• No results found

[PDF] Top 20 IoT DDL—Device Description Language for the “T” in IoT

Has 10000 "IoT DDL—Device Description Language for the “T” in IoT" found on our website. Below are the top 20 most common "IoT DDL—Device Description Language for the “T” in IoT".

IoT DDL—Device Description Language for the “T” in IoT

IoT DDL—Device Description Language for the “T” in IoT

... on device descriptions. The Device Description Language (DDL) is a machine- and human-readable XML-based device description approach developed by the Mobile and Pervasive ... See full document

17

Technical Keyword: Raspberry Pi, IOT, AD 8232 ECG Sensor, Matlab, EMB(Empirical Mode Decomposition), GPS.

Technical Keyword: Raspberry Pi, IOT, AD 8232 ECG Sensor, Matlab, EMB(Empirical Mode Decomposition), GPS.

... with IoT knowledge, offer appealing choices for empowering perception and recording of information in home and workplaces, over any longer spans than are right now done at office and research center ... See full document

10

Software Defined Internet of Things (IoT) in 5G Millimeter Wave (mmWave) Communication System

Software Defined Internet of Things (IoT) in 5G Millimeter Wave (mmWave) Communication System

... secure IoT system can use dedicated randomizers for the purpose of 2D interleaving and dynamic interleaving can also be done after generating the message or ...the IoT data. This helps to maintain same ... See full document

8

PCT and IOT in LTE Networks: A Study on Test Cases and Test Results

PCT and IOT in LTE Networks: A Study on Test Cases and Test Results

... The IOT tests that map to ...the description of TS ...the IOT, the security protection parameter does not influence whether the IOT passes or ... See full document

8

A Secure Scheme for Trust Attribute Based Lightweight Authentication (TALA) in IoT Healthcare Environment

A Secure Scheme for Trust Attribute Based Lightweight Authentication (TALA) in IoT Healthcare Environment

... An IoT devices application is vast amount of healthcare system, estimated as accounting for over 30% of its application in all ...of IoT role in traditional approach for healthcare to smart then ... See full document

6

Intelligent Internet of Things (IOT) node demonstrator for device monitoring and control in the oil and gas sector

Intelligent Internet of Things (IOT) node demonstrator for device monitoring and control in the oil and gas sector

... that IoT has different means of communication through which a node can be connected to the ...of IoT. Ahmed and Corey presented an IoT system that successfully used Bluetooth and cloud application, ... See full document

9

IoT objects, the key objective of which is to assign different Security Level Certificates (SLCs) for IoT

IoT objects, the key objective of which is to assign different Security Level Certificates (SLCs) for IoT

... of IoT applications designed specifically to make customers’ life much easier and more productive ...and IoT in general have faced many security and privacy issues, the common example of which are ... See full document

30

Cryptanalysis  of  two  recently  proposed  PUF  based  authentication  protocols  for  IoT:  PHEMAP   and  Salted  PHEMAP

Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP

... The salted PHEMAP scheme provides mutual authentication between a ter- minal node and the respective gateway in a CE-based IoT system. In salted PHEMAP, gateways act as a local verifier for underlying terminal ... See full document

11

Implementation of Flipped Classroom as Element of IoT into Learning Process of Computer Networks Subject in Suleyman Demirel University

Implementation of Flipped Classroom as Element of IoT into Learning Process of Computer Networks Subject in Suleyman Demirel University

... During our research one part of students studied with Flipped Classroom IoT methodology and other by Traditional approach. After getting results of grading we could compare how Flipped Classroom impacted to ... See full document

6

INTERNET OF THINGS - MODELS AND APPLICATIONS

INTERNET OF THINGS - MODELS AND APPLICATIONS

... IOT plays a crucial role in healthcare. It can be used in many ways such as tracking the number of patients in a hospital, identifying the right patient for the right medicine and monitoring a patient’s health ... See full document

7

Semantic Ontology Based IoT-Resource Description

Semantic Ontology Based IoT-Resource Description

... enable IoT ecosystem based customer centric products featuring value added services, efficient resource discovery and exchange of data is need to ...data description interaction techniques in ...in ... See full document

6

Communication Models in Internet of Things: A Survey

Communication Models in Internet of Things: A Survey

... The IOT Protocol Stack, as shown in the Fig 3, from a PHY perspective, the current IEEE ...of IoT applications however will require only a few bits to be ...for IoT because it is latest generation of ... See full document

5

Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments

Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments

... However, Cobb [7] states that DFR sounds like a daunting challenge to many organisations. As a matter of fact, the emergence of the IoT environments has brought about a more complex and heterogeneous environment ... See full document

8

Manuscript Title & Authors

Manuscript Title & Authors

... ABSTRACT: - The advances of emerging technologies have broadened the meaning as well as applications of the Internet. With smart connectivity, physical objects are networked and will gain the ability to communicate with ... See full document

6

A Sleep Scheme Based on MQ Broker Using Subscribe/Publish  in IoT Network

A Sleep Scheme Based on MQ Broker Using Subscribe/Publish in IoT Network

... proposed IoT network where the service provider, IoT middleware, and IoT device are ...with IoT nodes using the CoAP-based communication. The IoT nodes equip one or more units ... See full document

7

E Toll Payment Using Azure Cloud

E Toll Payment Using Azure Cloud

... of IoT devices are likely to be more concerned with the services delivered and implication of using those services than issues of when or where data passes through an IP based ... See full document

6

The roles of internet of things in enabling servitized business model : a systematic literature review

The roles of internet of things in enabling servitized business model : a systematic literature review

... adopts IoT to allow customers to pay for getting access to a product or service in a limited time and allow different users to continue using the product or service when it is available while the provider is ... See full document

11

Light weight security and data provenance for multi hop internet of things

Light weight security and data provenance for multi hop internet of things

... of IoT, a solution to security should be designed which is light-weight and highly ...secured IoT-based information exchange without using extra ...of IoT devices has opened the way for new and ... See full document

5

Towards automated DDoS abuse protection using MUD device profiles

Towards automated DDoS abuse protection using MUD device profiles

... infected IoT devices and used those devices to perform DDoS ...infected device scans the Internet for other vulnerable ...the device using a small list of known usernames and passwords (shipped by ... See full document

56

Implementation of WSN’s Device Addressing, Data Aggregation & Secure Control in IoT Environment

Implementation of WSN’s Device Addressing, Data Aggregation & Secure Control in IoT Environment

... interface device is important for sensor data collection of industrial wireless sensor networks (WSN) in IoT ...the device. Meanwhile, in the Internet of Things (IoT) environment; each sensor ... See full document

7

Show all 10000 documents...