LEADER 05026nam 22006735 450 001 9910254834203321 005 20251225210907.0 010 $a3-319-60753-7 024 7 $a10.1007/978-3-319-60753-5 035 $a(CKB)3710000001631398 035 $a(DE-He213)978-3-319-60753-5 035 $a(MiAaPQ)EBC5579408 035 $a(PPN)203851307 035 $a(EXLCZ)993710000001631398 100 $a20170818d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIndustrial IoT Technologies and Applications $eSecond EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25?26, 2017, Proceedings /$fedited by Fulong Chen, Yonglong Luo 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVII, 248 p. 131 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v202 311 08$a3-319-60752-9 327 $aBound Analysis for Anchor Selection in Cooperative Localization -- Recharging route scheduling for wireless sensor network through particle swarm optimization -- Tracking movement target by using WebGIS on video surveillance system,- Mobile Attitude Transmission and Aircraft Control Strategies Based on WIFI -- Optimization bottleneck analysis in GPU-based aiming at SAR Imaging -- Research based on data processing technology of Industrial Internet of Things -- An Optimized Clustering Method with Improved Cluster Center for Social Network based on Gravitational Search Algorithm -- Elastic Resource Provisioning System Based on OpenStack Cloud Platform -- Edge affine invariant moment for texture image feature extraction -- Intelligent Private Fitness System based on ARM and Hybrid Internet of Things -- Research and Application of Security and Privacy in Industrial Internet of Things Based on Fingerprint Encryption -- Improved Reversible Data Hiding Scheme Based on AMBTC Compression Technique -- Link-based Privacy-preserving Data Aggregation Scheme in Wireless Sensor Networks -- Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC -- Heterogeneous Component Model for Architecture of Community Medical Internet of Things -- A Novel Grouping-based WSN Clustering Data Transmission Protocol -- An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor Networks -- Study on Electromagnetic Scattering Characteristics of Bodies of Revolution by Compressive Sensing -- An Inside Look at IoT Malware -- Design of OPC/DDP-Based Remote Monitoring System for Environmental Protection of the IoT -- Smart home monitoring system based on SOC -- Improved One-Round Phrase Search Schemes over Symmetrically Encrypted Data in Storage Outsourcing System -- A 0.6-2.4GHz Broadband GaN HEMT Power Amplifier with 79.8% Maximum Drain Efficiency -- Dynamic research on 2-Stage Reluctance Electromagnetic Launcher -- Characteristic, Architecture, Technology, and Design Methodology of Cyber-Physical Systems. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v202 606 $aComputers, Special purpose 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer vision 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aComputer Vision 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer vision. 615 14$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aComputer Vision. 676 $a004 702 $aChen$b Fulong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLuo$b Yonglong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254834203321 996 $aIndustrial IoT technologies and applications$91894608 997 $aUNINA