Search

Your search keyword '"Machine to machine"' showing total 1,503 results

Search Constraints

Start Over You searched for: Descriptor "Machine to machine" Remove constraint Descriptor: "Machine to machine"
1,503 results on '"Machine to machine"'

Search Results

2. Integration of MQTT-SN and CoAP protocol for enhanced data communications and resource management in WSNs.

3. Energy-Efficient Deep Neural Networks for EEG Signal Noise Reduction in Next-Generation Green Wireless Networks and Industrial IoT Applications.

4. Radio wave propagation analysis with dominant path model using MIMO antenna element for vehicular base station application.

5. IoTScal-SC2: Two Cloud Computing Systems-Based Collaboration Solution for Scalability Issue in IoT Networks

6. Internet of Things and Cyber-Physical Systems

7. The Effect of Pilot Reuse Factor on Massive MIMO Spectral Efficiency.

8. Home Automation Using Internet of Things: An Extensive Review

9. PDR Indoor Positioning Method Based on M2M Encounter Region

10. Towards green Internet of Things (IoT) for a sustainable future in Gulf Cooperation Council countries: current practices, challenges and future prospective.

11. Energy-Efficient Deep Neural Networks for EEG Signal Noise Reduction in Next-Generation Green Wireless Networks and Industrial IoT Applications

12. Improving Health WSN with Distinguished Cloud Computing for Multi-Sensor Analytics.

13. IoTScal-C: A Based Cloud Computing Collaboration Solution for Scalability Issue in IoT Networks

14. Smarter Pills: Low-Cost Embedded Device to Elders

15. Environmental Energy Harvesting Techniques to Power Standalone IoT-Equipped Sensor and Its Application in 5G Communication

18. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications

19. Wireless Sensor Network Optimization for Multi-Sensor Analytics in Smart Healthcare System.

21. An Enhancement for the Autonomic Middleware-Level Scalability Management Within IoT System Using Cloud Computing

22. Big Data on Machine to Machine Integration’s Requirement Analysis Within Industry 4.0

23. Analysis of Mobile Environment for Ensuring Cyber-Security in IoT-Based Digital Forensics

24. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications.

25. Semantically Enriched Hypermedia APIs for Next Generation IoT

26. A New Monitoring Approach with Cloud Computing for Autonomic Middleware-Level Scalability Management Within IoT Systems

27. An Optimized LTE-Based Technique for Drone Base Station Dynamic 3D Placement and Resource Allocation in Delay-Sensitive M2M Networks

30. Intracluster cooperative communication in smart home scenario through stable election protocol.

31. Automatic Key Update Mechanism for Lightweight M2M Communication and Enhancement of IoT Security: A Case Study of CoAP Using Libcoap Library

32. Food Safety and Sustainability ‒ An Exploratory Approach at the Level of the Romanian Wine Production Companies

33. IEEE 802.11ah 网络能效优化的RAW 适配机制.

34. A Multifunctional Public Lighting Infrastructure, Design and Experimental Test

36. On internet of things education

37. Internet of Things: A General Overview between Architectures, Protocols and Applications

38. Towards energy efficient NB-IoT: A survey on evaluating its suitability for smart applications

39. M2M Potentials in logistics and transportation industry

40. Exploring cybersecurity issues in 5G enabled electric vehicle charging station with deep learning

41. A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions

42. Decades of Internet of Things Towards Twenty-first Century: A Research-Based Introspective

43. A blockchain-based authentication scheme for the machine-to-machine communication of a cyber physical system

47. Internet of Robotic Things: A Review

48. Ultra-Lightweight Block Cipher in Medical Internet of Things for Secure Machine-to-Machine Communication Using FPGA

49. Priority‐based learning automata in Q‐learning random access scheme for cellular M2M communications

50. 3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks

Catalog

Books, media, physical & digital resources