Results 1 to 10 of about 5,059,637 (217)
The formation and stages of development of interstate activities of the Heydar Aliyev Foundation [PDF]
Since the founding of the Heydar Aliyev Foundation in 2004, this institution has been actively involved in large-scale international cultural relations. The purpose of creating this fund was to preserve and popularize the legacy of the national leader of
Zaur S. Ibragimov
doaj +1 more source
Essential Context-derived Reasons Formation from Context Information of Museum Ubiquitous Visitors [PDF]
INTRODUCTION: Recent advances in ubiquitous computing technologies have enabled anywhere, anytimepersonalized services to the museum ubiquitous visitors without any explicit requests.
Preeti Khanwalkar, Pallapa Venkataram
doaj +1 more source
Organization of Museum Exhibit Information for Ubiquitous Visitors [PDF]
INTRODUCTION: A wide variety and an increasing amount of exhibit information is often overwhelming for the museum ubiquitous visitors. OBJECTIVES: In this work, we propose the organization of museum exhibit information to mitigate ...
Preeti Khanwalkar, Pallapa Venkataram
doaj +1 more source
Security Analysis of LNMNT-LightWeight Crypto Hash Function for IoT
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement.
Nubila Nabeel+2 more
doaj +1 more source
Blockchain-Based Distributed Firmware Update Architecture for IoT Devices
The Internet of Things (IoT) which creates a hyper-connected society is playing a major role in the 4th industrial revolution. The IoT is being leveraged across various fields of business globally and the number of IoT devices is causing serious security
Seoyun Choi, Jong-Hyouk Lee
doaj +1 more source
DIVDS: Docker Image Vulnerability Diagnostic System
Since the development of Docker in 2013, container utilization projects have emerged in various fields. Docker has the advantage of being able to quickly share application build environments among developers through container technology, but it does not ...
Soonhong Kwon, Jong-Hyouk Lee
doaj +1 more source
A Theory of Composing Protocols [PDF]
In programming, protocols are everywhere. Protocols describe the pattern of interaction (or communication) between software systems, for example, between a user-space program and the kernel or between a local application and an online service. Ensuring conformance to protocols avoids a significant class of software errors.
arxiv +1 more source
Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs
“Industry 5.0” is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it.
Miguel Oliveira+4 more
doaj +1 more source
Smart Contract-Based Secure Model for Miner Registration and Block Validation
Rewriting-history attacks can erase all valid records of blockchain-based systems, which is extremely devastating. To deter such attacks, we design a new smart contract-based secure model to make such attacks ineffective.
Shijie Zhang, Jong-Hyouk Lee
doaj +1 more source
Optimized Link State Routing Protocol (OLSR)
This document describes the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks. The protocol is an optimization of the classical link state algorithm tailored to the requirements of a mobile wireless LAN.
T. Clausen, P. Jacquet
semanticscholar +1 more source