|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Changwei Xiao, Chunxia Liu and Yuechen Li
The study of the two-way information flow between cities is of great significance to promote regional coordinated development, but the current mainstream non-directional network analysis method cannot analyze it effectively. In this paper, the quantities...
ver más
|
|
|
|
|
|
|
Benchalak Muangmeesri and Kittipol Wisaeng
The Internet is becoming increasingly important in our daily lives, allowing people to exchange and receive a wide variety of data. It can be utilized in a variety of ways for maximum benefit. For example, the concept of the Internet of Things (IoT) sugg...
ver más
|
|
|
|
|
|
|
Michael Alicea and Izzat Alsmadi
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Yun Zhang and Enzhong Xu
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems. Named Dat...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ...
ver más
|
|
|
|
|
|
|
Leslie Ching Ow Tiong, Yunli Lee and Andrew Beng Jin Teoh
The proposed periocular biometric network can apply to any application that requires identity management, such as homeland security, border controls, access control, criminal investigation, etc.
|
|
|
|
|
|
|
Hisham Elzain and Yang Wu
Wireless Mesh Networks (WMNs), have a potential offering relatively stable Internet broadband access. The rapid development and growth of WMNs attract ISPs to support users? coverage anywhere anytime. To achieve this goal network architecture must be add...
ver más
|
|
|
|
|
|
|
Mikael Lind, Mikael Hägg, Ulf Siwe, Sandra Haraldson
Pág. 183 - 192
Sea Traffic Management is the idea of sharing information and collaborating to optimise the maritime transport chain while increasing safety and sustainability. The digital information on-board and on shore is abundant; however, the interconnection today...
ver más
|
|
|
|
|
|
|
Luca Lucietti, Alessandro Chierico
Pág. 2880 - 2889
Within the MEDNET project ?Mediterranean Network for Custom Procedures and Simplification of Clearance in Ports? funded by the MED programme (2007?2013), Taranto Port Authority (TPA) in Italy has designed and developed newly automatic system (prototype) ...
ver más
|
|
|
|