找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Dew Computing; The Sustainable IoT Debashis De,Samarjit Roy Book 2024 The Editor(s) (if applicable) and The Author(s), under exclusive lic

[复制链接]
楼主: Neogamist
发表于 2025-3-25 03:50:38 | 显示全部楼层
发表于 2025-3-25 11:06:45 | 显示全部楼层
发表于 2025-3-25 12:37:50 | 显示全部楼层
Dew as a Service for Intermittently Connected Internet of Drone Thingsre critical for real-time applications like the Internet of Drone Things. The traditional edge-fog-cloud methodology highly relays on strong Internet connectivity. In case of a mission-critical situation like UAV-based surveillance, aerial reconnaissance mission, or disaster management the network c
发表于 2025-3-25 18:41:31 | 显示全部楼层
发表于 2025-3-25 21:20:57 | 显示全部楼层
Internet of Things and Dew Computing-Based System for Smart Agriculturet retail, etc., are various sectors where Internet of Things serves as the principal element. Agriculture is one of the significant sectors of a country that also seeks smart solutions. The use of Internet of Things in agriculture has become popular in the last few years. In this chapter, we discuss
发表于 2025-3-26 01:00:16 | 显示全部楼层
发表于 2025-3-26 05:37:30 | 显示全部楼层
DewMetrics: Demystification of the Dew Computing in Sustainable Internet of Thingsomputing into several existing and sustainable applications, such as the Internet of Things, smart Healthcare, Indoor navigation, agriculture, and numerous human-centric paradigms. The key objective of dew computing is to enhance the efficiency and reduce the cost of personal IoT devices which furth
发表于 2025-3-26 09:58:16 | 显示全部楼层
Security and Privacy Aspects of Authorized and Secure Communications in Dew-Assisted IoT Systemsace over a public channel, many security concerns come into the picture when we use IoT in Dew. Thus, it is required to be focused on authorization in data access, secure session establishment, user privacy to have confidence in the system and data secrecy. As data is not of computing control of clo
发表于 2025-3-26 13:55:43 | 显示全部楼层
DewIDS: Dew Computing for Intrusion Detection System in Edge of Thingsit fails to detect the false alarm, which may create a severe problem. Various types of network attacks like Malware, MITM, Remote Code Execution, etc. in different networks are detected by Intrusion Detection System (IDS) and prevented by Intrusion Prevention System (IPS). At the time of the detect
发表于 2025-3-26 18:35:05 | 显示全部楼层
Dew Computing-Based Sustainable Internet of Vehicular Thingsitecture under the cloud using the Internet of vehicular things (IoVs) in different practical applications such as smart logistic routing, disaster management, etc. Also, dew computing plays a significant role in this situation. This allows the user to access the services, files, and resources when
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 05:34
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表