睨视 发表于 2025-3-25 06:56:22
http://reply.papertrans.cn/23/2291/229008/229008_21.pngexcrete 发表于 2025-3-25 07:59:18
http://reply.papertrans.cn/23/2291/229008/229008_22.png放弃 发表于 2025-3-25 15:11:20
,Reliable Cross Layer Design for E-Health Applications—IoT Perspective, and data link layer (MAC layer) are integrated. Reliability related parameter are included in route discover process and later MAC based power control technique make use of routing information, to obtain the suitable transmission power. Our results show that proposed cross layer design is reliable–FER 发表于 2025-3-25 16:37:53
Erasure Codes for Reliable Communication in Internet of Things (IoT) Embedded with Wireless Sensorsion in the context of reliable communication in Internet of Things. In this chapter, the two methods of information transmission, end-to-end transmission and hop-by-hop transmission, prevalent in digital communication scenario is discussed in detail with emphasis on with and without erasure coding.Insufficient 发表于 2025-3-25 23:16:43
A Review on Security and Privacy Challenges of Big Data, mobile communication. The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find diffe易怒 发表于 2025-3-26 02:07:59
High-Level Knowledge Representation and Reasoning in a Cognitive IoT/WoT Context,., a robot or a person moving in real time towards a given object) characteristics of the different entities to deal with. After having presented a short state of the art in the cognitive/semantic IoT/WoT domain, we will specify the notion of GWE by describing its implementation under NKRL (Narrativ者变 发表于 2025-3-26 05:22:52
Applications of IoT in Healthcare,in improving the primary care, secondary care and tertiary care of public. This chapter focuses on how the capabilities of Internet of things (IoT)can be leveraged in providing better Healthcare. In this chapter, various applications of IoT in healthcare as well as the challenges in the implementati指耕作 发表于 2025-3-26 09:58:22
Security Stipulations on IoT Networks,ces. Cloud platforms rescue the situation by storing, computing and visualizing data before transforming them into meaningful information. Botnets or Zombie army is a malware that takes control of a computer in which the attacker can squeeze into the network raising threat to the authenticity of devArboreal 发表于 2025-3-26 14:42:04
A Hyper Heuristic Localization Based Cloned Node Detection Technique Using GSA Based Simulated Annester nodes is given to enhance the clone detection probability rate. Here, the location and residual energy is taken into account to identify the presence of cloned attack nodes within the network. Finally, Gravitational Search Algorithm with global search ability is investigated to identify the cloYag-Capsulotomy 发表于 2025-3-26 16:55:45
An Innovation Model for Smart Traffic Management System Using Internet of Things (IoT),deo data analysis, wireless sensor network, etc. are used to somewhat solve the congestion in the traffic and to manage the traffic smartly. But in the above said methods having some demerits like much time to take for installation, maintenance cost is very high. Actually, our objective is to develo