找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cognitive Computing for Big Data Systems Over IoT; Frameworks, Tools an Arun Kumar Sangaiah,Arunkumar Thangavelu,Venkatesa Book 2018 The Ed

[复制链接]
楼主: 深谋远虑
发表于 2025-3-25 06:56:22 | 显示全部楼层
发表于 2025-3-25 07:59:18 | 显示全部楼层
发表于 2025-3-25 15:11:20 | 显示全部楼层
,Reliable Cross Layer Design for E-Health Applications—IoT Perspective, and data link layer (MAC layer) are integrated. Reliability related parameter are included in route discover process and later MAC based power control technique make use of routing information, to obtain the suitable transmission power. Our results show that proposed cross layer design is reliable
发表于 2025-3-25 16:37:53 | 显示全部楼层
Erasure Codes for Reliable Communication in Internet of Things (IoT) Embedded with Wireless Sensorsion in the context of reliable communication in Internet of Things. In this chapter, the two methods of information transmission, end-to-end transmission and hop-by-hop transmission, prevalent in digital communication scenario is discussed in detail with emphasis on with and without erasure coding.
发表于 2025-3-25 23:16:43 | 显示全部楼层
A Review on Security and Privacy Challenges of Big Data, mobile communication. The selected journal articles are aimed used to make comparative analysis of security issues in different areas to cast solutions. This chapter consists of four main parts: introduction, materials and method, results, discussion and conclusion. This inquiry aimed to find diffe
发表于 2025-3-26 02:07:59 | 显示全部楼层
High-Level Knowledge Representation and Reasoning in a Cognitive IoT/WoT Context,., a robot or a person moving in real time towards a given object) characteristics of the different entities to deal with. After having presented a short state of the art in the cognitive/semantic IoT/WoT domain, we will specify the notion of GWE by describing its implementation under NKRL (Narrativ
发表于 2025-3-26 05:22:52 | 显示全部楼层
Applications of IoT in Healthcare,in improving the primary care, secondary care and tertiary care of public. This chapter focuses on how the capabilities of Internet of things (IoT)can be leveraged in providing better Healthcare. In this chapter, various applications of IoT in healthcare as well as the challenges in the implementati
发表于 2025-3-26 09:58:22 | 显示全部楼层
Security Stipulations on IoT Networks,ces. Cloud platforms rescue the situation by storing, computing and visualizing data before transforming them into meaningful information. Botnets or Zombie army is a malware that takes control of a computer in which the attacker can squeeze into the network raising threat to the authenticity of dev
发表于 2025-3-26 14:42:04 | 显示全部楼层
A Hyper Heuristic Localization Based Cloned Node Detection Technique Using GSA Based Simulated Annester nodes is given to enhance the clone detection probability rate. Here, the location and residual energy is taken into account to identify the presence of cloned attack nodes within the network. Finally, Gravitational Search Algorithm with global search ability is investigated to identify the clo
发表于 2025-3-26 16:55:45 | 显示全部楼层
An Innovation Model for Smart Traffic Management System Using Internet of Things (IoT),deo data analysis, wireless sensor network, etc. are used to somewhat solve the congestion in the traffic and to manage the traffic smartly. But in the above said methods having some demerits like much time to take for installation, maintenance cost is very high. Actually, our objective is to develo
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-25 11:56
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表