Results 21 to 30 of about 854,368 (249)
Middleware Technologies for Cloud of Things - a survey [PDF]
The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future.
Farahbakhsh, Reza +3 more
core +5 more sources
BackgroundThere is increased research interest in the use of mobile phone apps to support diabetes management. However, there are divergent views on what constitute the minimum standards for inclusion in the development of mobile phone apps. Mobile phone
Adu, Mary D +4 more
doaj +1 more source
Augmented PIN Authentication through Behavioral Biometrics
Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel.
Matteo Nerini +2 more
doaj +1 more source
Automatic Objects Removal for Scene Completion [PDF]
With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data ...
Hua, Kun +5 more
core +3 more sources
A Survey on Trend and Classification of Internet of Things Reviews
The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network.
Azana Hafizah Mohd Aman +4 more
doaj +1 more source
Technical challenges for identification in mobile environments [PDF]
This report describes technical challenges and requirements for identification of individuals in mobile (i.e. non-stationary) environments as e.g. required by the ¿European Mobile Identification Interoperability Group¿ (MOBIDIG).
KEUS Klaus, LOESCHNER Jan
core +1 more source
Development of security mechanisms for scada systems in the postquantium period
The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks.
О. В. Воропай +3 more
doaj +1 more source
AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY [PDF]
In recent years, the usage of mobile devices has become essential for people, both for business and for their daily activities. The mobile devices can get services directly from their home network and from other correspondent devices regardless of their ...
SENTHILKUMAR MATHI, M. L. VALARMATHI
doaj
THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core
e-Counterfeit: a mobile-server platform for document counterfeit detection
This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as
Berenguel, Albert +3 more
core +1 more source

