using different window sizes showing that the proposed architecture can find optimal and near-optimal solutions for a specific case study.

falsehood 发表于 2025-3-24 18:08:50

http://reply.papertrans.cn/16/1593/159256/159256_18.png

罐里有戒指 发表于 2025-3-24 22:17:05

http://reply.papertrans.cn/16/1593/159256/159256_19.png

薄荷醇 发表于 2025-3-25 01:25:11

http://reply.papertrans.cn/16/1593/159256/159256_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Applications for Future Internet; International Summit Enrique Sucar,Oscar Mayora,Enrique Munoz de Cote Conference proceedings 2017 ICST In