|
|
|
Qurban A Memon
Pág. pp. 222 - 230
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Mo...
ver más
|
|
|
|
|
|
|
Clement Agbeboaye,France O. Akpojedje,Joshua Okoekhian
There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection...
ver más
|
|
|
|
|
|
|
Herschel Knapp and Sanjog Pangarkar
Background: In 2011, the Veterans Health Administration (VHA) consulted with the Project ECHO (Extension for Community Healthcare Outcomes) team at the University of New Mexico, Albuquerque, to reproduce their successful model within the VHA. Methods: Th...
ver más
|
|
|
|
|
|
|
Håkon Gunleifsen, Vasileios Gkioulos and Thomas Kemmerich
This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted li...
ver más
|
|
|
|
|
|
|
Håkon Gunleifsen, Vasileios Gkioulos and Thomas Kemmerich
This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted li...
ver más
|
|
|
|
|
|
|
Markus Hager,Sebastian Schellenberg,Jochen Seitz,Sebastian Mann,Gunar Schorcht
Pág. 9 - 17
The scenario of smart home services will be discussed with regard to two important aspects: the quality of service problem for the in-house communication and the need for a security scheme for the whole system. We focus on an installa...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Meskerem Million Abdo,Mequanent Muche Amera
This study was conducted in Manna woreda which is found in Jimma zone at a distance of 368 km south west of Addis Ababa and 24 km west of Jimma town. The objective of the study was to identify the determinants of household food insecurity in rural ...
ver más
|
|
|
|
|
|
|
Charles Wheelus and Xingquan Zhu
The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical world. Driven by the IoT, with each passing day...
ver más
|
|
|
|
|
|
|
Kristen W. Carlson
Artificial general intelligence (AGI) progression metrics indicate AGI will occur within decades. No proof exists that AGI will benefit humans and not harm or eliminate humans. A set of logically distinct conceptual components is proposed that are necess...
ver más
|
|
|
|
|
|
|
Marcin Hojan, Miroslaw Rurek and Adam Krupa
The Polish Baltic Sea coast is subject to constant changes as a result of sea erosion on sandy and clayey sections. Sand accumulates only on a few sandy sections of the shore. There are various methods of protection limiting the negative impact of sea wa...
ver más
|
|
|
|
|
|
|
Stefanos Gogos, Xavier Letellier
Pág. 3218 - 3227
The IT2Rail-?Information Technologies for Shift2Rail? project is a first step towards the long term IP4 -?IT Solutions for Attractive Railway Services?, one of the Shift2Rail Joint Undertaking's Innovation Programmes, which aims at providing a new seamle...
ver más
|
|
|
|