Results 1 to 10 of about 7,267,888 (348)
VentMon: An open source inline ventilator tester and monitor
Humanitarian engineers responded to the pandemic ventilator shortage of March, 2020 by beginning over 100 open source ventilator projects [Robert L. Read et al. COVID-19 Vent List. Oct. 2020.
Robert L. Read +2 more
doaj +1 more source
Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors [PDF]
INTRODUCTION: Recent advances in ubiquitous computing technologies have enabled anywhere, anytimepersonalized services to the museum ubiquitous visitors without any explicit requests.
Preeti Khanwalkar, Pallapa Venkataram
doaj +1 more source
Design and implementation of event-based multicast AODV routing protocol for ubiquitous network
We designed and implemented the ECA (Event Condition Action) based Multicast Ad hoc On-demand Distance Vector (ECA-MAODV) routing protocol for the ubiquitous network. The ECA-MADOV protocol plays a predominant role in selecting an efficient route for the
Chandrashekhar Pomu Chavan +1 more
doaj +1 more source
Organization of Museum Exhibit Information for Ubiquitous Visitors [PDF]
INTRODUCTION: A wide variety and an increasing amount of exhibit information is often overwhelming for the museum ubiquitous visitors. OBJECTIVES: In this work, we propose the organization of museum exhibit information to mitigate ...
Preeti Khanwalkar, Pallapa Venkataram
doaj +1 more source
The formation and stages of development of interstate activities of the Heydar Aliyev Foundation [PDF]
Since the founding of the Heydar Aliyev Foundation in 2004, this institution has been actively involved in large-scale international cultural relations. The purpose of creating this fund was to preserve and popularize the legacy of the national leader of
Zaur S. Ibragimov
doaj +1 more source
Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel +2 more
doaj +1 more source
Multi-access Edge Computing (MEC) has emerged as a novel and efficient technology to enable a new breed of time sensitive applications in the 5G era. By installing small computing infrastructures at the network edges, it solves the current centralized ...
Khasa Gillani, Jong-Hyouk Lee
doaj +1 more source
Blockchain-Based Distributed Firmware Update Architecture for IoT Devices
The Internet of Things (IoT) which creates a hyper-connected society is playing a major role in the 4th industrial revolution. The IoT is being leveraged across various fields of business globally and the number of IoT devices is causing serious security
Seoyun Choi, Jong-Hyouk Lee
doaj +1 more source
DIVDS: Docker Image Vulnerability Diagnostic System
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Soonhong Kwon, Jong-Hyouk Lee
doaj +1 more source
Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira +4 more
doaj +1 more source

