DATA SECURITY, MODELING AND VISUALIZATION OF DATA FROM IOT DEVICES
Аннотация
Ключевые слова
Полный текст:
PDF (English)Литература
LoRa Alliance Homepage, https://lora-alliance.org, last accessed 2022/02/5.
LoRa Semtech Homepage, https://www.semtech.com/lora, last accessed 2022/03/1.
Bankov, D., Khorov, E., Lyakhov, A. (2016) ‘On the Limits of LoRaWAN Channel Access’. Conference: International Conference on Engineering and Telecommunication (EnT). DOI: 10-14. 10.1109/
EnT.2016.011.
Pule, M., Yahy,a A., Chuma, J. (2017) ‘Wireless sensor networks: A survey on monitoring water quality’.
Journal of Applied Research and Technology. V. 15, Issue 6, pp. 562-570
Mekki, K., Bajic, E., Chaxel, F., Meyer, F. (2019) ‘A comparative study of LPWAN technologies for
large-scale IoT deployment.’ ICT Express. V. 5, Issue 1, pp. 1-7.
Duisebekova, K.,Kozhamzharova, D., Rakhmetulayeva, S., Umarov, F., Aitimov, M. (2020). Development of an information-analytical system for the analysis and monitoring of climatic and ecological
changes in the environment, Procedia Computer Science, 170, 578-583. https://doi.org/10.1016/j.
procs.2020.03.128
Myrzakerimova, A., Shaizat, M., Duisebekova, K., Nurmaganbetova, M. (2020). Forecasting risk of
diseases in Kazakhstan with using mapping technique based on 9 years statistics. The 11th International Conference on Ambient Systems, Networks and Technologies (ANT) April 6-9, Warsaw,
Poland. Procedia Computer Science, 170, 75–81. https://doi.org/10.1016/j.procs.2020.03.010
Imankulova, B., Amanzholova, S., Duysebekova, K. (2020). Software and technical aspects of data
collection from end nodes: problems and prospects. Bulletin of AUPET. No 4 (51). 164-172. https://
doi.org/10.51775/1999-9801_2020_51_4_164
The Thing Network (TTN) Homepage, https://www.thethingsnetwork.org, last accessed 2022/03/4.
Butun, I., Pereira, N., & Gidlund, M. (2018, June). Analysis of LoRaWAN v1. 1 security. In Proceedings
of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects
(pp. 1-6). https://doi.org/10.1145/3213299.3213304.
Aras, E., Ramachandran, G.S., Lawrence, P., & Hughes, D. (2017, June). Exploring the security
vulnerabilities of LoRa. In 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) (pp. 1-6).
IEEE. https://doi.org/10.1109/cybconf.2017.7985777
Fearn, R., & Weston, R. P. (1974). Vorticity associated with a jet in a cross flow. AIAA Journal, 12(12),
-1671. https://doi.org/10.2514/3.49576
Andreopoulos, J., & Rodi, W. (1984). Experimental investigation of jets in a crossflow. Journal of Fluid
Mechanics, 138, 93–127.
https://doi.org/10.1017/s0022112084000057
Zavila, O. (2012) ‘Physical Modeling of Gas Pollutant Motion in the Atmosphere’, Advances in Modeling of Fluid Dynamics, Dr. Chaoqun Liu (Ed.), InTech. https://doi.org/10.5772/48405
Denev, J.A., Frohlich, J., & Bockhorn, H. (2007). Direct numerical simulation of a transitional jet in
crossflow with mixing and chemical reactions. In Fifth International Symposium on Turbulence and
Shear Flow Phenomena. Begel House Inc. https://doi.org/10.1615/tsfp5.1940
Falconi, C., Denev, J., Frohlich, J., & Bockhorn, H. (2007). ‚A test case for microreactor flows – a two-dimensional jet in crossflow with chemical reaction’, Internal Report. 2d test case for microreactor
flows.
DOI: http://dx.doi.org/10.37943/ACWT2121
Ссылки
- Ссылки не определены.
(P): 2707-9031
(E): 2707-904X
Articles are open access under the Creative Commons License
Нур-Султан
Бизнес-центр EXPO, блок C.1.
Казахстан, 010000