Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data privacy in the Internet of Things based on anonymization: A review
F Neves, R Souza, J Sousa… - Journal of Computer …, 2023 - journals.sagepub.com
The Internet of Things (IoT) has shown rapid growth in recent years. However, it presents
challenges related to the lack of standardization of communication produced by different …
challenges related to the lack of standardization of communication produced by different …
[HTML][HTML] A performance analysis of internet of things networking protocols: Evaluating MQTT, CoAP, OPC UA
IoT data exchange is supported today by different communication protocols and different
protocolar frameworks, each of which with its own advantages and disadvantages, and often …
protocolar frameworks, each of which with its own advantages and disadvantages, and often …
Design of an IoT energy monitoring system
K Chooruang, K Meekul - 2018 16th International Conference …, 2018 - ieeexplore.ieee.org
In this paper, we design and implement a low-cost IoT energy monitoring system that can be
used in many applications, such as electricity billing system, energy management in smart …
used in many applications, such as electricity billing system, energy management in smart …
Review on challenges for robotic eye surgery; surgical systems, technologies, cost‐effectiveness, and controllers
In recent decades, a number of surgical systems have been developed and are applied for a
growing variety of surgeries. This review will consider the significant challenges of robotic …
growing variety of surgeries. This review will consider the significant challenges of robotic …
Communication protocol stack for constrained IoT systems
Internet of Things (IoT) has gained huge popularity through its rapid advancements and
wide applicability in real world applications that have transformed our lives. Communication …
wide applicability in real world applications that have transformed our lives. Communication …
Choice of application layer protocols for next generation video surveillance using internet of video things
Video surveillance has become ubiquitous due to the increasing security requirements in
every sphere of life. The next generation video surveillance system (VSS) possesses great …
every sphere of life. The next generation video surveillance system (VSS) possesses great …
Messaging protocols for IoT systems—A pragmatic comparison
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new
design is complicated, and a non-optimal selection can result in slower development and …
design is complicated, and a non-optimal selection can result in slower development and …
Implementation and analysis of QUIC for MQTT
Transport and security protocols are essential to ensure reliable and secure communication
between two parties. For IoT applications, these protocols must be lightweight, since IoT …
between two parties. For IoT applications, these protocols must be lightweight, since IoT …
Dm-mqtt: An efficient mqtt based on sdn multicast for massive iot communications
JH Park, HS Kim, WT Kim - Sensors, 2018 - mdpi.com
Edge computing is proposed to solve the problem of centralized cloud computing caused by
a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified …
a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified …
MQTT-topics management system for sharing of open data
N Tantitharanukul, K Osathanunkul… - … on Digital Arts …, 2017 - ieeexplore.ieee.org
At present, the sharing of open data in any city is importance. The shared data, eg, flood
monitoring data, earthquake data, or traffic data, can be used to improve the way of human …
monitoring data, earthquake data, or traffic data, can be used to improve the way of human …