|
|
|
Maoli Wang, Yu Sun, Hongtao Sun and Bowen Zhang
The Industrial Internet of Things (IIoT), where numerous smart devices associated with sensors, actuators, computers, and people communicate with shared networks, has gained advantages in many fields, such as smart manufacturing, intelligent transportati...
ver más
|
|
|
|
|
|
|
Michael Xevgenis, Dimitrios G. Kogias, Panagiotis A. Karkazis and Helen C. Leligou
Undoubtedly, we are witnessing a new era of computer networks that aspire to support modern demanding applications by providing the highest Quality of Experience (QoE) to the end user. Next Generations Networks (NGNs) ensure that characteristics such as ...
ver más
|
|
|
|
|
|
|
Qiting Zuo, Fuqiang Wang, Jiaqi Zhai, Xiuyu Zhang, Dunxian She, Lei Zou, Rong Gan and Zengliang Luo
|
|
|
|
|
|
|
Emmanuel O.C. Mkpojiogu,Azham Hussain,Monday Onah Agbudu
Pág. pp. 124 - 137
Although, there are several literatures pertaining to the security issues in the use of mobile apps, these literatures do not sufficiently address issues about the security challenges in the use of mobile educational app. Hence, this work attempts to rev...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ...
ver más
|
|
|
|
|
|
|
Hussain Aldawood and Geoffrey Skinner
The idea and perception of good cyber security protection remains at the forefront of many organizations? information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organi...
ver más
|
|
|
|
|
|
|
Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with oth...
ver más
|
|
|
|
|
|
|
Shaukat Ali, Naveed Islam, Azhar Rauf, Ikram Ud Din, Mohsen Guizani and Joel J. P. C. Rodrigues
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with oth...
ver más
|
|
|
|
|
|
|
Julio Moreno, Manuel A. Serrano and Eduardo Fernández-Medina
Data is currently one of the most important assets for companies in every field. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefore, s...
ver más
|
|
|
|
|
|
|
Julio Moreno, Manuel A. Serrano and Eduardo Fernández-Medina
|
|
|
|
|
|
|
Mircea Georgescu,Natalia Suicimezov
Pág. 221 - 226
|
|
|
|
|
|
|
Ralph B. Fritzsch, Neal R. VanZante, Catherine Gaharan
Taxation of Social Security benefits was introduced in 1983 as part of a general restructuring of Social Security. As part of the 1993 Omnibus Budget Reconciliation Act, taxation of benefits was revised and expanded. Inclusion of social security benefits...
ver más
|
|
|
|
|
|
|
Dana Cordell and Stuart White
This paper reviews the latest information and perspectives on global phosphorus scarcity. Phosphorus is essential for food production and modern agriculture currently sources phosphorus fertilizers from finite phosphate rock. The 2008 food and phosphate ...
ver más
|
|
|
|
|
|
|
Aristotelis Glentis, Anastasios Panopoulos, Ilias Kapareliotis
Security is coming more and more in the spotlight of todays news. Several reasons have lead to this, like the maturity of computer technology, which gave access to more people to computer systems, and the evolution of the internet and computer networking...
ver más
|
|
|
|
|
|
|
B. V. Savchynskyi
Pág. 203 - 205
The article generalizes the basic criteria of estimating reliability of metal span structures of railway bridges. Recommendations have been offered for increasing reliability and operational safety of the bridges.
|
|
|
|
|
|
|
Luca Foschini, Valentina Mignardi, Rebecca Montanari and Domenico Scotece
Real-time business practices require huge amounts of data directly from the production assets. This new thirst for accurate and timely data has forced the convergence of the traditionally business-focused information technology (IT) environment with the ...
ver más
|
|
|
|
|
|
|
Eman Ahmed,Amin A. Sorrour,Mohamed A. Sobh,Ayman M. Bahaa-Eldin
Pág. pp. 113 - 127
Malwares are increasing rapidly. The nature of distribution and effects of malwares attacking several applications requires a real-time response. Therefore, a high performance detection platform is required. In this paper, Hadoop is utilized to perform s...
ver más
|
|
|
|
|
|
|
Klaus Solberg Søilen,Anders Hasslinger
This paper is investigating, through a mixed-method research combining interviews and an online survey, how BI vendors differentiate themselves when it comes to application integration, security issues and pricing strategies. The conclusion is that BI ve...
ver más
|
|
|
|
|
|
|
V. Belsky,A. Drynkin,S. Davydov
Pág. 32 - 54
The issues of subscriber?s privacy in mobile phone systems are currently very interesting due to the expected growth of new communication services (virtual reality, MachineType Communications ? MTC, VehicletoEverything ? V2X, Internet of ThingsIoT, e...
ver más
|
|
|
|
|
|
|
V. Belsky,A. Drynkin,S. Davydov
Pág. 32 - 54
The issues of subscriber?s privacy in mobile phone systems are currently very interesting due to the expected growth of new communication services (virtual reality, MachineType Communications ? MTC, VehicletoEverything ? V2X, Internet of ThingsIoT, e...
ver más
|
|
|
|