[引用][C] Performance Monitoring of an IoT Based Framework for Crowd Management

W Alam - 2022 - Department of Electronic and …

[引用][C] Design and Analysis of an IoT Based Framework for Crowd Management

MM Joy - 2022 - Department of Electronic and …

[PDF][PDF] A lightweight mutual authentication scheme for power edge computing system

Y Chen, AD Xu, H Wen, YX Jiang… - Proceedings of the …, 2019 - researchgate.net
Because of heavy cost, using of the traditional Public Key Infrastructure (PKI) authentication
schemes is limited for the energy-constrained intelligent devices such as the power edge …

Engineering Smart Software Services for Intelligent Pervasive Systems

A Sanchez Guinea - 2018 - orbilu.uni.lu
[en] Pervasive computing systems, envisioned as systems that blend with the physical
environment to enhance the quality of life of its users, are rapidly becoming a not so distant …

[PDF][PDF] A Data Authentication Method Based on Vector Projection for Industrial Edge Computing System

Y Chen, A Xu, Y Jiang, Y Zhang, H WEN… - … on Computer Science …, 2019 - researchgate.net
In this paper, we consider a success rate of data authentication for industrial edge
computing system. We propose a data authentication method based on vector projection …

Ranked Rule Based Approach for Sentiment Analysis

PS Rane, RA Khan - 2018 International Conference on Recent …, 2018 - ieeexplore.ieee.org
Today, large population use social networking sites like Facebook, Twitter, LinkedIn etc.
Through social media, people share messages, photos. They also impart information about …

[PDF][PDF] FEEDBACK MANAGEMENT SYSTEM USING IOT

BU Bawankar, PN Fale, MSV Ugale - 2020 - ijrar.org
For efficient and quality improvement of an organization, feedback plays a key role in it. With
a proper feedback mechanism in place, the growth rate of an Organization shows an upward …

Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication

B Usha, F Fathima - Think India Journal, 2019 - thinkindiaquarterly.org
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that
combines with a two-layer model is proposed to realize authentications for a large number of …

[PDF][PDF] A Study on Intelligent Resource Allocation Based on Deep Learning for Internet of Things

F Tang - 2019 - tohoku.repo.nii.ac.jp
Due to the fast increase of sensing data and quick response requirement in the Internet of
Things (IoT), the large amount of network traffic flows and computing tasks become too …

[图书][B] Security Analysis in Device-to-Device Wireless Networks

K Liu - 2019 - search.proquest.com
Abstract Device-to-device (D2D) network has now become a standardized feature in many
mobile devices, by which mobile devices can communicate with each other even when …