Showing 1 - 20 results of 4,787 for search '"internet of things"', query time: 0.11s Refine Results
  1. 1
  2. 2

    INTERNET OF THINGS FOR ROBOTIC PROJECTS by Igor Nevliudov, Oleksandr Tsymbal, Artem Bronnikov, Olexandr Mordyk

    Published 2020-09-01
    Subjects: “…technology of the Internet of things…”
    Get full text
    Article
  3. 3
  4. 4

    Intent driven Internet of things by Jiaming ZHANG, Chungang YANG, Lei PANG, Jiandong LI

    Published 2019-09-01
    Subjects: “…intent driven Internet of things…”
    Get full text
    Article
  5. 5

    Survey on the search of Internet of Things by Yun-quan GAO, Xiao-yong LI, Bin-xing FANG

    Published 2015-12-01
    Subjects: “…Internet of things…”
    Get full text
    Article
  6. 6
  7. 7

    THE IMPACT OF INTERNET-OF-THINGS IN HIGHER EDUCATION by Logica BANICA, Emil BURTESCU, Florentina ENESCU

    Published 2017-07-01
    Subjects: “…Internet-of-Things…”
    Get full text
    Article
  8. 8

    Coding technology of passive internet of things by Yibing YANG, Rongtao XU, Xia CHEN, Gongpu WANG, Bo AI

    Published 2023-09-01
    Subjects: “…passive internet of things;backscatter;coding…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    Subjects: “…information system;internet of things;industry development…”
    Get full text
    Article
  14. 14

    Coding technology of passive internet of things by Yibing YANG, Rongtao XU, Xia CHEN, Gongpu WANG, Bo AI

    Published 2023-09-01
    Subjects: “…passive internet of things…”
    Get full text
    Article
  15. 15
  16. 16

    Research of authentication techniques for the Internet of things by Hongqiang YAN, Linjie WANG

    Published 2020-07-01
    “…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
    Get full text
    Article
  17. 17

    Who owns Internet of Thing devices? by Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun

    Published 2018-11-01
    “…Although Internet of Things (IoT) has been recently receiving attention from the research community, undoubtedly, there still exists several privacy concerns about those devices. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    THE PROFIT OPPORTUNITIES ON THE INTERNET OF THINGS MARKET by A. Zubarev

    Published 2017-06-01
    Subjects: “…internet of things…”
    Get full text
    Article