16   Artículos

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qurban A Memon     Pág. pp. 222 - 230
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Mo... ver más

 
en línea
Meskerem Million Abdo,Mequanent Muche Amera    
This study was conducted in Manna woreda which is found in Jimma zone at a distance of 368 km south west of Addis Ababa and 24 km west of Jimma town. The objective of the study was  to identify the determinants of household food insecurity in rural ... ver más
Revista: Sustainability, Agru, Food and Environmental Research    Formato: Electrónico

 
en línea
Charles Wheelus and Xingquan Zhu    
The recent surge in Internet of Things (IoT) deployment has increased the pace of integration and extended the reach of the Internet from computers, tablets and phones to a myriad of devices in our physical world. Driven by the IoT, with each passing day... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Marcin Hojan, Miroslaw Rurek and Adam Krupa    
The Polish Baltic Sea coast is subject to constant changes as a result of sea erosion on sandy and clayey sections. Sand accumulates only on a few sandy sections of the shore. There are various methods of protection limiting the negative impact of sea wa... ver más
Revista: Geosciences    Formato: Electrónico

 
en línea
Kristen W. Carlson    
Artificial general intelligence (AGI) progression metrics indicate AGI will occur within decades. No proof exists that AGI will benefit humans and not harm or eliminate humans. A set of logically distinct conceptual components is proposed that are necess... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Clement Agbeboaye,France O. Akpojedje,Joshua Okoekhian    
There is a geometric growth in the manufacturing and sales of wireless network devices presently. This growth is not connected with the advantages ushered in by wireless network e.g user mobility, the flexibility of the network, enable network connection... ver más

 
en línea
Håkon Gunleifsen, Vasileios Gkioulos and Thomas Kemmerich    
This article presents an architecture for encryption automation in interconnected Network Function Virtualization (NFV) domains. Current NFV implementations are designed for deployment within trusted domains, where overlay networks with static trusted li... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Stefanos Gogos, Xavier Letellier     Pág. 3218 - 3227
The IT2Rail-?Information Technologies for Shift2Rail? project is a first step towards the long term IP4 -?IT Solutions for Attractive Railway Services?, one of the Shift2Rail Joint Undertaking's Innovation Programmes, which aims at providing a new seamle... ver más
Revista: Transportation Research Procedia    Formato: Electrónico

 
en línea
Herschel Knapp and Sanjog Pangarkar    
Background: In 2011, the Veterans Health Administration (VHA) consulted with the Project ECHO (Extension for Community Healthcare Outcomes) team at the University of New Mexico, Albuquerque, to reproduce their successful model within the VHA. Methods: Th... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »