2021
DOI: 10.13052/jmm1550-4646.1741
|View full text |Cite
|
Sign up to set email alerts
|

Highly Information and Energy-efficient Monitoring Data Transmission in IoT Networks

Abstract: The components of technologies of increasing information and energy efficiency of IoT monitoring networks subscriber systems with protected transfer functioning of reliable packets of information with the increased information capacity are described. In the places of formation of network flows, i.e. in the places of installation of object and on-board systems the realization of a complex of adaptive filtering algorithms, compression and protection of samples of monitoring signals and video data frames with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
2
0
1
Order By: Relevance
“…On this basis, this paper makes a detailed analysis of the dynamic monitoring task of energy big data [12][13][14]. Specifically, it can be divided into several aspects as shown in Table 1.…”
Section: Analysis Of Energy Big Data Monitoring Task Under Double Car...mentioning
confidence: 99%
“…On this basis, this paper makes a detailed analysis of the dynamic monitoring task of energy big data [12][13][14]. Specifically, it can be divided into several aspects as shown in Table 1.…”
Section: Analysis Of Energy Big Data Monitoring Task Under Double Car...mentioning
confidence: 99%
“…However, while cloud computing brings users the benefits of economies of scale, high application and high availability, its virtualization technology, resource sharing, distributed data storage system and other characteristics make it face great threats in security. Shevchuk proposed to establish a user privacy configuration service based on user information protection, which provides users with a user-centered computing model 5 . But this model is based on the premise of collaboration between cloud platform service providers, so that cloud platform service providers can protect private information for users.…”
Section: Introductionmentioning
confidence: 99%
“…Введение. В настоящее время в основе всех известных алгоритмов сжатия видеоданных лежит выполнение двух основных операций [1][2][3][4]: преобразование коррелированных значений яркостей пикселов матрицы изображения в их некоррелированные параметрыкоэффициенты преобразования; кодирование коэффициентов преобразования [5,6].…”
unclassified