Results 1 to 10 of about 854,368 (249)
Locker Security System using Internet of Things [PDF]
As a priority in today's society, security is of highest importance, and safeguarding our properties from intruders is no small task. The main objective of the offenders is to obtain valuable items kept in the locker.
Shruthi CH. M. +3 more
doaj +1 more source
BackgroundThe COVID-19 pandemic has expanded the use of mobile health (mHealth) technologies in contact tracing, communicating COVID-19–related information, and monitoring the health conditions of the general population in the ...
Aldren Gonzales +3 more
doaj +1 more source
Fast Proxy Mobile IPv6 (FPMIPv6) is an extension of the PMIPv6 mobility management deployed as part of the next-generation internet protocol. It allows location-independent routing of IP datagrams, based on local mobility to IPv6 hosts without ...
Fikadu Degefa +3 more
doaj +1 more source
The study aimed to identify the degree to which a sample of Palestinian university students in the southern governorates of Palestine appreciated the level of benefits that could be gained from new media in developing their security awareness, and its ...
Dr. Mahmoud A.R. Assaf, Wael M. H. Koraz
doaj +3 more sources
Since their release in 2010, iPads and their associated apps have been touted as ‘game changers’ for schools struggling with technology provisioning issues, that limited their ability to fully leverage the educational potential of digital devices on a ...
Garry Falloon
doaj +1 more source
The development of advanced Information Technology by greatly improving human thought patterns. This home security problem can be overcome with a security system that can be delivered to homeowners via SMS notification (Short Message Service) compilation
Yuda Irawan +3 more
doaj +1 more source
MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security.
Bhanu Singh, Nirvisha Singh
doaj +1 more source
Transceiver Design for Full-Duplex UAV Based Zero-Padded OFDM System With Physical Layer Security
In this paper, multi-antenna transceiver for zero-padded orthogonal frequency division multiplexing (OFDM) system is designed at mmWave by integrating full-duplex unmanned aerial vehicle (UAV) into the terrestrial cellular networks.
Joarder Jafor Sadique +5 more
doaj +1 more source
Security Education and Awareness for K-6 Going Mobile
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important field has greater chances to be more fruitful when the learner is properly motivated.
Filippos Giannakas +3 more
openaire +3 more sources
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia +2 more
core +2 more sources

