The concept of Digital Twin has been widely used by researchers to represent physical entities in computer-generated reality in the metaverse. In this research, a novel concept of 'Mobile Twin' is coined. Mobi...
详细信息
The implementation of a patient monitoring system and infusion automation which aims to ensure regular and periodic monitoring of inpatient conditions are applied in this system. This embedded system is applied in hos...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
To analyze the physiological information within the acquired EEG signal is very cumbersome due to the possibility of several factors, viz. noise and artifacts, complexity of brain dynamics, and inter-subject variabili...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
In this paper we propose a first empirical mapping between the RST-DT and the PDTB 3.0. We provide an original algorithm which allows the mapping of 6,510 (80.0%) explicit and implicit discourse relations between the ...
详细信息
Most enterprises adopted social media for marketing purposes. Traditional media resources about one decade ago are now a day's costly and less productive than social media. Companies that are using social media li...
详细信息
We explored the current state of Python serialization in the context of distributed computing. The challenging points addressed are: object-type support, speed and size, version compatibility, and implementations. The...
详细信息
Tropical cyclones, characterized by strong winds and heavy rainfall, threaten human life in coastal regions crucial to the economy, including fisheries, agriculture, tourism, and infrastructure. Their frequent occurre...
详细信息
People with hearing loss or hard hearing struggle with daily life activities as sign language is not widely known by the public. There are many attempts to use technology to help assist hearing loss individuals. Howev...
详细信息
暂无评论