Web‐cloud architecture levels and optimized MQTT and COAP protocol suites for web of things (Englisch)
- Neue Suche nach: Prabhu Kumar, P.C.
- Neue Suche nach: Geetha, G.
- Neue Suche nach: Prabhu Kumar, P.C.
- Neue Suche nach: Geetha, G.
In:
Concurrency and Computation: Practice and Experience
;
31
, 12
;
2019
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Web‐cloud architecture levels and optimized MQTT and COAP protocol suites for web of things
-
Beteiligte:Prabhu Kumar, P.C. ( Autor:in ) / Geetha, G. ( Autor:in )
-
Erschienen in:
-
Verlag:
-
Erscheinungsdatum:25.06.2019
-
Format / Umfang:1 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 31, Ausgabe 12
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Theoretical and experimental study on the astigmatism self‐compensation in multi‐disk laser resonator based on exhaustive methodDu, Jinyu / Yi, Jiayu / Yang, Zhongming / Yu, Yi / Tu, Bo / An, Xiangchao et al. | 2019
-
Energy efficient low‐power full‐adder by 65 nm CMOS technology in ALUN, Suresh Kumar / K, Paramasivam et al. | 2019
-
Removal of salt and pepper noise from images using hybrid filter (HF) and fuzzy logic noise detector (FLND)Senthil Selvi, A. / Sukumar, R. et al. | 2019
-
Effect of hole on sound absorption coefficient of micro‐perforated panels investigated by Melling computingWang, Kun / Wang, Wei / Yan, Xiong et al. | 2019
-
An efficient CBIR system based on color histogram, edge, and texture featuresSundara Vadivel, P. / Yuvaraj, D. / Navaneetha Krishnan, S. / Mathusudhanan, S.R. et al. | 2019
-
Tracking control with event‐triggered strategy for multi‐agent systems with noisesTang, Zhaojun / Li, Chuandong et al. | 2019
-
C2C interaction quality identification with SVM based on Kano modelLiu, Yaqin / Luo, XinXing et al. | 2019
-
Analysis of an optimal PMU configuration method based on incomplete observationYang, Fan / Yan, Limei / Xu, Jianjun / Li, Hongyu et al. | 2019
-
Hierarchical group key management for secure data sharing in a cloud‐based environmentVelumadhava Rao, R. / Selvamani, K. / Kanimozhi, S. / Kannan, A. et al. | 2019
-
Strong authentication framework using statistical approach for cloud environmentsSubramanian, Nalini / Andrews, J. et al. | 2019
-
A robust recommended system based on attack detectionYang, Qin et al. | 2019
-
Study of single event transient induced by heavy‐ion in NMOS transistor and CMOS inverterGao, Cheng / Zhang, Rui / Huang, Jiaoying / Fu, Chengcheng et al. | 2019
-
An efficient method to resolve intraclass variability using highly refined HOG description model for human action recognitionK, Akila / S, Chitrakala et al. | 2019
-
Online and automatic identification of encryption network behaviors in big data environmentHejun, Zhu / Liehuang, Zhu et al. | 2019
-
Highly secure palmprint based biometric template using fuzzy vaultSujitha, V. / Chitra, D. et al. | 2019
-
Channel load based interference‐aware scheduling in military communication environmentVignesh, V. / Premalatha, K. et al. | 2019
-
Distinguish computer generated and digital images: A CNN solutionHe, Ming et al. | 2019
-
Distance variety preserving hashing for large‐scale retrievalZhai, Sheping et al. | 2019
-
The dynamics behaviors of Chay neuron model under different parametersKaijun, Wu / Chao, Yu / Dicong, Wang et al. | 2019
-
Collaborating visual tracker based on particle filter and correlation filterLi, Weiguang / Wei, Wang / Qiang, Han / Shi, Mingquan et al. | 2019
-
A PCA and Mahalanobis distance‐based detection method for logical hardware TrojanHuang, Jiaoying / Yang, Daming / Gao, Cheng / Fu, Chengcheng et al. | 2019
-
Model updating and variability analysis of modal parameters for super high‐rise structureYe, Xijun / Chen, Bingcong et al. | 2019
-
Secured and anonymous data transmission in Manet environment using zone‐based intrusion detection systemSoms, Nisha / Malathi, P. et al. | 2019
-
An improved prediction algorithm of seamless tubing corrosion based on an extension neural networkWang, Ti‐chun / Tong, Chang‐sheng / Yao, Sheng‐hu et al. | 2019
-
Secure cloud‐based e‐learning system with access control and group key mechanismKanimozhi, S. / Kannan, A. / Suganya Devi, K. / Selvamani, K et al. | 2019
-
Design and implementation of intelligent energy control for tariff management using multi‐agent system in smart/micro gridSatheesh Kumar, G.S. / Nagarajan, C. et al. | 2019
-
Issue Information| 2019
-
A random chemical reaction optimization algorithm based on dual containers strategy for multi‐rotor UAV path planning in transmission line inspectionYang, Qing / Yang, Zhong / Zhang, Tianyi / Hu, Guoxiong et al. | 2019
-
A high‐performance maintenance strategy for stochastic selective maintenanceZhao, Jing / Liu, Jianqi / Zhao, Zhenting / Xin, Miao / Chen, Yu et al. | 2019
-
Fog assisted IoT based medical cyber system for cardiovascular diseases affected patientsKarthick, T / Manikandan, M et al. | 2019
-
Research on parallel solution of GRAPES Helmholtz equationLi, Jingmei / Tian, Qiao / Zheng, Fangyuan / Wu, Weifei / Wang, Jiaxiang et al. | 2019
-
An efficient RSA cryptosystem by applying cuckoo search optimization algorithmRaja shree, S. / Chilambu Chelvan, A. / Rajesh, M. et al. | 2019
-
Web‐cloud architecture levels and optimized MQTT and COAP protocol suites for web of thingsPrabhu Kumar, P.C. / Geetha, G. et al. | 2019