Добірка наукової літератури з теми "Internet Transmission devices"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Internet Transmission devices".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Internet Transmission devices"

1

Dang, Chinh Manh, Vinh Quang Thai, Minh Ngoc Pham, Trung Thanh Dang, Mai Thanh Thi Phung, and Tan Duy Ngo. "The solution of data transmission security for Gateway IoT." Journal of Mining and Earth Sciences 61, no. 2 (April 29, 2020): 58–67. http://dx.doi.org/10.46326/jmes.2020.61(2).07.

Повний текст джерела
Анотація:
We are living in the trend of the Internet of Things (IoT), electronic devices that are capable of connecting and exchanging information with each other via the Internet. For automation, monitoring and control systems, there is a need to upgrade existing systems so that users can remotely monitor via the Internet. The solution is to integrate the Gateway device to transmit and receive data. However, in the Internet environment, the issue of information security and safety always needs attention because of the risk of network attacks and data theft. In this paper, the authors present data security solutions for Gateway IoT devices to ensure information security against eavesdropping or sniffers. The device has been integrated into a landslide monitoring system, which has proven to work, increasing the reliability of the system.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Wu, Tin-Yu, Ren-Hung Hwang, Abhishek Vyas, Chia-Yiu Lin, and Chi-Ruei Huang. "Persistent Periodic Uplink Scheduling Algorithm for Massive NB-IoT Devices." Sensors 22, no. 8 (April 8, 2022): 2875. http://dx.doi.org/10.3390/s22082875.

Повний текст джерела
Анотація:
Narrowband Internet of Things (NB-IoT) is one of the low-power wide-area network (LPWAN) technologies that aim to support enormous connections, featuring wide-area coverage, low power consumption, and low costs. NB-IoT could serve a massive number of IoT devices, but with very limited radio resources. Therefore, how to enable a massive number of IoT devices to transmit messages periodically, and with low latency, according to transmission requirements, has become the most crucial issue of NB-IoT. Moreover, IoT devices are designed to minimize power consumption so that the device battery can last for a long time. Similarly, the NB-IoT system must configure different power-saving mechanisms for different types of devices to prolong their battery lives. In this study, we propose a persistent periodic uplink scheduling algorithm (PPUSA) to assist a plethora of Internet of Things (IoT) devices in reporting their sensing data based on their sensing characteristics. PPUSA explicitly considers the power-saving mode and connection suspend/resume procedures to reduce the IoT device’s power consumption and processing overhead. PPUSA allocates uplink resource units to IoT devices systematically so that it can support the periodic–uplink transmission of a plethora of IoT devices while maintaining low transmission latency for bursty data. The simulation results show that PPUSA can support up to 600,000 IoT devices when the NB-IoT uplink utilization is 80%. In addition, it takes only one millisecond for the transmission of the bursty messages.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kim, Yumi, Mincheol Paik, Bokyeong Kim, Haneul Ko, and Seung-Yeon Kim. "Neighbor-Aware Non-Orthogonal Multiple Access Scheme for Energy Harvesting Internet of Things." Sensors 22, no. 2 (January 7, 2022): 448. http://dx.doi.org/10.3390/s22020448.

Повний текст джерела
Анотація:
In a non-orthogonal multiple access (NOMA) environment, an Internet of Things (IoT) device achieves a high data rate by increasing its transmission power. However, excessively high transmission power can cause an energy outage of an IoT device and have a detrimental effect on the signal-to-interference-plus-noise ratio of neighbor IoT devices. In this paper, we propose a neighbor-aware NOMA scheme (NA-NOMA) where each IoT device determines whether to transmit data to the base station and the transmission power at each time epoch in a distributed manner with the consideration of its energy level and other devices’ transmission powers. To maximize the aggregated data rate of IoT devices while keeping an acceptable average energy outage probability, a constrained stochastic game model is formulated, and the solution of the model is obtained using a best response dynamics-based algorithm. Evaluation results show that NA-NOMA can increase the average data rate up to 22% compared with a probability-based scheme while providing a sufficiently low energy outage probability (e.g., 0.05).
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Geng, Jiang Tao, and Xiao Bo Xiong. "Research on Mobile Information Access Based on Internet of Things." Applied Mechanics and Materials 539 (July 2014): 460–63. http://dx.doi.org/10.4028/www.scientific.net/amm.539.460.

Повний текст джерела
Анотація:
The paper design mobile information collection system based on Internet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and information between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kanehisa, Rodrigo, Felipe Barbosa, and Alberico De Castro. "5G energy efficiency for Internet of Things." Academic Journal on Computing, Engineering and Applied Mathematics 1, no. 2 (June 10, 2020): 14–23. http://dx.doi.org/10.20873/uft.2675-3588.2020.v1n2.p14-23.

Повний текст джерела
Анотація:
The Internet of Things (IoT) consists of devices capable of measuring the environment and executing tasks without human intervention. Due to its size, these devices have restrictions in processing, memory, and battery. These devices can reach a trillion nodes and, therefore, requires network connections that are capable of both handle a large number of nodes connected and low energy transmission. The fifth generation of telecommunications technology (5G) is a key concept to address those requirements as new applications and business models require new criteria such as security trustworthy, ultra-low latency, ultra-reliability, and energy efficiency. Although the next generation of connections is at its early stage, progress has been made to achieve 5G enabled IoT technologies. This paper describes a review of the main technologies such as Cloud, Software Defined Network, device-to-device communication, Evolved Package Core and Network Virtual Function Orchestration that are planned to be applied for both fields of 5G and IoT.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wang, Chen, Jian Shen, Qi Liu, Yongjun Ren, and Tong Li. "A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things." Security and Communication Networks 2018 (2018): 1–7. http://dx.doi.org/10.1155/2018/3680851.

Повний текст джерела
Анотація:
Internet of Things (IoT) is a research field that has been continuously developed and innovated in recent years and is also an important driving force for the improvement of people’s life in the future. There are lots of scenarios in IoT where we need to collaborate through devices to complete tasks; that is, a device sends data to other devices, and other devices operate on the aid of the data. These transmitted data are often users’ privacy data, such as medical data and grid data. We propose an instant encrypted transmission based security scheme for such scenarios in IoT. The analysis in this paper indicates that our scheme can guarantee the security of users’ data while ensuring rapid transmission and acquisition of instant IoT data.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Dang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (February 28, 2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.

Повний текст джерела
Анотація:
Lora Gateway is an intermediary device that can connect devices in the IoT system. IoT is the Internet of Things, consisting of a system of interrelated digital and mechanical devices and machines, capable of transmitting data over a network without requiring human-computer interaction. Lora is a long distance wireless communication technology that enables communication over a wide range between devices. Through this device, the Sensor nodes in the IoT system can transmit and receive data by LoRa waves to the Gateway and by Wifi/3G to the web server via the Internet. Data communicates in the internet environment, so important information needs to be protected by data encryption. This paper presents research and application of 128-bit AES symmetric encryption algorithm in LoRa wide area sensor network to secure data transmission between IoT devices and web server through LoRa Gateway device. The research team has designed and built models for testing sensor stations with integrated humidity and temperature sensors, LoRa Gateway integrating Lora module and wifi/3G module, developing the interface on web server with decoding, monitoring, and data storage features, and proposing a solution with AES encryption algorithm and architecture applied in the development of embedded software for LoRa module. The research results are tested on the model to test the encryption, data transmission, and decryption functions in applications for IoT LoRa Gateway systems. With this initial research, it is possible to apply the AES algorithm to secure data transmission in IoT Gateway systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Burczyk, Robert, Agnieszka Czapiewska, Malgorzata Gajewska, and Slawomir Gajewski. "LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module." Electronics 11, no. 18 (September 13, 2022): 2892. http://dx.doi.org/10.3390/electronics11182892.

Повний текст джерела
Анотація:
Monitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer of performed measurements from many places to the network management center. However, there are still no devices that act as data concentrators, which would integrate many transmission technologies and protocols in one device, supporting the communication between those different transmission technologies and which would realize edge computing to assist the management center by prioritizing and combining transmitted data. In this article, the authors present a device that meets the above-mentioned requirements. There are presented research results leading to the development of a decision algorithm, called Multilink—ML, dedicated to the presented device. This algorithm enables the selection between LTE and NB-IoT interfaces for packet transmission without the need to burden the communication system with additional transmissions.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Vishnyakov, V. A. "Device models and technologies of data transmission and processing in the internet of things networks." «System analysis and applied information science», no. 2 (June 27, 2022): 34–39. http://dx.doi.org/10.21122/2309-4923-2022-2-34-39.

Повний текст джерела
Анотація:
The subject of research is the analysis and definition of the information model of devices, the choice of technologies and protocols for data collection and analysis, routing protocols for the Internet of Things (IoT) networks. The purpose of the article is to create an information model of IoT devices, to define technologies and protocols for data transmission and processing and routing in Internet of Things systems. Building an information model of an IoT device includes identifying data sources and their formats, creating a model and data structure, and analyzing them using tools such as: Eclipse Vorto ThingBoard, Ubodots IoT, Node-Red-UI, freeboard.io . An example of a description of a model of microclimate control devices using the Eclipse Vorto toolkit is given. Two main data processing technologies from IoT devices are considered: IBM Watson IoT, Cisco IWF with examples of their application. Radio frequency, infrared, optical and galvanic technologies for interaction between data collection and data transmission devices in IoT networks with examples of their use are discussed. The areas of application of three main IoT network protocols are considered: MQTT (large corporate networks), CoAP (limited networks on the Internet), Bluetooth Low Energy (local networks without the Internet with a small amount of data).Wi-Fi WebSockets, ZigBee, LoRA, Simple RF, XMPP, RFID, NFC can be used as additional protocols for networks. The features of using routing protocols in IoT networks are discussed: RPL (low power consumption), cognitive RPL (for intelligent networks), CARP (for underwater communication networks), E-CARP (for data reuse).
Стилі APA, Harvard, Vancouver, ISO та ін.
10

MIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.

Повний текст джерела
Анотація:
The Energy Internet has generated huge amounts of information on the production devices, transmission devices, and energy consumption devices. The leakage of data in the collection, transmission, and storage process will cause serious security problems. The existing Energy Internet security methods rely on traditional access control mechanisms and specific network boundary defense mechanisms, which has the limitations of static strategies and coarse design. We combine the advantages of role-based access control (RBAC) and attribute-based access control (ABAC), and propose a trusted Energy Internet fine-grained access control model based on devices' attribute and users' roles. We have not only achieved fine-grained Energy Internet resource allocation, but also ensured that the access control process is related to the security status of the environment in real time. Experimental results show that the access control model can safely and accurately execute access decisions in the Energy Internet scenario, and the processing performance is more stable.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Internet Transmission devices"

1

Mokh, Ali. "Receive and Transmit Spatial Modulation Techniques for Low Complexity Devices." Thesis, Rennes, INSA, 2018. http://www.theses.fr/2018ISAR0020.

Повний текст джерела
Анотація:
L'Internet des objets est l'un des concepts clefs stimulant l'évolution des réseaux mobiles dans le but de leur donner de nouvelles fonctionnalités de communication et de gestion d'objets dits connectés. Comparativement aux terminaux mobiles standards, les usages associés à ces objets connectés sont en général caractérisés par des débits modestes et de faibles ressources en capacité de calcul et en énergie. Les techniques de modulation spatiale (SM) sont proposées comme une solution prometteuse pour assurer les débits des objets connectés tout en maîtrisant le critère de la consommation énergétique. L'objectif de cette thèse est d'étudier les performances de différents schémas de transmission basés sur le concept SM mis en oeuvre en transmission ou en réception. Nous avons notamment proposé un système global de communication en liaisons montante (SM en transmission) et descendante (SM en réception) entre une station de base et un objet, dans lequel l'essentiel de la complexité de calcul est concentré à la station de base. Par ce système, une liaison avec un objet peut être établie en limitant les traitements au sein de l'objet à di simples fonctions d'activation/désactivation d'antenne et de détection à seuil. Par ailleurs, nous avons proposé des schémas SM étendus grâce auxquels l'efficacité spectrale atteignable devient égale au nombre d'antennes au sein de l'objet. Les expressions analytiques de la probabilité d'erreur binaire ont été développées pour l'ensemble des systèmes étudiés en utilisant différentes méthodes de détection. L'impact de la connaissance imparfaite de l'état des canaux de propagation ainsi que l'effet des corrélations entre antennes ont également été incorporés dans l'étude des performances des schémas SM de réception. Dans une dernière partie, nous avons proposé d'adapter les schémas SM de réception dans un environnement de propagation en ondes millimétriques en utilisant une formation de faisceau hybride analogique/numérique au niveau de l'émetteur
Internet of Things is one of the keyword that represents the evolution in 5G that is able to connect the so-called Connected Devices (CD) to the network. These CDs are expected to require modest data rates and will be characterized by low resources in terms of both computation and energy consumption compared to other mobile multi-media devices. Spatial Modulation (SM) is proposed to be a promising solution to boost the data rate of the CD with a small ( or no) increase in energy consumption. Inspired by the advantages of SM, the objective of this thesis is to study the performance of different transmission scheme based on the SM concept at the transmitter and at tht receiver, for respectively an uplink and a downlink transmission between a BS and a CD. We proposed a global system where the higher computational complexity remains at the BS: The transmit SM is used for uplink, and the receive SM for downlink. It is shown that with SM, an ON­OFF keying for uplink and Single Tap detector for downlink could be sufficient for the transmission a the CD. Also, with Extended SM schemes, we increased the spectral efficiency of SM to be equal t< the number of antennas of CD in both uplink and downlink transmission. A framework for the derivation of the Bit Error Probability (BEP) is developed for all schemes with different detection methods. Impact of imperfect CSIT transmission has been studied when linear precoding is implemented for the receive spatial modulation, as well as the effect of antenna correlations. Finally we proposed to adapte the spatial modulation at the receiver with the mmWave environment, using hybrid beamformina at the transmitter
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Jia, Zhensheng. "Optical millimeter-wave signal generation, transmission and processing for symmetric super-broadband optical-wireless access networks." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24640.

Повний текст джерела
Анотація:
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Gee-Kung Chang; Committee Co-Chair: Jianjun Yu; Committee Member: John A. Buck; Committee Member: Joy Laskar; Committee Member: Umakishore Ramachandran; Committee Member: Ye Li
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Mirbozorgi, Seyed Abdollah. "High-performance wireless power and data transfer interface for implantable medical devices." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26209.

Повний текст джерела
Анотація:
D’importants progès ont été réalisés dans le développement des systèmes biomédicaux implantables grâce aux dernières avancées de la microélectronique et des technologies sans fil. Néanmoins, ces appareils restent difficiles à commercialier. Cette situation est due particulièrement à un manque de stratégies de design capable supporter les fonctionnalités exigées, aux limites de miniaturisation, ainsi qu’au manque d’interface sans fil à haut débit fiable et faible puissance capable de connecter les implants et les périphériques externes. Le nombre de sites de stimulation et/ou d’électrodes d’enregistrement retrouvés dans les dernières interfaces cerveau-ordinateur (IMC) ne cesse de croître afin d’augmenter la précision de contrôle, et d’améliorer notre compréhension des fonctions cérébrales. Ce nombre est appelé à atteindre un millier de site à court terme, ce qui exige des débits de données atteingnant facilement les 500 Mbps. Ceci étant dit, ces travaux visent à élaborer de nouvelles stratégies innovantes de conception de dispositifs biomédicaux implantables afin de repousser les limites mentionnées ci-dessus. On présente de nouvelles techniques faible puissance beaucoup plus performantes pour le transfert d’énergie et de données sans fil à haut débit ainsi que l’analyse et la réalisation de ces dernières grâce à des prototypes microélectroniques CMOS. Dans un premier temps, ces travaux exposent notre nouvelle structure multibobine inductive à résonance présentant une puissance sans fil distribuée uniformément pour alimenter des systèmes miniatures d’étude du cerveaux avec des models animaux en ilberté ainsi que des dispositifs médicaux implantbles sans fil qui se caractérisent par une capacité de positionnement libre. La structure propose un lien de résonance multibobines inductive, dont le résonateur principal est constitué d’une multitude de résonateurs identiques disposés dans une matrice de bobines carrées. Ces dernières sont connectées en parallèle afin de réaliser des surfaces de puissance (2D) ainsi qu’une chambre d’alimentation (3D). La chambre proposée utilise deux matrices de résonateurs de base, mises face à face et connectés en parallèle afin d’obtenir une distribution d’énergie uniforme en 3D. Chaque surface comprend neuf bobines superposées, connectées en parallèle et réailsées sur une carte de circuit imprimé deux couches FR4. La chambre dispose d’un mécanisme naturel de localisation de puissance qui facilite sa mise en oeuvre et son fonctionnement. En procédant ainsi, nous évitons la nécessité d’une détection active de l’emplacement de la charge et le contrôle d’alimentation. Notre approche permet à cette surface d’alimentation unique de fournir une efficacité de transfert de puissance (PTE) de 69% et une puissance délivrée à la charge (PDL) de 120 mW, pour une distance de séparation de 4 cm, tandis que le prototype de chambre complet fournit un PTE uniforme de 59% et un PDL de 100 mW en 3D, partout à l’intérieur de la chambre avec un volume de chambre de 27 × 27 × 16 cm3. Une étape critique avant d’utiliser un dispositif implantable chez les humains consiste à vérifier ses fonctionnalités sur des sujets animaux. Par conséquent, la chambre d’énergie sans fil conçue sera utilisée afin de caractériser les performances d’ une interface sans fil de transmisison de données dans un environnement réaliste in vivo avec positionement libre. Un émetteur-récepteur full-duplex (FDT) entièrement intégré qui se caractérise par sa faible puissance est conçu pour réaliser une interfaces bi-directionnelles (stimulation et enregistrement) avec des débits asymétriques: des taux de tramnsmission plus élevés sont nécessaires pour l’enregistrement électrophysiologique multicanal (signaux de liaison montante) alors que les taux moins élevés sont utilisés pour la stimulation (les signaux de liaison descendante). L’émetteur (TX) et le récepteur (RX) se partagent une seule antenne afin de réduire la taille de l’implant. L’émetteur utilise la radio ultra-large bande par impulsions (IR-UWB) basée sur l’approche edge combining et le RX utilise la bande ISM (Industrielle, Scientifique et Médicale) de fréquence central 2.4 GHz et la modulation on-off-keying (OOK). Une bonne isolation (> 20 dB) est obtenue entre le TX et le RX grâce à 1) la mise en forme les impulsions émises dans le spectre UWB non réglementée (3.1-7 GHz), et 2) le filtrage espace-efficace (évitant l’utilisation d’un circulateur ou d’un diplexeur) du spectre du lien de communication descendant directement au niveau de l’ amplificateur à faible bruit (LNA). L’émetteur UWB 3.1-7 GHz utilise un e modultion OOK ainsi qu’une modulation par déplacement de phase (BPSK) à seulement 10.8 pJ / bits. Le FDT proposé permet d’atteindre 500 Mbps de débit de données en lien montant et 100 Mbps de débit de données de lien descendant. Il est entièrement intégré dans un procédé TSMC CMOS 0.18 um standard et possède une taille totale de 0.8 mm2. La consommation totale d’énergie mesurée est de 10.4 mW (5 mW pour RX et 5.4 mW pour TX au taux de 500 Mbps).
In recent years, there has been major progress on implantable biomedical systems that support most of the functionalities of wireless implantable devices. Nevertheless, these devices remain mostly restricted to be commercialized, in part due to weakness of a straightforward design to support the required functionalities, limitation on miniaturization, and lack of a reliable low-power high data rate interface between implants and external devices. This research provides novel strategies on the design of implantable biomedical devices that addresses these limitations by presenting analysis and techniques for wireless power transfer and efficient data transfer. The first part of this research includes our proposed novel resonance-based multicoil inductive power link structure with uniform power distribution to wirelessly power up smart animal research systems and implanted medical devices with high power efficiency and free positioning capability. The proposed structure consists of a multicoil resonance inductive link, which primary resonator array is made of several identical resonators enclosed in a scalable array of overlapping square coils that are connected in parallel and arranged in power surface (2D) and power chamber (3D) configurations. The proposed chamber uses two arrays of primary resonators, facing each other, and connected in parallel to achieve uniform power distribution in 3D. Each surface includes 9 overlapped coils connected in parallel and implemented into two layers of FR4 printed circuit board. The chamber features a natural power localization mechanism, which simplifies its implementation and eases its operation by avoiding the need for active detection of the load location and power control mechanisms. A single power surface based on the proposed approach can provide a power transfer efficiency (PTE) of 69% and a power delivered to the load (PDL) of 120 mW, for a separation distance of 4 cm, whereas the complete chamber prototype provides a uniform PTE of 59% and a PDL of 100 mW in 3D, everywhere inside the chamber with a chamber size of 27×27×16 cm3. The second part of this research includes our proposed novel, fully-integrated, low-power fullduplex transceiver (FDT) to support bi-directional neural interfacing applications (stimulating and recording) with asymmetric data rates: higher rates are required for recording (uplink signals) than stimulation (downlink signals). The transmitter (TX) and receiver (RX) share a single antenna to reduce implant size. The TX uses impulse radio ultra-wide band (IR-UWB) based on an edge combining approach, and the RX uses a novel 2.4-GHz on-off keying (OOK) receiver. Proper isolation (> 20 dB) between the TX and RX path is implemented 1) by shaping the transmitted pulses to fall within the unregulated UWB spectrum (3.1-7 GHz), and 2) by space-efficient filtering (avoiding a circulator or diplexer) of the downlink OOK spectrum in the RX low-noise amplifier (LNA). The UWB 3.1-7 GHz transmitter using OOK and binary phase shift keying (BPSK) modulations at only 10.8 pJ/bit. The proposed FDT provides dual band 500 Mbps TX uplink data rate and 100 Mbps RX downlink data rate. It is fully integrated on standard TSMC 0.18 nm CMOS within a total size of 0.8 mm2. The total power consumption measured 10.4 mW (5 mW for RX and 5.4 mW for TX at the rate of 500 Mbps).
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Koh, Jin Hou. "Simulation modeling and analysis of device-aware network architectures." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FKoh.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Internet Transmission devices"

1

Nathan, Yocom, and ebrary Inc, eds. Learning FreeNAS: Configure and manage a network attached storage solution. Birmingham, U.K: Packt Publishing Ltd., 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

SAE Gasketing Standards Committee., ed. Additional guidelines for internal combustion engine gaskets--liquid sealing. Warrendale, PA: Society of Autmotive Engineers, 1993.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Singh, Indrasen. Device-to-Device Communication and NOMA. Edited by Niraj Pratap Singh. Glasstree, 2018. http://dx.doi.org/10.20850/9781534204447.

Повний текст джерела
Анотація:
Device-to-Device (D2D) Communication and Non Orthogonal Multiple Access (NOMA) have become topics of interest for researchers. They are widely recognized as techniques of the next generation cellular wireless networks. D2D technique offers uninterrupted communication among proximate mobile users without transferring data to the base station. This can provide high data rates and power control mechanisms. If D2D direct link distance is more, or the quality of channel is poor then the direct D2D communication gives larger propagation losses. This type of scenarios use relay assisted D2D communication, for improving the transmission capacity and coverage. Where as NOMA ) is one of the many technologies that promise greater capacity gain and spectral efficiency than the present state of the art, and is a candidate technology for 5G cellular networks In this book, fundamentals, state of the art, applications and research challenges of D2D and NOMA have been discussed in simple language
Стилі APA, Harvard, Vancouver, ISO та ін.
4

SAE Gasket Subcommittee., ed. Gasket and joint design manual for engine and transmission systems. [Warrendale, PA: Society of Automotive Engineers, 1988.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Internet Transmission devices"

1

Gelenbe, Erol, Mert Nakıp, Dariusz Marek, and Tadeusz Czachorski. "Mitigating the Massive Access Problem in the Internet of Things." In Communications in Computer and Information Science, 118–32. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09357-9_10.

Повний текст джерела
Анотація:
AbstractThe traffic from the large number of IoT devices connected to the IoT is a source of congestion known as the Massive Access Problem (MAP), that results in packet losses, delays and missed deadlines for real-time data. This paper reviews the literature on MAP and summarizes recent results on two approaches that have been designed to mitigate MAP. One approach is based on randomizing the packet arrival instants to IoT gateways within a given time interval that is chosen so that packet arrivals do not exceed their deadlines, but also so that they do not constitute bulk arrivals. The second approach is a novel traffic shaping policy named the Quasi-Deterministic-Transmission-Policy (QDTP) which has been proved to drastically reduce queue formation at the receiving gateway by delaying packet departures from the IoT devices in a judicious manner. Both analytical and experimental results are summarized, that describe the benefits of these techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Curran, Kevin, and Elaine Smyth. "Security Issues with Wi-Fi Networks." In Encyclopedia of Internet Technologies and Applications, 498–504. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch070.

Повний текст джерела
Анотація:
On the surface, WLANs act the same as their wired counterparts, transporting data between network devices. However, there is one fundamental, and quite significant, difference: WLANs are based upon radio communications technology as an alternative to structured wiring and cables. Data is transmitted between devices through the air by utilizing radio waves. Devices that participate in a WLAN must have a network interface card (NIC) with wireless capabilities. This essentially means that the card contains a small radio device that allows it to communicate with other wireless devices within the defined range for that card, for example, the 2.4-2.4853 GHz range. For a device to participate in a wireless network, it must firs be permitted to communicate with the devices in that network and, second, it must be within the transmission range of the devices in that network. To communicate, radio-based devices take advantage of electromagnetic waves and their ability to be altered in such a manner that they can carry information, known as modulation (Vines, 2002). Here we discuss wireless security mechanisms.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Pessoa, Cláudio Roberto Malhães, Cássio Luis Batista, and Marco Elisio Marques. "Internet of Things and Internet of All Things." In Advances in Business Information Systems and Analytics, 186–203. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6225-2.ch009.

Повний текст джерела
Анотація:
Interaction between devices, systems, and services is provided in internet through a new concept: internet of everything (IoE). This new concept should present numerous opportunities for the creation of new devices and applications in the years that follow and can dramatically affect the day-to-day life of all of us. New possibilities of information access, transmission, analysis, and interaction are practically infinity. With so many benefits, it is expected to come with several challenges. System structure and architecture and information confidentiality, integrity, and availability are aspects that someone should keep in mind to design an IoE application. This chapter offers to the reader an overview of the evolution of devices connectivity until it reaches the IoE. Some IoE concepts and applications, together with some challenges, are presented.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Debnath, Pampa, and Arpan Deyasi. "Transmission Line and Its Implementation." In Contemporary Developments in High-Frequency Photonic Devices, 39–55. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8531-2.ch003.

Повний текст джерела
Анотація:
In unbounded media, wave propagation is supposed to be unguided. The existence of uniform plane wave is considered to be all through the space. Electromagnetic energy related with the wave stretched over a broad area. In TV and radio broadcasting, unbounded medium propagation of the wave is required. Here transmission of information is destined for one and all who may be interested. Another way of transmitting information is by guided media. Guided media acts to direct the transmission of energy from transmitter to receiver. Transmission lines are usually used in low frequency power distribution and in high frequency communications as well as in the ethernet and internet in computer networks. Two or more parallel conductors may be used to construct a transmission line, which connects source to a load. Typical transmission lines consist of coaxial line, waveguide, microstrip line, coplanar waveguide, etc. In this chapter, problems related with transmission lines are solved with the help of EM field theory and electric circuit theory.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gupta, Deena Nath, Rajendra Kumar, and Ashwani Kumar. "Efficient Encryption Techniques for Data Transmission Through the Internet of Things Devices." In IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, 203–28. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2570-8.ch011.

Повний текст джерела
Анотація:
A secure environment is needed to communicate without any information leakage. From large devices having UPS to small devices having a battery, the parameter about security changes over time. Researchers need to work in three basics of security: (1) Mutual authentication between devices, (2) Strong encryption methodology for transmission, and (3) Secure storage environment with anytime availability. The IoT-enabled devices demand a lightweight secure environment. In this chapter, authors are concerning on all three points, i.e. Mutual authentication between devices, Strong encryption methodology for transmission, and Secure storage environment with anytime availability. Authors study some of the methods related to lightweight mutual authentication, lightweight cryptography, and local storage techniques; will talk about different issues in the field of secure communication, secure transmission, and secure storage; and will try to find out some research gap with a possible countermeasure.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Dhasarathan, Chandramohan, Shanmugam M., Shailesh Pancham Khapre, Alok Kumar Shukla, and Achyut Shankar. "Blockchain-Enabled Decentralized Reliable Smart Industrial Internet of Things (BCIIoT)." In Advances in Computer and Electrical Engineering, 192–204. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3375-8.ch013.

Повний текст джерела
Анотація:
The development of wireless communication in the information technological era, collecting data, and transfering it from unmanned systems or devices could be monitored by any application while it is online. Direct and aliveness of countless wireless devices in a cluster of the medium could legitimate unwanted users to interrupt easily in an information flow. It would lead to data loss and security breach. Many traditional algorithms are effectively contributed to the support of cryptography-based encryption to ensure the user's data security. IoT devices with limited transmission power constraints have to communicate with the base station, and the data collected from the zones would need optimal transmission power. There is a need for a machine learning-based algorithm or optimization algorithm to maximize data transfer in a secure and safe transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sardar, Bhaskar, and Debashis Saha. "TCP Enhancements for Mobile Internet." In Encyclopedia of Internet Technologies and Applications, 619–25. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch087.

Повний текст джерела
Анотація:
Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet, was originally designed for wired networks, where bit error rate (BER) is low and congestion is the primary cause of packet loss. Since mobile access networks are prone to substantial noncongestive losses due to high BER, host motion and handoff mechanisms, they often disturb the traffic control mechanisms in TCP. So the research literature abounds in various TCP enhancements to make it survive in the mobile Internet environment, where mobile devices face temporary and unannounced loss of network connectivity when they move. Mobility of devices causes varying, increased delays and packet losses. TCP incorrectly interprets these delays and losses as sign of network congestion and invokes unnecessary control mechanisms, causing degradation in the end-to-end good put rate. This chapter provides an in-depth survey of various TCP enhancements which aim to redress the above issues and hence are specifically targeted for the mobile Internet applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sardar, Bhaskar, and Debashis Saha. "TCP Enhancements for Mobile Internet." In Mobile Computing, 488–96. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch041.

Повний текст джерела
Анотація:
Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet, was originally designed for wired networks, where bit error rate (BER) is low and congestion is the primary cause of packet loss. Since mobile access networks are prone to substantial noncongestive losses due to high BER, host motion and handoff mechanisms, they often disturb the traffic control mechanisms in TCP. So the research literature abounds in various TCP enhancements to make it survive in the mobile Internet environment, where mobile devices face temporary and unannounced loss of network connectivity when they move. Mobility of devices causes varying, increased delays and packet losses. TCP incorrectly interprets these delays and losses as sign of network congestion and invokes unnecessary control mechanisms, causing degradation in the end-to-end goodput rate. This chapter provides an in-depth survey of various TCP enhancements which aim to redress the above issues and hence are specifically targeted for the mobile Internet applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

"OTDM-WDM System Components Modeling." In Optical Transmission and Networks for Next Generation Internet Traffic Highways, 197–244. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6575-0.ch009.

Повний текст джерела
Анотація:
The purpose of this chapter is to discuss OTDM-WDM system components modeling.Any attempt to model the OTDM-WDM system components would need to take into account a number of key issues that have to be decided upon before a particular system setup can be implemented. Among the key issues are signal modulation format, OTDM channel bit rate, WDM channel bit rate, spectral density, length of transmission, amplification scheme, dispersion management scheme, and optical devices. Further, throughout the chapter, examples are used to demonstrate how OTDM-WDM devices, such as the transmitter, multiplexer, optical fiber, filter, amplifier, demultiplexer, and receiver, are modeled.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kesavan, Selvaraj, Senthilkumar J., Suresh Y., and Mohanraj V. "IoT Device Onboarding, Monitoring, and Management." In Advances in Web Technologies and Engineering, 227–55. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3111-2.ch013.

Повний текст джерела
Анотація:
In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Internet Transmission devices"

1

She, Changyang, Chenyang Yang, and Tony Q. S. Quek. "Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet." In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 2016. http://dx.doi.org/10.1109/glocomw.2016.7849072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lim, Sung-Hwa, Jungsup Oh, Byoung-Hoon Lee, and Mye Sohn. "Threshold-Based Energy-Efficient Data Transmission Policy for Mobile Devices." In 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2012. http://dx.doi.org/10.1109/imis.2012.43.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Chung, Myoungbeom. "One-to-Many Data Transmission for Smart Devices at Close Range." In 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2016. http://dx.doi.org/10.1109/iotdi.2015.15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Jamieson, David N. "Single atom quantum devices by ion lithography for information processing and transmission." In 2007 the Joint International Conference on Optical Internet (COIN) and Australian Conference on Optical Fibre Technology (ACOFT). IEEE, 2007. http://dx.doi.org/10.1109/coinacoft.2007.4519079.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

McGinthy, Jason M., and Alan J. Michaels. "Semi-Coherent Transmission Security for Low Power IoT Devices." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00059.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Adegbija, Tosiron, Anita Rogacs, Chandrakant Patel, and Ann Gordon-Ross. "Enabling Right-Provisioned Microprocessor Architectures for the Internet of Things." In ASME 2015 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/imece2015-50173.

Повний текст джерела
Анотація:
The Internet of Things (IoT) consists of embedded low-power devices that collect and transmit data to centralized head nodes that process and analyze the data, and drive actions. The proliferation of these connected low-power devices will result in a data explosion that will significantly increase data transmission costs with respect to energy consumed and latency. Edge computing performs computations at the edge nodes prior to data transmission to interpret and/or utilize the data, thus reducing transmission costs. In this work, we seek to understand the interactions between IoT applications’ execution characteristics (e.g., compute/memory intensity, cache miss rates, etc.) and the edge nodes’ microarchitectural characteristics (e.g., clock frequency, memory capacity, etc.) for efficient and effective edge computing. Thus, we present a broad and tractable IoT application classification methodology and using this classification, we analyze the microarchitectural characteristics of a wide range of state-of-the-art embedded system microprocessors and evaluate the microprocessors’ applicability to IoT computation using various evaluation metrics. We also investigate and quantify the impact of leakage power reduction on the overall energy consumption across different architectures. Our work provides insights into the microarchitectural characteristics’ impact on system performance and efficiency for various IoT application requirements. Our work also provides a foundation for the analysis and design of a diverse set of microprocessor architectures for IoT edge computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Prates Junior, Nelson Gonçalves, Andressa Vergutz, Ricardo Tombesi Macedo, and Michele Nogueira. "Análise de Vazamentos Temporais Side-Channel no Contexto da Internet das Coisas." In XXIV Workshop de Gerência e Operação de Redes e Serviços. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/wgrs.2019.7690.

Повний текст джерела
Анотація:
The Internet of Things (IoT) emerged because of the technologicalevolution of wireless sensor networks, which enabled these sensors to integrate with common objects. These objects are equipped with sensors and actuatorscollect data from users and the environment, process them, and transform theminto useful information. By allowing the transmission of restricted / personaldata, communication traffic between devices becomes an interesting target forattackers who either access or manipulate them. However, even with cryptographic data, side-channel attacks exploit the characteristics of devices forthe purpose of acquiring information that may compromise the security of thenetwork structure. This work presents a way of characterizing the identical IoT dispositives by only exploring the time information. It carried the activitiesout such as structuring an experimental scenario, collecting traffic, extractingstatistical characteristics and finally identifying the dispositives. The results show we can identify even identical devices with up to 100% of accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yang, Hao, Chun Zhao, Nana Shen, Wenzheng Liu, and Lin Zhang. "Modeling and Model-Driven of Holonomic System Based on MBSE: a Case of Internet of Things Platform." In ASME 2022 17th International Manufacturing Science and Engineering Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/msec2022-85135.

Повний текст джерела
Анотація:
Abstract By integrating the Internet of Things, artificial intelligence, 5G, and other new-generation electronic information technologies, the fourth industrial Revolution represented by intelligent manufacturing and industrial internet is promoted, which is the era of comprehensive intelligent industry 4.0. As a key technology of the industrial Internet, the Internet of Things (IoT) connects intelligent manufacturing complex systems and machines with built-in sensors to the network for real-time data collection, transmission, processing, and feedback, to optimize device management and production efficiency. With the increasing number and variety of IoT devices, improving the scalability and maintainability of IoT systems is a challenging demand and requires continuous efforts. This paper proposes an architecture of IoT platform based on Model-Based Systems Engineering (MBSE). In this architecture, a modeling method based on Integrated Modeling language and a model-driven method for cloud-edge collaboration platform is further proposed. The standardization, readability, and reusability of the model are used to drive the device expansion and management. The characteristics of interaction behaviours between cloud and edges are extracted, and models of Holonomic System are built by an integrated modeling language, called X language. Block Definition Diagram (BDD) of X language is used to build the static models of IoT devices and drive the platform to manage the devices. State Machine Diagram (SMD) of X language is used to build the dynamic models of process between the edges and cloud, and drive the processes of the platform. Through experiments and analysis, the feasibility and effectiveness of the X-Language-driven IoT platform are verified.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ching, Ho, and Wayne J. Book. "Human Evaluation of Internet-Based Bilateral Teleoperation Using Wave Variables With Adaptive Predictor and Direct Drift Control." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14721.

Повний текст джерела
Анотація:
In a conventional bilateral teleoperation, transmission delay over the Internet can potentially cause instability. The wave variables algorithm can solve this problem at the cost of poor transient response. The wave variables algorithm with adaptive predictor and drift control based on our previous work [24] has been proposed to provide stability under time delay with improved performance. The effectiveness of this algorithm is fully evaluated using human subjects with no previous experience in haptics. Three algorithms are tested using Phantom haptic devices as master and slave: conventional bilateral teleoperation with no transmission delay as control, wave variables with 200-300 ms transmission delay one way, and wave variables with adaptive predictor and direct drift control (WAPD) also with 200-300 ms delay one way. For each algorithm the human subjects are asked to perform three simple tasks: free space trajectory tracking, surface contour identification, and maze navigation. The results show WAPD to be superior to regular wave variables algorithm with higher subject ratings.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Dudnik, Andriy, Ivan Bakhov, Olha Cholyshkina, Andriy Fesenko, Olexander Grinenko, Volodymyr Brodkevych, and Serhii Zybin. "Cognitive Positioning Technologies for IoT Network Devices." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001847.

Повний текст джерела
Анотація:
Nowadays, wireless technologies are increasingly being used for human needs. Increasingly, technologies are emerging that are used by people not only for the need to transfer data. One of these technologies is the Internet of Things, which often uses wireless sensors with ZigBee data transmission technology as end devices.There are areas that require deployment of these networks on the territory, a large number of sensors are required, which must with sufficient accuracy “know” their position on the deployment area. Usually, devices with built-in GPS modules are used for this, but devices containing this module are significantly more expensive than without it. And if in a large distributed network with many segments, more than 1000 such devices are required, then a device with a GPS module can only be at most one for each segment. Therefore, if this is a forest where there are many thousands of trees and it is necessary to monitor fires at the initial stage, which take place in many US states in the summer, then the cognitive task of teaching those devices, that do not contain a GPS module, to determine their position is relevant. This paper proposes a mathematical formulation of the cognitive task of learning to determine the coordinates of devices in wireless sensor networks. The study of the mathematical model has been carried out. The purpose of these studies was to find new alternative teaching methods for determining the distance between objects of IoT sensor networks, using the function of localizing objects where an emergency occurred.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії