|
|
|
Javid Misirli and Emiliano Casalicchio
The Internet of Things (IoT) uptake brought a paradigm shift in application deployment. Indeed, IoT applications are not centralized in cloud data centers, but the computation and storage are moved close to the consumers, creating a computing continuum b...
ver más
|
|
|
|
|
|
|
Sairoel Amertet Finecomess, Girma Gebresenbet and Hassan Mohammed Alwan
In an agricultural system, finding suitable watering, pesticides, and soil content to provide the right nutrients for the right plant remains challenging. Plants cannot speak and cannot ask for the food they require. These problems can be addressed by ap...
ver más
|
|
|
|
|
|
|
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali...
ver más
|
|
|
|
|
|
|
Nazre bin Abdul Rashid,Md. Zahar bin Othman,Rasyidi bin Johan,Salman Firdaus bin Hj. Sidek
Pág. pp. 4 - 18
The Computer Networking course commonly taught in mixed mode involving lecture and practical session whereas beside face-to-face theory session, students need to experience hands-on activities in order to appreciate the technology and contents. Neverthel...
ver más
|
|
|
|
|
|
|
Jovana Mihailovic
Pág. 73 - 84
Research Question: This paper investigated business model innovation in telecommunication industry by analysing open business models that operators can implement to innovate and stay competitive in the market. Motivation: The study tends to cover a...
ver más
|
|
|
|
|
|
|
Liping Jiang, Xing Fang and Gang Chen
Cisco (Coregonus artedi) is the most common coldwater stenothermal fish in Minnesota lakes. Water temperature (T) and dissolved oxygen (DO) in lakes are important controls of fish growth and reproduction and likely change with future climate warming. Bui...
ver más
|
|
|
|
|
|
|
María Genoveva Moreira Santos, Pedro Antonio Alcívar Marcillo
Pág. 106 - 112
Hay no hay tecnologías o protocolos completamente seguro en las infraestructuras de red, por esta razón, este documento tiene como objetivo demostrar la importancia de configurar opciones de seguridad en equipos de la red. En esta ocasión nos centraremos...
ver más
|
|
|
|
|
|
|
Michal Maar,Julia Sitarova,Milos Orgon
Pág. 1 - 10
This article presents the software Asterisk PBX solution design in enterprise PLC network (Power Line Communication). The description of the installation and configuration of software Asterisk PBX is involved in the design. The secure interconnection of ...
ver más
|
|
|
|
|
|
|
Liping Jiang and Xing Fang
Fish habitat in lakes is strongly constrained by water temperature (T) and available dissolved oxygen (DO) that are changed under climate warming. A one dimensional, dynamic water quality model MINLAKE2012 was used for T and DO simulation over 48 years. ...
ver más
|
|
|
|
|
|
|
Xing Fang, Liping Jiang, Peter C. Jacobson, Nancy Z. Fang
Pág. Page:444 - 470Abstrac
|
|
|
|