|
|
|
Eric Robitaille, Gabrielle Durette, Marianne Dubé, Olivier Arbour and Marie-Claude Paquette
This study aims to bridge the gap between the potential and realized spatial access to food outlets in rural areas of Québec, Canada. By assessing both aspects, this research aims to provide a comprehensive understanding of the challenges faced by rural ...
ver más
|
|
|
|
|
|
|
Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi and Ahmed Alenezi
Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic system...
ver más
|
|
|
|
|
|
|
Junaid Qadir, Arjuna Sathiaseelan, Umar Bin Farooq, Muhammad Usama, Muhammad Ali Imran and Muhammad Shafique
Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, globa...
ver más
|
|
|
|
|
|
|
Junaid Qadir, Arjuna Sathiaseelan, Umar Bin Farooq, Muhammad Usama, Muhammad Ali Imran and Muhammad Shafique
Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, globa...
ver más
|
|
|
|
|
|
|
Pedro Martínez-Santos, José Antonio Cerván, Beatriz Cano, Silvia Díaz-Alcaide
Pág. 1 - 25
Water and wireless coverage were evaluated in a rural commune of southern Mali. All improved water sources in the area were checked for operability, accessibility, and water quality, while wireless coverage was tested by means of smartphones, phone calls...
ver más
|
|
|
|
|
|
|
V. N. Pakhomov?,L. V. Stribulevich
Pág. 90 - 98
|
|
|
|
|
|
|
Victoria Ann Reich
Some experts portray digital preservation as very expensive and too complicated for communities to do for themselves. They have a lot to gain by perpetrating this message and communities have a lot to lose by taking them at their word. Communities want t...
ver más
|
|
|
|
|
|
|
Stamatios Arkoulis, Giannis F. Marias, Pantelis A. Frangoudis, Jens Oberender, Alexandru Popescu, Markus Fiedler, Hermann de Meer and George C. Polyzos
Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvem...
ver más
|
|
|
|
|
|
|
Vrushti Mawani
Poor access to municipal water in Ahmedabad?s Muslim areas has been tied to the difficulties of implementing a planning mechanism called the town planning scheme, which, in turn, have been premised on widespread illegal constructions that have developed ...
ver más
|
|
|
|
|
|
|
Alessandro Rigolon and Travis L. Flohr
|
|
|
|
|
|
|
Peng Zhai, Jingsha He and Nafei Zhu
The integration of information systems and physical systems is the development trend of today?s manufacturing industry. Intelligent manufacturing is a new model of manufacturing, based on advanced manufacturing technology with human?machine?material coll...
ver más
|
|
|
|
|
|
|
Abrar Almalki, Balakrishna Gokaraju, Nikhil Mehta and Daniel Adrian Doss
Food access is a major key component in food security, as it is every individual?s right to proper access to a nutritious and affordable food supply. Low access to healthy food sources influences people?s diet and activity habits. Guilford County in Nort...
ver más
|
|
|
|
|
|
|
Juyong Lee, Jeong-Weon Kim and Jihoon Lee
The Multi-Access Edge Computing (MEC) paradigm provides a promising solution to solve the resource-insufficiency problem in user mobile devices by offloading computation-intensive and delay-sensitive computing services to nearby edge nodes. However, ther...
ver más
|
|
|
|
|
|
|
Natalya Verzun, Mikhail Kolbanev and Alexey Shamin
One of the important functions of cyberspace is to provide people and devices with access to global infocommunication resources, and as the network infrastructure develops, the number of access options increases, including those based on wireless technol...
ver más
|
|
|
|
|
|
|
Poh Soon JosephNg, Pin Sen BrandonChan and Koo Yuen Phan
Security remains a top priority for those users in the hotel, even with the advent of innovative technological advances. This is because many tragic incidents, such as theft and crime, have occurred with unrestricted access. This paper proposes an intell...
ver más
|
|
|
|
|
|
|
Jamal Ahmed Khan, Muhammad Bilal Khurshid, Arshad Hussain and Asif Azam
Open-access multilane highways have a significant share in the highway network of Pakistan and other developing countries in Asia. These highways have high access density, design inconsistency, and other operational characteristics that differentiate the...
ver más
|
|
|
|
|
|
|
Jinyi Guo, Wei Ren, Yi Ren and Tianqing Zhu
When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by di...
ver más
|
|
|
|
|
|
|
Bassey Okon Ebi,Peter Samuel Ubi
Pág. 290 - 298
In recognition of importance of access to education, national leaders and international development agencies met in 1990 in Jomtien Thailand and committed themselves to universalizing access to primary schooling by 2000. Recognizing that the success of t...
ver más
|
|
|
|
|
|
|
Silvia Díaz-Alcaide, Wennegouda Jean-Pierre Sandwidi, Pedro Martínez-Santos, Miguel Martín-Loeches, José Luis Cáceres and Naomi Seijas
Granting safe water access worldwide is a major objective of the Sustainable Development Goals. Water access is a manifold concept that encompasses collection time, distance from the household, water quality, affordability, and reliability of water sourc...
ver más
|
|
|
|
|
|
|
Dong-Her Shih, Ting-Wei Wu, Ming-Hung Shih, Guan-Wei Chen and David C. Yen
The Industrial Internet of Things (IIoT) plays an important role in Industry 4.0, but the existing IIoT systems could be vulnerable to a single point of failure and malicious attacks, failing to provide reliable services. IIoT devices have some particula...
ver más
|
|
|
|