iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Devices
جزئیات خدمات ترجمه در ترجمه تخصصی
grid
power
power
power
voltage
voltage
sensor
Connecting Mobile Things to Global Sensor Network Middleware using System-generated Wrappers
smartphone
sensor
Philips
your
1 Introduction Wireless Fidelity (Wi-Fi) networks allow users with wireless-capable devices to access
Electronics 2012, 1, 23-31; doi:10.3390/electronics1010023
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
Building Ultra-Low-Power Low-Frequency
Building Ultra-Low-Power Low-Frequency
Building Ultra-Low-Power Low-Frequency
Case Study
a service architecture model is needed to transform the existing
Chapter 1
Chapter 1
A. Sleman and R. Moeller: SOA Distributed Operating System for Managing Embedded Devices in Home and Building Automation 945
صفحه 6 تا 10
s upcoming Android L update will do away with passwords
Int. J. Human-Computer Studies 72 (2014) 100–110
a service architecture model is needed to transform the existing
a service architecture model is needed to transform the existing
Contactless Payment Technology Options
Baseband Processing for SDR Many technologies require substantial research and
provides both data and control channels and handles up to
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
population on earth has crossed 7 billions and is still
(semiconductor devices)
NAT devices are required to log events like creation and
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
are configured with private network addresses that are translated to
A Game Theoretic Resource Allocation for Overall Energy
Haag−Cummings: © The McGraw−Hill
Solid-State Electronics 84 (2013) 38–45
Haag−Cummings: © The McGraw−Hill
Haag−Cummings: © The McGraw−Hill
The Critical Security Controls
A control system is a device or set of d eus vied ces to manage, command, dire,c or t
Computer
Case Study
6.1 Introduction ........................................................................6-1
This situation arose due to the rapid expansion of the
Design and simulation of an a-Si:H/GaAs Heterojunction Bipolar Transistor
University of Nebraska - Lincoln
Challenges and open research problems of the WSN solutions for
Using Six Sigma to Improve Complaints Handling
Chapter 2
Available online at www.sciencedirect.com
H.Takaoetal./SensorsandActuatorsA119(2005)468–475 469
H.Takaoetal./SensorsandActuatorsA119(2005)468–475 469
H.Takaoetal./SensorsandActuatorsA119(2005)468–475 469
468–475 469
ELSEVIER
USA Abstract This tutorial lecture focuses on the fundamental mechanistic
Available online at www.sciencedirect.com
Introduction There are inherent vulnerabilities in the networking of computers
2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control 2012 Second International Conference on Instrumentation & Measurement, Computer, Communication and Control
2014 Conference on Information Assurance and Cyber Security (CIACS)
2014 Conference on Information Assurance and Cyber Security (CIACS)
safe energy storage devices to meet the various design and
CHAPTER
CHAPTER
.. no -STR,h=10%
.. no -STR,h=10%
devices. Section II highlights the characteristics of the main spectrum currently available to IMT systems through the
�.
()
Available online at www.sciencedirect.com
Ionics 10 (2004) 231
CAMPOLO1 LAYOUT_Layout 1 4/29/13 1:09 PM Page 158
Ionics 10 (2004) 231
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
With an explosive growth of the mobile applications and emerging
With an explosive growth of the mobileapplications and emerging
Mobile photo sharingservice enables mobile users to upload images
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
Accepted in Wireless Communications and Mobile Computing - Wiley
Wafer-Level Test
CHAPTER – 1
The Home Needs an Operating System (and an App Store)
- - = - -' J-leJj VrH (2)
and media have put the network at the center of
The shift from physical presentation to digital delivery is putting
iStuff: A Physical User Interface Toolkit
280 6 Mobile Commerce and Ubiquitous Computing
Mobile C ommer c e and Ubiquitous
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
Mobile C ommer c e and Ubiquitous
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
Applied Energy 134 (2014) 114–124
Rev. Confirming Pages
w
w w
w w
w w
w w
اینترنت اشیا
w w
اینترنت اشیا
اینترنت اشیا - قسمت اول
Chapter
Journal of Crystal Growth 379 (2013) 99–110
ARTICLE IN PRESS
is usually used to refer to the internal storage locations
D.-M. Han and J.-H. Lim: Smart Home Energy Management System using IEEE 802.15.4 and ZigBee 1403
you could require one of two types of vehicle tracking
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Internet of things
FraunhoFer research InstItutIon For
ISSN 2039-2117 (online) Mediterranean Journal of Social Sciences Vol 6 No 1 S3
nokia
ffi rs.indd 01:50:14:PM 02/28/2014 Page ii ™
REVIEW ARTICLE
Simulations of molecular logic gates
method to purge the device which might cause COD fail- power at high temperature due to the reduction of the
A modeling and simulation framework for mobile
Performance evaluation of remote display access for mobile cloud
424 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 6, SEPTEMBER 2011
Available online at www.sciencedirect.com
INTERNATIONAL JOURNAL OF PRECISION ENGINEERING AND MANUFACTURING Vol. 12, No. 6, pp. 1129-1141 DECEMBER 2011 / 1129
Big tech companies back Samsung in court case against Apple
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
2015 29th International Conference on Advanced Information Networking and Applications Workshops
Model-Driven Product-Line Architectures for
Wireless Netw (2014) 20:1295–1311
Internet of Things - Wikipedia, the free encyclopedia Page 1 of 14
4 Design architecture of MSNP platform MSNP system architecture is
OPEN Toward air-stable multilayer
| |
by using engineering principles to exert spatiotemporal control over drug
This article was downloaded by: [Memorial University of Newfoundland]
This article was downloaded by: [Memorial University of Newfoundland]
GModel
GModel
Operation of synchronous generator LOE protection in the presence of
A computer can store or handle any data even if
A computer can store or handle any data even if
STEPHEN BROWN
STEPHEN BROWN
STEPHEN BROWN
STEPHEN BROWN
STEPHEN BROWN
The Internet of Things allows objects to be sensed and
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 61
IMM-07141;NoofPages11
Absorbing knowledge from supply-chain, industry and science: The distinct
Absorbing knowledge from supply-chain, industry and science: The distinct
UNIT 1
Energyefficiencyofmobileclientsincloudcomputing
NurseEducationToday34(2014)775–782
TM
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
In ubiquitous computing environments, realizing a vision of
3
Automate with the leading
Machina Research
We’re driving
Check UPS If you are like many environments in that
AMTSO Guidelines on Mobile Testing
Business Horizons (2015) 58, 431—440
179 million from Samsung for patent infringement payoff Earlier this
A Game Theoretic Software Framework for
CHAPTER 16 Multiple Sclerosis 751
W H I T E PA P E R
Preface
Defi nitions
4 Maintenance programme planning
4 Maintenance programme planning
Preface
Defi nitions
Cloud-IO: Cloud Computing Platform
Cloud-IO: Cloud Computing Platform
Internet of Things:
Internet of Things:
Internet of Things:
2015 12th International Multi-Conference on Systems, Signals & Devices
and network connectivity that enables these objects to collect and
It is an integration of wireless sensor network with mobile
A Survey of Commercial Frameworks for
IJCST V o l . 4, ISSue 1, J a n - M a r C h 2013 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)
Electrical Power and Energy Systems 77 (2016) 33–42
Electrical Power and Energy Systems 77 (2016) 33–42
Electrical Power and Energy Systems 77 (2016) 33–42
UNDER PEER REVIEW
International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012
UNDER PEER REVIEW
UNDER PEER REVIEW
UNDER PEER REVIEW
UNDER PEER REVIEW
International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.4, July 2012
Downloaded form http://iranpaper.ir
The Device Cloud - Applying Cloud Computing
IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 5, OCTOBER 2014 497
Organic-Inorganic Flexible and Transparent Electronics
Organic-Inorganic Flexible and Transparent Electronics
Draft Guidance
26 MICROWAVE FILTER STRUCTURES
A Virtual Machine Monitor Disco is a virtual machine monitor
we have all become increasingly aware of the importance of
Creating the Internet
Six Responsive Web Design Ideas for Designers The emergence of
تاریخچه سیستم اعلام حریقWhat made these developments significant was
Chapter 3
محصولات Linksys
4
4
4
CZASOPISMO INŻYNIERII LĄDOWEJ, ŚRODOWISKA I ARCHITEKTURY
CZASOPISMO INŻYNIERII LĄDOWEJ, ŚRODOWISKA I ARCHITEKTURY
Innventia Heads up the AMPOFORM Project to Manufacture 3D Printed
FutureGenerationComputerSystems29(2013)84–106
providers of these technologies, such as Lloyds and Barclays were able to gain market
A conventional dc plasma torch consists of a tungsten rod
1972 IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 44, NO. 11, NOVEMBER 1997
AUGMENTED REALITY
Available online at www.sciencedirect.com
NFC and Its Application to Mobile Payment:
is primarily used to provide a backup power source to
SCADA SYSTEMS AND SMARTGRID VISION INTRODUCTION As discussed in Chapter
27pm ET The bendable battery could be used in wearable
ARTICLE IN PRESS
International Journal of Control and Automation
International Journal of Control and Automation
Manag Rev Q
This battery heals itself if you break it in half
This battery heals itself if you break it in half
Available online at www.sciencedirect.com
2015 29th International Conference on Advanced Information Networking and Applications Workshops
Chapter 5
Available online at www.sciencedirect.com
IoT Era Theme The enormous popularity of smart phones and
IoT Era Theme The enormous popularity of smart phones and
Open research issues The protection of communications on the IoT
Case study of a modern technology infused courseware for embedded
Ain Shams Engineering Journal (2014) 5, 775–787
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
3
PERSPECTIVEOFHEALTHDATAINTEROPERABILITYONCLOUD-BASEDMEDICAL
This thesis reports on an investigation of the impact of
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Journal of International Technology and Information Management Volume 22, Number 4 2013
VERSION 2.01 1
IEEECOMMUNICATION SURVEYS &TUTORIALS,VOL.17,NO.1,FIRSTQUARTER2015 27
International Journal of Smart Home
Threats Analysis, Requirements and Considerations for Secure Internet of Things
Journal of Luminescence 183 (2017) 26–31
الکترونیک نوری
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 7 2 6 4 1 0 9 2
↓
we connect with some for fractions of a millisecond and
Mobile Marketing › Location and mobile Mobile Marketing › Location and mobile
Edited with the trial version of
managing organizational resources and using them optimally is also an
IBM just posted 5 predictions about what life will be
IoT Standards and Protocols An overview of protocols involved in
02 AM Iran When Steve Jobs unveiled the first iPad
is primarily used to provide a backup power source to
is primarily used to provide a backup power source to
2016 IEEE First International Conference on Internet-of-Things Design and Implementation
Understanding the Internet of Things: definition, potentials, and
KEYWORDS
is primarily used to provide a backup power source to
Journal of Network and Computer Applications xx (xxxx) xxxx–xxxx
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Modeling and Analysis of Molecular Electronic Devices 201
you might be one of the many people eagerly awaiting
Disney Scientists Turned an Entire Metal Room into a Wireless
Overview of price categories Hearing aids prices depend on the
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
SDN and Fog Computing Rapid increase in number and diversity
SDN and Fog Computing Rapid increase in number and diversity
3.3.1 Smart objects/Smart devices
3.3.1 Smart objects/Smart devices
Smart System: loT for University
Journal of Knowledge Management
Journal of Knowledge Management
Available online at www.sciencedirect.com
Downloaded from http://iranpaper.ir
APPLIED PHYSICS LETTERS VOLUME 85, NUMBER 10 6 SEPTEMBER 2004
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 5 7 7 8 6 7 8 9
An Open, Secure and Flexible Platform Based on Internet of Things and Cloud
Simulation Modelling Practice and Theory 73 (2017) 43–54
5 Ripple Effects of Cyber Crime
The year of market revolutionizing hearing aids As 2017 goes
Security Challenges of the Internet
iNTERACTIVE • iNTEGRATED • iNSPIRING
CHAPTER1
A Migration-enhanced Edge Computing Support for
Context awareness
Context awareness
2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference
2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference
2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference
Chapter 1
اینترنت اشیاء
SmartLocks: LessonsforSecuring
Synology combines the features of public and private clouds to
Job Description Service Technician Reporting Line Directly reporting to Country
One of the potential reasons for the growth isIoT technologies
Shancang Li is a Senior Lecturer in Department of Computer
and Storage Technologies The right peripherals can make all the
Now the hegemony of WIMP may be coming to an
Church et al. Journal of Cloud Computing: Advances, Systems and Applications
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 8 2 2 9 3 4 8 7
Cloud collaboration to establish a secure connection for lightweight devices
Networking Fundamentals
Computers & Industrial Engineering 90 (2015) 269–280
Operations Research
The Impact of Artificial Intelligence on Medical Innovation in the
EUROPEAN COMMISSION
10.2 IoT SECURITY OVERVIEW 189
IOT SECURITY 1
2011 Workshops of International Conference on Advanced Information Networking and Applications
Exclusion criteria wereincomplete postoperative medical recordsandocularsurgeries other than glaucoma surgery
IOT SECURITY 1
Until recently the Food and Drug Administration (FDA), which regulates the
Sensitivity Analysis of MEMS Based Piezoresistive
Smart home energy planning using IoT and the cloud
Smart home energy planning using IoT and the cloud
The First IEEE International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, 2016
Journal of Network and Computer Applications 88 (2017) 10–28
Smart home energy planning using IoT and the cloud
The First IEEE International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, 2016
1
Insurance the way we see it
IoTSecurity: Review,BlockchainSolutions,andOpenChallenges
The Device Mesh
Journal of Information Security and Applications 38 (2018) 8–27
Journal of Information Security and Applications 38 (2018) 8–27
US 9,438,440 B2
Computing
OCTA allows us to detect and measure the foveal avascular
OCTA allows us to detect and measure the foveal avascular
Applied Computer Science, vol. 12, no. 3, pp. 37 –46 Submitted: 2016-09-12
Review
Information-Centric Networking for the
Reyrolle
IEEE ELECTRON DEVICE LETTERS, VOL. 35, NO. 7, JULY 2014 711
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
Available online at www.sciencedirect.com
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2767291, IEEE Internet of
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
Mobile Computing The advancement in fog and cloud computing is
fog computing is a distributed computingarchitecture that involves network related
Accepted Manuscript
AcceptedManuscript