Results 11 to 20 of about 854,368 (249)
Dual-Tier Cluster-Based Routing in Mobile Wireless Sensor Network for IoT Application
Mobile wireless sensor network (MWSN) technology is a fundamental element of the Internet of Things (IoT) in which hundreds to thousands of sensor nodes (SNs) are connected via wireless channels capable of providing a digital interface to real-life ...
Maha Ebrahim Al-Sadoon +2 more
doaj +1 more source
Securing route optimisation in NEMO [PDF]
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks. 4-6 April 2005. Riva del Garda, Trentino, ItalyThe network mobility (NEMO) basic support protocol enables mobile networks to change their point of ...
Bagnulo Braun, Marcelo Gabriel +3 more
core +3 more sources
Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks
Mobile wireless sensor networks (MWSNs) are a relatively new type of WSN where the sensor nodes are mobile. Compared to static WSNs, MWSNs provide many advantages, but their mobility introduces the problem of frequent reauthentication.
BoSung Kim, JooSeok Song
doaj +1 more source
SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing [PDF]
Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing.
Abolfazli, Saeid +3 more
core +2 more sources
Android Kötücül Yazılım Tespit Sistemleri İncelemesi
Akıllı telefonların hayatımıza girmesiyle birlikte akıllı telefonları kullanan kullanıcı sayısı her geçen gün artarak devam etmektedir. Akıllı telefonların fazla talep görmesindeki neden, insanların bir cihazla istedikleri işleri tek dokunuşla kolaylıkla
Ömer KİRAZ, İbrahim Alper DOĞRU
doaj +4 more sources
3D Face Authentication Software Test Automation
The 3D face authentication has become a hot trend for researchers and developers in the recent years, due to its many advantages over the 2D face recognition feature.
Debdeep Banerjee, Kevin Yu
doaj +1 more source
Enhanced security using multiple paths routine scheme in cloud-MANETs
Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can communicate with each other with no support from ...
Tao Hai +6 more
doaj +1 more source
BackgroundPediatric asthma is the most common chronic respiratory disease of childhood. Caregivers often report lacking knowledge in several aspects of asthma management at home.
Glen Meng, Maliha Jan Ali, Sze Man Tse
doaj +1 more source
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda +2 more
core +2 more sources
Mobile identification: from functional requirements, to testing for interoperability and security [PDF]
The present document provides an analysis of the technical, functional and interoperability requirements for a generic mobile identification solution. The report starts from the findings and discussions held so far in the context of the e-MOBIDIG working
ALESSANDRONI Alessandro, RANA Antonia
core +1 more source

