Filters








89,348 Hits in 4.2 sec

Resource Sharing for Granted & Grant-free Demands in 5G for Non-orthogonal Multiple Access

2019 International journal of recent technology and engineering  
In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things.  ...  A major hopeful technology which has the capacity for enabling different user equipments, sharing interweaving wireless resources in 5G is named as Non Orthogonal multiple Access (NOMA) technology, where  ...   Abstract: In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things.  ... 
doi:10.35940/ijrte.d1102.1284s319 fatcat:chntelptzzdjljgs2uv3weleby

Resource Sharing for Granted & Grant-free Demands in 5G for Non-orthogonal Multiple Access

2019 International journal of recent technology and engineering  
In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things.  ...  A major hopeful technology which has the capacity for enabling different user equipments, sharing interweaving wireless resources in 5G is named as Non Orthogonal multiple Access (NOMA) technology, where  ...   Abstract: In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things.  ... 
doi:10.35940/ijrte.d1101.1284s319 fatcat:fk5yvuhnu5ajvd2plh6w7bs5wu

The Multi-User Workspace for Collaborative Design [chapter]

Sungho Woo, Eunjoo Lee, Tsuyoshi Sasada
1997 CAAD futures 1997  
The design is processed in the multi-user work space where participants interact with each other. This paper aims to prove the availability of the Multi-user workspace and to understand its problems.  ...  This paper considers recent research in collaborative design system, it is called the multi-user workspace.  ...  Multi-user work space consists of shared virtual space and private virtual space. Shared virtual space allows multi-users to interact on the Internet.  ... 
doi:10.1007/978-94-011-5576-2_33 fatcat:hza5ty7gjraydpipsnavgaur3i

Multi-tenancy in decentralised IoT

Sylvain Cherrier, Zahra Movahedi, Yacine M. Ghamri-Doudane
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
This decentralised architecture has assets in term of confidentiality, data ownership and energy saving. But then, how to share things among users, and keep the control?  ...  Since the Internet of Things (IoT) has become more and more important, new solutions should be proposed in order to adapt the specificities introduced by this interconnection of the physical world (Sensors  ...  Instead of manipulating data, the Service Oriented Computing (SOC) in IoT represents each Thing (or group of Things) as a service that can be accessible through the Internet [7] .  ... 
doi:10.1109/wf-iot.2015.7389062 dblp:conf/wf-iot/CherrierMG15 fatcat:rmxf3maetvhszl2w4d3c7cjmke

Guest editorial: Collaborative intelligence for vehicular Internet of Things

Celimuge Wu, Kok-Lim Alvin Yau, Carlos Tavares Calafate, Lei Zhong
2021 China Communications  
China Communications • July 2021 uture vehicular Internet-of-Things (IoT) systems feature a large number of devices and multi-access environments where different types of communication, computing, and  ...  a certain message in a multi-access Internet-of-moving-things (IoMT) environment where the cellular, vehicular WiFi, and low power wide area network technologies coexist.  ...  uture vehicular Internet-of-Things (IoT) systems feature a large number of devices and multi-access environments where different types of communication, computing, and storage resources must be efficiently  ... 
doi:10.23919/jcc.2021.9495349 fatcat:3zybrihi4ze37lvmokf7yqjtlu

Authentication Systems in Internet of Things [article]

Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal
2015 arXiv   pre-print
The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials.  ...  This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials.  ...  CONCLUSION The above authentication methods in Internet of Things has resulted in more secure login experience for the users without the dangers of exposing their credentials to third party users.  ... 
arXiv:1502.00870v1 fatcat:cbebdfqopfd45epf6uwf2imygi

5G Mobile Communication Development Trend and Several Key Technologies

Liping Zheng, X. Lei, S. Cai, Y. Yu, H. Li
2018 MATEC Web of Conferences  
In order to ensure the expected utility of 5G communication system in practical application, this paper will focus on the future development trend of this communication system and its research on key technologies  ...  The overall performance of 5G mobile communication network has made great progress compared with 4G network.  ...  scope of the Internet of Things continues to increase, the network included in the Internet of Things the object will naturally become more.  ... 
doi:10.1051/matecconf/201824603034 fatcat:5fietnwjqbdynjyp3klegv52pm

Key Technologies of IoT Service Security and Privacy Protection

Dongxian Yu, Jiatao Kang, Junlei Dong
2021 Converter  
This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing.  ...  Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture  ...  For the security of the Internet of Things system itself, it is mainly reflected in the perception layer of the Internet of Things.  ... 
doi:10.17762/converter.158 fatcat:6kjzuhuvi5afhitf5nxdh36s3y

Make and connect

Margot Brereton, Min Zhen Chai, Alessandro Soro, Aloha Hufana Ambe, Daniel Johnson, Peta Wyeth, Paul Roe, Yvonne Rogers
2017 Proceedings of the 29th Australian Conference on Computer-Human Interaction - OZCHI '17  
Our aim is to democratize the design and making of the Internet of Things, by researching and creating easy-to-use kit technologies.  ...  This will enable everybody to design and make networks of internet connected things and people to suit their own interest and needs, fostering new kinds of creative thinking, designing and connection.  ...  The IoT is the notion of equipping all objects such as yoghurt pots, shoes and fire hydrants with internet accessible identification and data sharing capabilities.  ... 
doi:10.1145/3152771.3156182 dblp:conf/ozchi/BreretonCSA0WRR17 fatcat:e3zxmids5vda3fp3wxny5sg66i

Attribute - Semantic Based Access Control Policy Model for IoT

2019 International Journal of Engineering and Advanced Technology  
Internet of Things (IoT) devices under cloud assistance is deployed in different distributed environment. It collects sensed data and outsources the data to remote server and user for sharing.  ...  The semantic technology is used for high level reasoning of the context situation  ...  Attributes can also hold data that mean any restrictions on user [17] [18] . ABAC is flexible and scalable for fine grained access control in complex system like Internet of Things.  ... 
doi:10.35940/ijeat.a1124.1291s419 fatcat:mhnfoqxk7jefvadcyiycuu3wjq

ENHANCEMENT FOR DATA SECURITY IN CLOUD COMPUTING ENVIRONMENT

GAWALI M. B., R. B. WAGH, S. P. PATIL
2012 International journal of computer and communication technology  
To address this longstanding limitation by building a multi-tenant system. Our system provides the environment for the user to perform his tasks, but with very high security.  ...  Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid.  ...  The world's first PaaS, which delivers turnkey multi tenancy for Internet-scale applications.  ... 
doi:10.47893/ijcct.2012.1139 fatcat:niq6wqhwsfaslcn42lgr6b5vae

Analysis on Data Mining Model Objected to Internet of Things

Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu
2012 International Journal of Advancements in Computing Technology  
Three data mining models suitable to data processing have been proposed according to some technical challenges on the characteristics data for Internet of Things.  ...  At the same time, the paper learns from "decomposition -build "theory to solve the data mining problem in the internet of things. Finally, the key issues are discussed about model application.  ...  Data mining models in Internet of Things Multi-layer data mining model in Internet of Things According to hierarchical structure of Internet of Things and RFID data mining framework [10] , multi-layer  ... 
doi:10.4156/ijact.vol4.issue21.73 fatcat:e4fkof4tizdctcegjqiieocwry

Data Security in single and multi-cloud storage.pdf

Dr.Leo John
2020 Figshare  
foundation of thefuture Internet of Services (IoS).  ...  ABSTRACT:In the modern era of computing, Cloud computing will play a major role in the Internet of Services.Although many cloud service models are there, Infrastructure as a Service (IAAS) has become the  ...  They are size, internet traffic and cost. [19] The makeup of internet traffic itself is changing.  ... 
doi:10.6084/m9.figshare.11854677 fatcat:pn66w762bzakzffsctoywbqnvy

Internet of Digital Reality: Infrastructural Background – Part II

György Wersényi, Ádám Csapó, Tamás Budai, Péter Baranyi
2021 Acta Polytechnica Hungarica  
Internet of Digital Reality (IoD) is a concept that extends the Internet of Things (IoT) with the management, transmission and harmonization of digital realities.  ...  In this paper, we look into the infrastructural requirements of and challenges behind the Internet of Digital Reality, which must be solved in order to deliver a high-quality user experience while keeping  ...  Acknowledgements This research was supported by the Digital Development Center in the national framework GINOP-3.1.1-VEKOP-15-2016-00001 "Promotion and support of cooperations between educational institutions  ... 
doi:10.12700/aph.18.8.2021.8.5 fatcat:aiw6wv7dwzahnmecz56xnovblq

Business classification of Power Grid Enterprises in the development environment of Energy Internet

Xin Li, Yuan Zhang, L. Yang, Z. Xu
2020 E3S Web of Conferences  
, providing references for the transformation and development of power grid companies.  ...  This article focuses on the impact of the development of the Energy Internet on power grid companies and the main business of power grid companies in the future development environment of the Energy Internet  ...  Acknowledgments This paper was sponsored by the project "Research on key technologies for the development of State Grid Corporation's integrated energy service platform for ubiquitous power Internet" of  ... 
doi:10.1051/e3sconf/202018502002 fatcat:5mx4wjp5qjbxhjzasjyyeljk34
« Previous Showing results 1 — 15 out of 89,348 results