• No se han encontrado resultados

Internet of the things

Internet of things

Internet of things

... Presentaci?n de PowerPoint Internet of Things Jos? M C?mara 2018 ?IoT? ? What Things of any kind are connected to the Internet ? What for a number of reasons They can be classified ? To provide inform[.] ...

22

Imputation method based on recurrent neural networks for the internet of things

Imputation method based on recurrent neural networks for the internet of things

... results of RNNs across all experiments presented in sections ...in the context of the IoT. Specifically, RNNs were in the top-2 imputation in 83% of the experiments ...

100

Contributions to Communication and Networking for the Internet of Things Environments

Contributions to Communication and Networking for the Internet of Things Environments

... for the IoT. However, on one hand, due to the mobility of many IoT applications, the unexpected node failures, the harsh environment, or the malicious attacks, the ...

203

Interacciones Proxémicas para el Internet de las Cosas Proxemic Interactions for Internet of Things

Interacciones Proxémicas para el Internet de las Cosas Proxemic Interactions for Internet of Things

... in Internet of Things environments, contributing to the construction of proactive, context-aware and human centered ...systems. The use of proxemics dimensions has been ...

88

Semantic middleware development for the Internet of Things

Semantic middleware development for the Internet of Things

... 42 The model put forward by iROS uses application parts which will communicate by using the Event Heap, using tuples as the structure for communication; in addition, if a requested functionality is ...

207

Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

... chain. The museum could have some of the artworks exposed indefinitely and others exposed ...For the temporary exhibition artworks, smart contracts may be used to close the assignment ...

107

Turismo colombiano: propuesta de una aplicación para fomentar el turismo inteligente en el País

Turismo colombiano: propuesta de una aplicación para fomentar el turismo inteligente en el País

... growth of Internet, Social Network Services (SNS) and the utilization of Information Technology (IT) is spreading in tourism ...improve the resources’ administration, this involves ...

5

Development of firmware for intelligent Internet of things enabled devices

Development of firmware for intelligent Internet of things enabled devices

... facilitates the programming and execution of Lua scripts, for the control and conditions on the sensors, as well as any interaction that needs to be carried out on the device ...Also, ...

73

Impact of implementing industry 4 0 in Colombia’s supply chains

Impact of implementing industry 4 0 in Colombia’s supply chains

... that the country has not profited from new ...in the country and companies do not want to revolutionize or branch out into new digital tools ...number of companies that have focused their efforts on ...

11

A Lightweight Anonymous Client-Server Authentication Scheme for the Internet of Things Scenario: LAuth

A Lightweight Anonymous Client-Server Authentication Scheme for the Internet of Things Scenario: LAuth

... protecting the privacy of the clients. In the healthcare environment, an adversary can eavesdrop the information flow and find out which patient’s data is being ...transmitted. ...

21

Modelos emergentes para el desarrollo de aplicaciones móviles sociales: people as a service y social devices. Prueba de concepto.

Modelos emergentes para el desarrollo de aplicaciones móviles sociales: people as a service y social devices. Prueba de concepto.

... profiles of their owners to create communication between interested ...implements the PeaaS concept, taking advantage the devices are almost always with the user it creates a new kind ...

128

Evaluation of Feature Extraction Techniques for an Internet of Things Electroencephalogram

Evaluation of Feature Extraction Techniques for an Internet of Things Electroencephalogram

... terms of execution time, memory usage and power consumption on a microcontroller ...result of an extensive research, it was found that there are many feature extraction techniques that use filters, FFT or ...

98

APLICACIÓN DE BLOCKCHAIN PARA LA SEGURIDAD DE LOS DATOS DEL INTERNET OF THINGS

APLICACIÓN DE BLOCKCHAIN PARA LA SEGURIDAD DE LOS DATOS DEL INTERNET OF THINGS

... —The internet of things has had an exponential growth those last ...However, the adoption of IoT has been threatened by different own problems of this ...in the ...

76

Autonomous Management of Internet of Things Technologies

Autonomous Management of Internet of Things Technologies

... measure the amount of different patterns that each anomaly ...show the number of patterns that were generated for the first, second, third and fourth execution of the ...

208

Internet of Things demonstrator based on the OpenMote platform

Internet of Things demonstrator based on the OpenMote platform

... • The application of IoT to home environments goes beyond monitoring and controlling comfort ...to the fact that precise information can be collected in a periodic and consistent manner, advanced ...

90

IntegraDos: facilitating the adoption of the Internet of Things through the integration of technologies

IntegraDos: facilitating the adoption of the Internet of Things through the integration of technologies

... Some of these alternative mechanisms are Paxos [247], developed by Lamport and Microsoft based on state machine replication; Chubby [248], based on the former and developed by Google, which is defined as a ...

204

Methodology of computer security management for the internet of things

Methodology of computer security management for the internet of things

... de Internet, los dispositivos, y aplicaciones IoT evolucionan en el transcurso del tiempo, por lo que las consideraciones de diseño y seguridad en Hardware y software deben evolucionar ...

13

Contributions to the Resilience Management in the Internet of Things

Contributions to the Resilience Management in the Internet of Things

... directly. The receiver monitors all incoming packets, records the packet transmission failures and then computes the transmission power needed next ...to the sender side. [139] adjusts ...

157

Incorporación de capacidades semánticas al internet de las cosasIncorporating semantic capabilities to the Internet of Things

Incorporación de capacidades semánticas al internet de las cosasIncorporating semantic capabilities to the Internet of Things

... el Internet de las Cosas anteriormente utilizaban la tecnolog´ıa de Identificaci ´on por Radio Frecuencia (Radio-Frequency IDentification, o RFID), propuestas por Auto-ID Labs y EPCglobal (Atzori et ...del ...

120

Applications of blockchain in procurement

Applications of blockchain in procurement

... reduction. The original documents associated with the process: contracts, purchase orders, delivery notes, licenses, insurance, customs papers, delivery records, ...in the platform and are accessible ...

68

Show all 10000 documents...

Related subjects