Results 1 to 10 of about 5,059,637 (217)

The formation and stages of development of interstate activities of the Heydar Aliyev Foundation [PDF]

open access: yesSocioEconomic Challenges, 2022
Since the founding of the Heydar Aliyev Foundation in 2004, this institution has been actively involved in large-scale international cultural relations. The purpose of creating this fund was to preserve and popularize the legacy of the national leader of
Zaur S. Ibragimov
doaj   +1 more source

Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors [PDF]

open access: yesEAI Endorsed Transactions on Context-aware Systems and Applications, 2020
INTRODUCTION: Recent advances in ubiquitous computing technologies have enabled anywhere, anytimepersonalized services to the museum ubiquitous visitors without any explicit requests.
Preeti Khanwalkar, Pallapa Venkataram
doaj   +1 more source

Organization of Museum Exhibit Information for Ubiquitous Visitors [PDF]

open access: yesEAI Endorsed Transactions on Creative Technologies, 2020
INTRODUCTION: A wide variety and an increasing amount of exhibit information is often overwhelming for the museum ubiquitous visitors. OBJECTIVES: In this work, we propose the organization of museum exhibit information to mitigate ...
Preeti Khanwalkar, Pallapa Venkataram
doaj   +1 more source

Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT

open access: yesIEEE Access, 2021
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel   +2 more
doaj   +1 more source

Blockchain-Based Distributed Firmware Update Architecture for IoT Devices

open access: yesIEEE Access, 2020
The Internet of Things (IoT) which creates a hyper-connected society is playing a major role in the 4th industrial revolution. The IoT is being leveraged across various fields of business globally and the number of IoT devices is causing serious security
Seoyun Choi, Jong-Hyouk Lee
doaj   +1 more source

DIVDS: Docker Image Vulnerability Diagnostic System

open access: yesIEEE Access, 2020
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Soonhong Kwon, Jong-Hyouk Lee
doaj   +1 more source

A Theory of Composing Protocols [PDF]

open access: yesThe Art, Science, and Engineering of Programming, 2023, Vol. 7, Issue 2, Article 6, 2022
In programming, protocols are everywhere. Protocols describe the pattern of interaction (or communication) between software systems, for example, between a user-space program and the kernel or between a local application and an online service. Ensuring conformance to protocols avoids a significant class of software errors.
arxiv   +1 more source

Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs

open access: yesSensors, 2023
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira   +4 more
doaj   +1 more source

Smart Contract-Based Secure Model for Miner Registration and Block Validation

open access: yesIEEE Access, 2019
Rewriting-history attacks can erase all valid records of blockchain-based systems, which is extremely devastating. To deter such attacks, we design a new smart contract-based secure model to make such attacks ineffective.
Shijie Zhang, Jong-Hyouk Lee
doaj   +1 more source

Optimized Link State Routing Protocol (OLSR)

open access: yesRequest for Comments, 2003
This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN.
T. Clausen, P. Jacquet
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy