A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resource Sharing for Granted & Grant-free Demands in 5G for Non-orthogonal Multiple Access
2019
International journal of recent technology and engineering
In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things. ...
A major hopeful technology which has the capacity for enabling different user equipments, sharing interweaving wireless resources in 5G is named as Non Orthogonal multiple Access (NOMA) technology, where ...
Abstract: In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things. ...
doi:10.35940/ijrte.d1102.1284s319
fatcat:chntelptzzdjljgs2uv3weleby
Resource Sharing for Granted & Grant-free Demands in 5G for Non-orthogonal Multiple Access
2019
International journal of recent technology and engineering
In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things. ...
A major hopeful technology which has the capacity for enabling different user equipments, sharing interweaving wireless resources in 5G is named as Non Orthogonal multiple Access (NOMA) technology, where ...
Abstract: In the present days we observed a drastic change in the usage of mobile internet as well as advancements in Internet of things. ...
doi:10.35940/ijrte.d1101.1284s319
fatcat:fk5yvuhnu5ajvd2plh6w7bs5wu
The Multi-User Workspace for Collaborative Design
[chapter]
1997
CAAD futures 1997
The design is processed in the multi-user work space where participants interact with each other. This paper aims to prove the availability of the Multi-user workspace and to understand its problems. ...
This paper considers recent research in collaborative design system, it is called the multi-user workspace. ...
Multi-user work space consists of shared virtual space and private virtual space. Shared virtual space allows multi-users to interact on the Internet. ...
doi:10.1007/978-94-011-5576-2_33
fatcat:hza5ty7gjraydpipsnavgaur3i
Multi-tenancy in decentralised IoT
2015
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)
This decentralised architecture has assets in term of confidentiality, data ownership and energy saving. But then, how to share things among users, and keep the control? ...
Since the Internet of Things (IoT) has become more and more important, new solutions should be proposed in order to adapt the specificities introduced by this interconnection of the physical world (Sensors ...
Instead of manipulating data, the Service Oriented Computing (SOC) in IoT represents each Thing (or group of Things) as a service that can be accessible through the Internet [7] . ...
doi:10.1109/wf-iot.2015.7389062
dblp:conf/wf-iot/CherrierMG15
fatcat:rmxf3maetvhszl2w4d3c7cjmke
Guest editorial: Collaborative intelligence for vehicular Internet of Things
2021
China Communications
China Communications • July 2021 uture vehicular Internet-of-Things (IoT) systems feature a large number of devices and multi-access environments where different types of communication, computing, and ...
a certain message in a multi-access Internet-of-moving-things (IoMT) environment where the cellular, vehicular WiFi, and low power wide area network technologies coexist. ...
uture vehicular Internet-of-Things (IoT) systems feature a large number of devices and multi-access environments where different types of communication, computing, and storage resources must be efficiently ...
doi:10.23919/jcc.2021.9495349
fatcat:3zybrihi4ze37lvmokf7yqjtlu
Authentication Systems in Internet of Things
[article]
2015
arXiv
pre-print
The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. ...
This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. ...
CONCLUSION The above authentication methods in Internet of Things has resulted in more secure login experience for the users without the dangers of exposing their credentials to third party users. ...
arXiv:1502.00870v1
fatcat:cbebdfqopfd45epf6uwf2imygi
5G Mobile Communication Development Trend and Several Key Technologies
2018
MATEC Web of Conferences
In order to ensure the expected utility of 5G communication system in practical application, this paper will focus on the future development trend of this communication system and its research on key technologies ...
The overall performance of 5G mobile communication network has made great progress compared with 4G network. ...
scope of the Internet of Things continues to increase, the network included in the Internet of Things the object will naturally become more. ...
doi:10.1051/matecconf/201824603034
fatcat:5fietnwjqbdynjyp3klegv52pm
Key Technologies of IoT Service Security and Privacy Protection
2021
Converter
This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. ...
Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture ...
For the security of the Internet of Things system itself, it is mainly reflected in the perception layer of the Internet of Things. ...
doi:10.17762/converter.158
fatcat:6kjzuhuvi5afhitf5nxdh36s3y
Make and connect
2017
Proceedings of the 29th Australian Conference on Computer-Human Interaction - OZCHI '17
Our aim is to democratize the design and making of the Internet of Things, by researching and creating easy-to-use kit technologies. ...
This will enable everybody to design and make networks of internet connected things and people to suit their own interest and needs, fostering new kinds of creative thinking, designing and connection. ...
The IoT is the notion of equipping all objects such as yoghurt pots, shoes and fire hydrants with internet accessible identification and data sharing capabilities. ...
doi:10.1145/3152771.3156182
dblp:conf/ozchi/BreretonCSA0WRR17
fatcat:e3zxmids5vda3fp3wxny5sg66i
Attribute - Semantic Based Access Control Policy Model for IoT
2019
International Journal of Engineering and Advanced Technology
Internet of Things (IoT) devices under cloud assistance is deployed in different distributed environment. It collects sensed data and outsources the data to remote server and user for sharing. ...
The semantic technology is used for high level reasoning of the context situation ...
Attributes can also hold data that mean any restrictions on user [17] [18] . ABAC is flexible and scalable for fine grained access control in complex system like Internet of Things. ...
doi:10.35940/ijeat.a1124.1291s419
fatcat:mhnfoqxk7jefvadcyiycuu3wjq
ENHANCEMENT FOR DATA SECURITY IN CLOUD COMPUTING ENVIRONMENT
2012
International journal of computer and communication technology
To address this longstanding limitation by building a multi-tenant system. Our system provides the environment for the user to perform his tasks, but with very high security. ...
Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. ...
The world's first PaaS, which delivers turnkey multi tenancy for Internet-scale applications. ...
doi:10.47893/ijcct.2012.1139
fatcat:niq6wqhwsfaslcn42lgr6b5vae
Analysis on Data Mining Model Objected to Internet of Things
2012
International Journal of Advancements in Computing Technology
Three data mining models suitable to data processing have been proposed according to some technical challenges on the characteristics data for Internet of Things. ...
At the same time, the paper learns from "decomposition -build "theory to solve the data mining problem in the internet of things. Finally, the key issues are discussed about model application. ...
Data mining models in Internet of Things
Multi-layer data mining model in Internet of Things According to hierarchical structure of Internet of Things and RFID data mining framework [10] , multi-layer ...
doi:10.4156/ijact.vol4.issue21.73
fatcat:e4fkof4tizdctcegjqiieocwry
Data Security in single and multi-cloud storage.pdf
2020
Figshare
foundation of thefuture Internet of Services (IoS). ...
ABSTRACT:In the modern era of computing, Cloud computing will play a major role in the Internet of Services.Although many cloud service models are there, Infrastructure as a Service (IAAS) has become the ...
They are size, internet traffic and cost. [19] The makeup of internet traffic itself is changing. ...
doi:10.6084/m9.figshare.11854677
fatcat:pn66w762bzakzffsctoywbqnvy
Internet of Digital Reality: Infrastructural Background – Part II
2021
Acta Polytechnica Hungarica
Internet of Digital Reality (IoD) is a concept that extends the Internet of Things (IoT) with the management, transmission and harmonization of digital realities. ...
In this paper, we look into the infrastructural requirements of and challenges behind the Internet of Digital Reality, which must be solved in order to deliver a high-quality user experience while keeping ...
Acknowledgements This research was supported by the Digital Development Center in the national framework GINOP-3.1.1-VEKOP-15-2016-00001 "Promotion and support of cooperations between educational institutions ...
doi:10.12700/aph.18.8.2021.8.5
fatcat:aiw6wv7dwzahnmecz56xnovblq
Business classification of Power Grid Enterprises in the development environment of Energy Internet
2020
E3S Web of Conferences
, providing references for the transformation and development of power grid companies. ...
This article focuses on the impact of the development of the Energy Internet on power grid companies and the main business of power grid companies in the future development environment of the Energy Internet ...
Acknowledgments This paper was sponsored by the project "Research on key technologies for the development of State Grid Corporation's integrated energy service platform for ubiquitous power Internet" of ...
doi:10.1051/e3sconf/202018502002
fatcat:5mx4wjp5qjbxhjzasjyyeljk34
« Previous
Showing results 1 — 15 out of 89,348 results