• Nenhum resultado encontrado

[PDF] Top 20 Mobile ID in physical access control applications

Has 10000 "Mobile ID in physical access control applications" found on our website. Below are the top 20 most common "Mobile ID in physical access control applications".

Mobile ID in physical access control applications

Mobile ID in physical access control applications

... In order to prepare this thesis work a wide range of techniques and previous researches had to be ...information in comparison to the so-called hackers ...which in such cases by not having this dual ... See full document

89

HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

HYBRID MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS USED IN TIME CRITICAL APPLICATIONS

... Medium Access Control protocol) has been proposed, which is an energy efficient and low latency MAC protocol which uses node ID method to assign priority for certain wireless sensor nodes that are ... See full document

11

A Blockchain System for Mobile Health Applications and Services

A Blockchain System for Mobile Health Applications and Services

... and applications experienced in recent years has led to several breakthroughs and new integration of mobile technologies in traditional health systems, shifting the focus form the health ... See full document

78

Cooperation mechanisms for pervasive mobile health applications

Cooperation mechanisms for pervasive mobile health applications

... Furthermore, in the last years several cooperation mechanisms and algorithms have been proposed to improve wireless networks performance, where mobile nodes cooperate with each other performing all ... See full document

148

A Middleware for Mobile Edge-Cloud Applications

A Middleware for Mobile Edge-Cloud Applications

... nearby mobile devices, i.e., for making the physical connections. In other words, this module just advertises/discovers devices and establishes connections between ...created in order to ... See full document

138

Energy-aware medium access control protocols for wireless sensors network applications

Energy-aware medium access control protocols for wireless sensors network applications

... shown in Figure ...modules in C++ using the OMNeT++ simulation class ...unique ID) or via a series of gates and ...packets in a computer ... See full document

223

A Tunable Checkpointing Algorithm for Distributed Mobile Applications

A Tunable Checkpointing Algorithm for Distributed Mobile Applications

... the id of the owner AP, the serial number of the current checkpoint record, the given R- distance, and ids of the participant ...logged in that field, messages resending can be done during the recovery ... See full document

9

Ubiquitous computing approach for mobile health applications

Ubiquitous computing approach for mobile health applications

... and applications in health raises several ethical and professional ...a mobile device (smartphone, tablet, iPod, ...unauthorized access by third parties. For example, in a ubiquitous ... See full document

106

Access And Monitoring WLAN Using Mobile Application

Access And Monitoring WLAN Using Mobile Application

... and Control Using Mobile App Embedded Wireless Information WAP (Wireless Applications Protocol) was designed for remedy of the problems with using web servers in wireless networks and embedded ... See full document

4

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... battleground, in corporate houses where employees or associates sharing information inside the company premises or in a meeting hall; attendees using wireless gadgets participating in an interactive ... See full document

8

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

... algorithm. In our simulation, the channel capacity of mobile hosts is set to the same value: 2 ...Mbps. In our simulation, 50 mobile nodes move in a 1000×1000 m rectangular region for ... See full document

7

Control of multiuser services in mobile heterogeneous environments

Control of multiuser services in mobile heterogeneous environments

... Multi-user applications may involve large ...savings in network resources, especially in backbone ...that mobile operators will deploy IP multicast in their backbone network in ... See full document

10

Private ordering and the rise of terms of service as cyber-regulation

Private ordering and the rise of terms of service as cyber-regulation

... to access the internet, users – be they individuals or Content and application providers (CAPs) – enter into contracts with Internet access providers (IAPs), defining the terms according to which the ... See full document

17

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network

... lowest ID clustering algorithm [18], a node with the lowest ID is chosen as a ...unique ID and it periodically broadcasts the list of its neighbor’s IDs, including ...with ID higher than ... See full document

13

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

... heuristic. In contrast, in the variable deployment scenario, the RD-VT heuristic outperforms the TP ...heuristic. In the RD-VT heuristic, the main idea is to traverse the SMT in pre- order, ... See full document

16

Using Genetic Algorithms in Secured Business Intelligence Mobile Applications

Using Genetic Algorithms in Secured Business Intelligence Mobile Applications

... The paper aims to assess the use of genetic algorithms for training neural networks used in secured Business Intelligence Mobile Applications. A comparison is made between classic back-propagation ... See full document

11

Applications of laser in control of microdeformations

Applications of laser in control of microdeformations

... There are two basic types of laser measurement systems the ranging systems and interformetric systems. In the ranging systems the elapsed time between emission and reception of laser pulses are measured. Also the ... See full document

6

A Survey on Cloud Storage Systems and Encryption Schemes

A Survey on Cloud Storage Systems and Encryption Schemes

... share in the fine grained ...with access structures govern the cipher-texts needed for ...grained access control engages a server for storing ...security. In Secret Sharing Schemes ... See full document

5

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

... achievements in mobile device technologies opened the way for new applications designed to run on mobile ...devices. In the beginning, mobile devices offered very limited ... See full document

11

Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme

Enhanced Three Tier Security Architecture for WSN Against Mobile Sink Replication Attacks Using Mutual Authentication Scheme

... 84 Liu et al.[3] The sensor nodes are communicated securely with each other using cryptographic techniques by enabling bi variate key polynomial. This is one of the most primary security services. The resource ... See full document

13

Show all 10000 documents...