Results 21 to 30 of about 854,368 (249)

Middleware Technologies for Cloud of Things - a survey [PDF]

open access: yes, 2017
The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future.
Farahbakhsh, Reza   +3 more
core   +5 more sources

Considerations for the Development of Mobile Phone Apps to Support Diabetes Self-Management: Systematic Review

open access: yesJMIR mHealth and uHealth, 2018
BackgroundThere is increased research interest in the use of mobile phone apps to support diabetes management. However, there are divergent views on what constitute the minimum standards for inclusion in the development of mobile phone apps. Mobile phone
Adu, Mary D   +4 more
doaj   +1 more source

Augmented PIN Authentication through Behavioral Biometrics

open access: yesSensors, 2022
Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel.
Matteo Nerini   +2 more
doaj   +1 more source

Automatic Objects Removal for Scene Completion [PDF]

open access: yes, 2014
With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data ...
Hua, Kun   +5 more
core   +3 more sources

A Survey on Trend and Classification of Internet of Things Reviews

open access: yesIEEE Access, 2020
The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network.
Azana Hafizah Mohd Aman   +4 more
doaj   +1 more source

Technical challenges for identification in mobile environments [PDF]

open access: yes, 2010
This report describes technical challenges and requirements for identification of individuals in mobile (i.e. non-stationary) environments as e.g. required by the ¿European Mobile Identification Interoperability Group¿ (MOBIDIG).
KEUS Klaus, LOESCHNER Jan
core   +1 more source

Development of security mechanisms for scada systems in the postquantium period

open access: yesСистеми обробки інформації, 2022
The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks.
О. В. Воропай   +3 more
doaj   +1 more source

AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
In recent years, the usage of mobile devices has become essential for people, both for business and for their daily activities. The mobile devices can get services directly from their home network and from other correspondent devices regardless of their ...
SENTHILKUMAR MATHI, M. L. VALARMATHI
doaj  

THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]

open access: yes, 2012
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core  

e-Counterfeit: a mobile-server platform for document counterfeit detection

open access: yes, 2017
This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as
Berenguel, Albert   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy