[PDF][PDF] FLOOD MITIGATION AND LAND RECLAMATION IN HILLY RIVERSA CASE STUDY OF TOORSA RIVER, BHUTAN

RR Patra, GN Paudyal, H Enggrob… - DHI Water and …, 2006 - academia.edu
The rivers flowing in hilly terrain are generally flashy in nature and most often achieve
supercritical flow. These rivers after emerging from the foot hills behave completely differently. The …

基于NB-IOT 的智能路灯控制系统设计与实现

张宁 - 2019 - ir.lzu.edu.cn
… , resource conservation and system security, the system combines Web terminal, wireless
communication technology, Internet of things technology and traditional street lamps to …

[PDF][PDF] 阁EasyChair Preprint

SB Bharath, D Chandrasekaran, MS Minu - 2020 - easychair.org
… software applications that resides in the hardware part, called the universal integrated circuit
card (UICC). H) SEAF - Security Anchor Function The Security Anchor Function (SEAF) is in …

基于信息-物理-社会-思维融合空间的物联网科学技术体系研究

HS Ning, H Liu - Science China Information Sciences, 2015 - Springer
… between physical objects and cyber entities. The space-time interaction patterns particularly
influence the scattered, pervasive context-embedded networked physical objects [23]. In the …

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… model to achieve data privacy based on secure multiparty computation and trusted hardware.
However, their solution did not consider TEE nodes and the security of TEE itself, leaving it …

[PDF][PDF] 阁EasyChair Preprint

K Al-Handali, Z Al-Sharafi, Z Al-Hamadi - 2022 - easychair.org
… It is by connecting the unconnected that we transition from the Internet to the Internet of
Things (IoT). IoT (Internet of Things) is an advanced automation and analytics system which …

[图书][B] 5GtoB 如何使能千行百业

孙鹏飞 - 2021 - books.google.com
… within the‘Internet of Things’that connects embedded semi-conductors across a wide array
of machines.They also invest heavily in data security, including the security advantage of their …

基于窄带物联网的养殖塘水质监测系统研制.

宦娟, 吴帆, 曹伟建, 李慧… - Transactions of the …, 2019 - search.ebscohost.com
… The system specially designs terminal sensor nodes, background control module, monitoring
application software and hardware. The functions of data storage and remote collection of …

[PDF][PDF] Bluetooth® 智能转Wi-Fi® 物联网网关

TI Designs - ti.com.cn
… The integrated hardware solution comprises the CC3200 Wi-Fi wireless MCU and the
CC2650 Wireless MCU on a single board. Customers may reuse the reference design to design …

大数据安全保障关键技术分析综述

王丹, 赵文兵, 丁治明 - 北京工业大学学报, 2017 - journal.bjut.edu.cn
… with lots of security risks in the procedure of collection,storage,transmission and application,this
paper analyzes the security threats in big data's life cycle,summarizes the security critical …