Enhancement of Manufacturing Sector Performance with the Application of Industrial Internet of Things (IIoT)
P Chhotaray, BC Behera, BR Moharana… - … Systems and Services, 2024 - taylorfrancis.com
In the modern world, manufacturing has advanced to the point where it is now driven more
by data and intelligence. One way to think about a smart production unit in this day and age …
by data and intelligence. One way to think about a smart production unit in this day and age …
Supply chain integration in manufacturing: a comparative review of USA and African industries
IO Okoduwa, BI Ashiwaju, OF Asuzu… - International Journal of …, 2024 - fepbl.com
Supply chain integration is a critical aspect of modern manufacturing, playing a pivotal role
in enhancing efficiency, reducing costs, and improving overall performance. This paper …
in enhancing efficiency, reducing costs, and improving overall performance. This paper …
End-to-end architectures for data monetization in the Industrial Internet of Things (IIoT) concepts and implementations
CF Strnadl - The Monetization of Technical Data: Innovations from …, 2023 - Springer
The value creation potential of the Internet of Things (IoT), ie connecting arbitrary objects to
the Internet, lies in unlocking and generating value from the approximately 80 zettabytes (1 …
the Internet, lies in unlocking and generating value from the approximately 80 zettabytes (1 …
End-to-End-Architekturen zur Datenmonetarisierung im Industrial Internet of Things (IIoT) Konzepte und Implementierungen
CF Strnadl - … von technischen Daten: Innovationen aus Industrie …, 2021 - Springer
Das Wertschöpfungspotenzial des Internets der Dinge (Internet of Things, IoT), also des
Verbindens arbiträrer Objekte mit dem Internet, liegt im Aufschließen und in der …
Verbindens arbiträrer Objekte mit dem Internet, liegt im Aufschließen und in der …
Minimax Least-Square Policy Iteration for Cost-Aware Defense of Traffic Routing against Unknown Threats
Y Zhan, L Jin - arXiv preprint arXiv:2404.05008, 2024 - arxiv.org
Dynamic routing is one of the representative control scheme in transportation, production
lines, and data transmission. In the modern context of connectivity and autonomy, routing …
lines, and data transmission. In the modern context of connectivity and autonomy, routing …
Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers
In the field of industrial control, edge computing puts forward higher requirements for the
local processing ability of data. The traditional industrial programmable logic controller …
local processing ability of data. The traditional industrial programmable logic controller …
A framework of Internet of Things (IoT) as an ICT strategy to facilitate information and communication sharing in UK universities
The Internet of Things (IoT) has become a growing trend in the current technological
panorama. In Education, the IoT is a vastly developing technologically driven information …
panorama. In Education, the IoT is a vastly developing technologically driven information …
[PDF][PDF] Explainable Intrusion Detection for Internet of Medical Things.
SA Memon, UK Wiil, M Shaikh - KMIS, 2023 - pdfs.semanticscholar.org
IoMT sensors are used for continuous real-time remote monitoring of patients' health
indicators. IoMT integrate several devices to capture sensitive medical data from devices …
indicators. IoMT integrate several devices to capture sensitive medical data from devices …
[图书][B] Three Branch Diversity Systems for Multi-Hop IoT Networks
SA Chowdhury - 2022 - search.proquest.com
Abstract Internet of Things (IoT) is an emerging technological paradigm connecting
numerous smart objects for advanced applications ranging from home automation to …
numerous smart objects for advanced applications ranging from home automation to …
RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system
P Kamakshi, Y Bhavani, A Bhaskar, BK Kumar… - Soft Computing, 2022 - Springer
Abstract Internet of Things (IoT) is a multiple heterogeneous network, and its perception
layer is often faced with various security threats. As the bridge between the perception layer …
layer is often faced with various security threats. As the bridge between the perception layer …