Results 1 to 10 of about 7,267,888 (348)

VentMon: An open source inline ventilator tester and monitor

open access: yesHardwareX, 2021
Humanitarian engineers responded to the pandemic ventilator shortage of March, 2020 by beginning over 100 open source ventilator projects [Robert L. Read et al. COVID-19 Vent List. Oct. 2020.
Robert L. Read   +2 more
doaj   +1 more source

Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors [PDF]

open access: yesEAI Endorsed Transactions on Context-aware Systems and Applications, 2020
INTRODUCTION: Recent advances in ubiquitous computing technologies have enabled anywhere, anytimepersonalized services to the museum ubiquitous visitors without any explicit requests.
Preeti Khanwalkar, Pallapa Venkataram
doaj   +1 more source

Design and implementation of event-based multicast AODV routing protocol for ubiquitous network

open access: yesArray, 2022
We designed and implemented the ECA (Event Condition Action) based Multicast Ad hoc On-demand Distance Vector (ECA-MAODV) routing protocol for the ubiquitous network. The ECA-MADOV protocol plays a predominant role in selecting an efficient route for the
Chandrashekhar Pomu Chavan   +1 more
doaj   +1 more source

Organization of Museum Exhibit Information for Ubiquitous Visitors [PDF]

open access: yesEAI Endorsed Transactions on Creative Technologies, 2020
INTRODUCTION: A wide variety and an increasing amount of exhibit information is often overwhelming for the museum ubiquitous visitors. OBJECTIVES: In this work, we propose the organization of museum exhibit information to mitigate ...
Preeti Khanwalkar, Pallapa Venkataram
doaj   +1 more source

The formation and stages of development of interstate activities of the Heydar Aliyev Foundation [PDF]

open access: yesSocioEconomic Challenges, 2022
Since the founding of the Heydar Aliyev Foundation in 2004, this institution has been actively involved in large-scale international cultural relations. The purpose of creating this fund was to preserve and popularize the legacy of the national leader of
Zaur S. Ibragimov
doaj   +1 more source

Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT

open access: yesIEEE Access, 2021
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel   +2 more
doaj   +1 more source

Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing

open access: yesICT Express, 2020
Multi-access Edge Computing (MEC) has emerged as a novel and efficient technology to enable a new breed of time sensitive applications in the 5G era. By installing small computing infrastructures at the network edges, it solves the current centralized ...
Khasa Gillani, Jong-Hyouk Lee
doaj   +1 more source

Blockchain-Based Distributed Firmware Update Architecture for IoT Devices

open access: yesIEEE Access, 2020
The Internet of Things (IoT) which creates a hyper-connected society is playing a major role in the 4th industrial revolution. The IoT is being leveraged across various fields of business globally and the number of IoT devices is causing serious security
Seoyun Choi, Jong-Hyouk Lee
doaj   +1 more source

DIVDS: Docker Image Vulnerability Diagnostic System

open access: yesIEEE Access, 2020
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Soonhong Kwon, Jong-Hyouk Lee
doaj   +1 more source

Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs

open access: yesSensors, 2023
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy