Browse Items (1784 total)

Nowadays, group communications over Mobile Ad hoc Networks (MANETs) have received significant attention. Multicasting plays an important role in simultaneous delivery of information to group of receivers. Thus, it is necessary to design efficient and…

The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The…

In this work the development and deployment of a new concept of cartoon-generation on a mobile phone is presented. An interactive multimedia application was designed for a push-approach of sending short e-cartoons from a mobile phone to a central WEB…

The evolution of the current centric cloud to distributed clouds such as fog presents a suitable path to counteract the intolerable processing delays for time-critical applications. It is anticipated that more fog nodes (FN) will be connected to the…

In the recent years, the study and developments of networks that do not depend on any pre-existing infrastructure have been very popular. Vehicular Ad Hoc Networks (VANETs) belong to the class of these networks, in which each vehicle participates in…

Due to an increase in the number of radio devices with different types of signals and to increase the speed of information transmission, it is necessary to take into account the increase in the probability of erroneous reception of signals as a…

the increasing growth of mobile devices technology and Mobile-based systems with the emerging of cloud computing technology, created a Mobile Cloud Computing field to be the recent future technology for different wireless services. The development of…

When it comes to improving people's health, various forms of smart city applications are put to use in the area of smart healthcare. Health care providers are increasingly using the internet of medical things (IoMT) as an environment of linked…

Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers' (CSPs) ability to respond to client demands. In cloud market, the requests are announced by the client nodes to their…

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2