Results 1 to 10 of about 854,368 (249)

Locker Security System using Internet of Things [PDF]

open access: yesE3S Web of Conferences, 2023
As a priority in today's society, security is of highest importance, and safeguarding our properties from intruders is no small task. The main objective of the offenders is to obtain valuable items kept in the locker.
Shruthi CH. M.   +3 more
doaj   +1 more source

End Users' Perspectives on the Quality and Design of mHealth Technologies During the COVID-19 Pandemic in the Philippines: Qualitative Study

open access: yesJMIR Formative Research, 2023
BackgroundThe COVID-19 pandemic has expanded the use of mobile health (mHealth) technologies in contact tracing, communicating COVID-19–related information, and monitoring the health conditions of the general population in the ...
Aldren Gonzales   +3 more
doaj   +1 more source

MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks[Formula: see text].

open access: yesPLoS ONE, 2022
Fast Proxy Mobile IPv6 (FPMIPv6) is an extension of the PMIPv6 mobility management deployed as part of the next-generation internet protocol. It allows location-independent routing of IP datagrams, based on local mobility to IPv6 hosts without ...
Fikadu Degefa   +3 more
doaj   +1 more source

Level of Utilizing New Media in Spreading Security Awareness among Students of Palestinian Universities in the Governorates of Southern Palestine

open access: yesالمجلة العربية لضمان جودة التعليم الجامعي, 2021
The study aimed to identify the degree to which a sample of Palestinian university students in the southern governorates of Palestine appreciated the level of benefits that could be gained from new media in developing their security awareness, and its ...
Dr. Mahmoud A.R. Assaf, Wael M. H. Koraz
doaj   +3 more sources

Twelve years of iPads and apps in schools: What conditions support effective practices in K-6 classrooms?

open access: yesFrontiers in Education, 2023
Since their release in 2010, iPads and their associated apps have been touted as ‘game changers’ for schools struggling with technology provisioning issues, that limited their ability to fully leverage the educational potential of digital devices on a ...
Garry Falloon
doaj   +1 more source

Voice-Based Home Security and SMS Gateway Using Arduino Uno Microcontroller And Passive Infra Red Sensor

open access: yesJournal of Applied Engineering and Technological Science, 2021
The development of advanced Information Technology by greatly improving human thought patterns. This home security problem can be overcome with a security system that can be delivered to homeowners via SMS notification (Short Message Service) compilation
Yuda Irawan   +3 more
doaj   +1 more source

MoLaBSS: Server-Specific Add-On Biometric Security Layer Model to Enhance the Usage of Biometrics

open access: yesInformation, 2020
With high-paced growth in biometrics, and its easy availability to capture various biometric features, it is emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security.
Bhanu Singh, Nirvisha Singh
doaj   +1 more source

Transceiver Design for Full-Duplex UAV Based Zero-Padded OFDM System With Physical Layer Security

open access: yesIEEE Access, 2021
In this paper, multi-antenna transceiver for zero-padded orthogonal frequency division multiplexing (OFDM) system is designed at mmWave by integrating full-duplex unmanned aerial vehicle (UAV) into the terrestrial cellular networks.
Joarder Jafor Sadique   +5 more
doaj   +1 more source

Security Education and Awareness for K-6 Going Mobile

open access: yesInternational Journal of Interactive Mobile Technologies (iJIM), 2016
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important field has greater chances to be more fruitful when the learner is properly motivated.
Filippos Giannakas   +3 more
openaire   +3 more sources

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy