To see the other types of publications on this topic, follow the link: Network Device Compliance.

Journal articles on the topic 'Network Device Compliance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network Device Compliance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mohit, Bajpai. "Managing Network Devices Configuration, Golden Configuration, and Network Device Compliance." European Journal of Advances in Engineering and Technology 7, no. 1 (2020): 61–64. https://doi.org/10.5281/zenodo.13762549.

Full text
Abstract:
This paper explores the critical aspects of managing network device configurations, emphasizing the importance of the Golden Configuration concept and network device compliance. As organizations increasingly rely on complex networks to support their operations, effective configuration management is essential for maintaining security, performance, and reliability. The Golden Configuration serves as a standardized, optimal configuration template that aligns with organizational policies and industry best practices. Network device compliance ensures adherence to these standards, thereby reducing r
APA, Harvard, Vancouver, ISO, and other styles
2

Mohit, Bajpai. "Automating Network Device Configuration and Compliance Enforcement." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 7, no. 3 (2019): 1–6. https://doi.org/10.5281/zenodo.14209408.

Full text
Abstract:
Network infrastructures in large organizations are often complex, consisting of a vast array of devices from multiple vendors. Ensuring consistent configuration and compliance across this heterogeneous environment is a significant challenge. This paper explores the use of automation to streamline network device configuration management and enforce compliance with organizational policies. It outlines an architectural approach that leverages a domain-level data model to abstract network design from device-specific configurations, enabling centralized management and automated deployment. The pape
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Davies, Furey Eoghan, and Curran Kevin. "Improving compliance with bluetooth device detection." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 5 (2019): 2355–69. https://doi.org/10.12928/TELKOMNIKA.v17i5.12929.

Full text
Abstract:
The number of devices containing Bluetooth chipsets is continuing to rise and there exists a need to stem the tidal wave of vulnerabilities brought by the Bring Your Own Device (BYOD) and Internet of Things (IoT) phenomena. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth devices, or creating an accurate Bluetooth device hardware log is limited. The software tools and hardware devices to monitor WiFi networking signals have long been a part of the security auditor’s arsenal, but similar tools for Bluetooth are bespoke, expensive, and not adopted by most securi
APA, Harvard, Vancouver, ISO, and other styles
4

McDaid, Alexander, Eoghan Furey, and Kevin Curran. "Wireless Interference Analysis for Home IoT Security Vulnerability Detection." International Journal of Wireless Networks and Broadband Technologies 10, no. 2 (2021): 55–77. http://dx.doi.org/10.4018/ijwnbt.2021070104.

Full text
Abstract:
The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the
APA, Harvard, Vancouver, ISO, and other styles
5

Suresh Reddy Thati. "Configuration and compliance automation in modern networks: A framework for enhanced security and operational efficiency." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2513–19. https://doi.org/10.30574/wjaets.2025.15.2.0613.

Full text
Abstract:
Configuration and compliance automation represents a transformative approach to modern network management, addressing the escalating complexity of enterprise network environments. As organizations expand their digital footprint through cloud integration, IoT adoption, and hybrid work models, the traditional manual approach to network configuration has become increasingly unsustainable. The heterogeneous nature of contemporary networks, typically encompassing multiple vendors, platforms, and technologies, creates significant challenges for maintaining configuration consistency, ensuring regulat
APA, Harvard, Vancouver, ISO, and other styles
6

Leonardi, Luca, Lucia Lo Bello, Gaetano Patti, Alessio Pirri, and Mattia Pirri. "Combined Use of LoRaWAN Medium Access Control Protocols for IoT Applications." Applied Sciences 13, no. 4 (2023): 2341. http://dx.doi.org/10.3390/app13042341.

Full text
Abstract:
The low power wide area networks (LPWANs) based on the LoRaWAN standard are suitable for Internet of Things (IoT) applications that involve a large number of low-power devices distributed over large areas. The LoRaWAN standard imposes some limitations on end-device configuration, such as the medium access strategies to be adopted, which depend on the region in which the network operates. In particular, in Europe, according to the ETSI regulations, a LoRaWAN end-device can use either a pure ALOHA medium access control (MAC) protocol or a polite medium access technique based on Listen Before Tal
APA, Harvard, Vancouver, ISO, and other styles
7

Akilnath, Bodipudi. "Security Framework for 5G-Connected Biomedical Devices in Healthcare." Journal of Scientific and Engineering Research 10, no. 5 (2023): 394–400. https://doi.org/10.5281/zenodo.13348195.

Full text
Abstract:
The advent of 5G technology promises significant advancements in healthcare, particularly through the enhanced connectivity and data transmission capabilities for biomedical devices. However, this increased connectivity also introduces new security challenges that must be addressed to ensure the integrity, confidentiality, and availability of patient data and device functionality. This paper proposes a comprehensive security framework specifically designed for 5G-connected biomedical devices in healthcare environments. The framework encompasses device-level security, network infrastructure res
APA, Harvard, Vancouver, ISO, and other styles
8

Boeding, Matthew, Michael Hempel, and Hamid Sharif. "End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT." Future Internet 17, no. 1 (2025): 34. https://doi.org/10.3390/fi17010034.

Full text
Abstract:
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Internet of Things. This convergence has led to a drastic increase in external access capabilities to previously air-gapped industrial systems for process control and monitoring. To meet the need for remote access to system information, protocols designed for the OT space were extended to allow IT networked communications. However, OT protocols often lack
APA, Harvard, Vancouver, ISO, and other styles
9

Brivio, Stefano, and Sabina Spiga. "Stochastic circuit breaker network model for bipolar resistance switching memories." Journal of Computational Electronics 16, no. 4 (2017): pp 1154–1166. https://doi.org/10.1007/s10825-017-1055-y.

Full text
Abstract:
Abstract:We present a stochastic model for resistance switching devices in which a square grid of resistor breakers plays the role of the insulator switching layer. The probability of breaker switching between two fixed resistance values, ROFF and RON, is determined by the corresponding voltage drop and thermal Joule heating. The breaker switching produces the overall device resistance change. Salient features of all the switching operations of bipolar resistance switching memories (RRAMs) are reproduced by the model and compared to a prototypical HfO2-based RRAM device. In particular, the nee
APA, Harvard, Vancouver, ISO, and other styles
10

Omelianenko, Halyna, Veronika Cherkashyna, and Anton Makarov. "The appropriateness of using electrical energy storage systems to increase the reliability of Ukrainian electrical networks." Bulletin of the National Technical University "KhPI". Series: Energy: Reliability and Energy Efficiency, no. 1(10) (July 9, 2025): 101–6. https://doi.org/10.20998/eree.2025.1(10).332984.

Full text
Abstract:
A study was conducted that allowed to substantiate the expedient use of electric energy storage devices in the electrical networks of Ukraine. The relevance of this study is due to the introduction of renewable energy sources into the electrical networks of Ukraine, which contributes to the need for the accumulation of electric energy. To find ways to solve this problem, an analysis of flywheel, superconducting inductive electric energy storage devices, high-capacity batteries, and supercapacitors was performed. Their operating features, advantages, and disadvantages were considered. From the
APA, Harvard, Vancouver, ISO, and other styles
11

Keeley, Dara. "Healthcare Providers’ Readiness to Address Medical Device Cybersecurity within the Irish Healthcare System." Global Clinical Engineering Journal 6, no. 2 (2024): 30–39. http://dx.doi.org/10.31354/globalce.v6i2.158.

Full text
Abstract:
Medical devices that can diagnose and treat critically ill patients have become sophisticated and complex. Device manufacturers have been developing these systems to meet market requirements as technology evolves. Combining medical devices and ICT into a distributed medical device IT system can be a solution to incorporating continuous monitoring from the patient bedside to interoperability with a clinical information system. These technology innovations aim to manage patient data and configure medical devices into networked systems that can provide functionality and safety. The implementation
APA, Harvard, Vancouver, ISO, and other styles
12

Hegarty, Francis J., Silvana Togneri MacMahon, Patricia Byrne, and Fergal McCaffery. "Assessing a Hospital's Medical IT Network Risk Management Practice with 80001-1." Biomedical Instrumentation & Technology 48, no. 1 (2014): 64–71. http://dx.doi.org/10.2345/0899-8205-48.1.64.

Full text
Abstract:
Medical device interoperability has been identified as a key way of decreasing healthcare costs while improving patient care.1 This has led to a shift toward placing more medical devices onto information technology (IT) networks. However, placing medical devices onto an IT network may lead to additional risks to safety, effectiveness and security of the devices, the network, and the data. ANSI/AAMI/IEC 80001-1 addresses the roles, responsibilities, and activities that need to be carried out when managing these risks. In this article, we describe an exercise undertaken to assess the medical IT
APA, Harvard, Vancouver, ISO, and other styles
13

Zhu, An, Haiping Ai, and Li Chen. "A Fuzzy Logic Reinforcement Learning Control with Spring-Damper Device for Space Robot Capturing Satellite." Applied Sciences 12, no. 5 (2022): 2662. http://dx.doi.org/10.3390/app12052662.

Full text
Abstract:
In order to prevent joints from being damaged by impact force in a space robot capturing satellite, a spring-damper device (SDD) is added between the joint motor and manipulator. The device can not only absorb and attrition impact energy, but also limit impact force to a safe range through reasonable design compliance control strategy. Firstly, the dynamic mode of the space robot and target satellite systems before capture are established by using a Lagrange function based on dissipation theory and Newton-Euler function, respectively. After that, the impact effect is analyzed and the hybrid sy
APA, Harvard, Vancouver, ISO, and other styles
14

Tu, Thanh Diep Cong. "CONTROL NOVEL MODEL OF KNEE CPM DEVICE." Science and Technology Development Journal 12, no. 4 (2009): 18–29. http://dx.doi.org/10.32508/stdj.v12i4.2228.

Full text
Abstract:
In recent years, CPM - Continuous Passive Motion has been proved to be one of the most effective therapeutic methods for patients who have problems with motion such as spinal cord injury, ankle and knee injury, parkinson and so on. Many commercial CPM devices are found in market but all of them use motors as the main actuators. The lack of human compliance of electric actuators, which are commonly used in these machines, makes them potentially harmful to patients. An interesting alternative, to electric actuators for medical purposes, particularly promising for rehabilitation, is a pneumatic a
APA, Harvard, Vancouver, ISO, and other styles
15

Kadam, Saurabh Machhindra, and Pratap Singh Solanki. "A Literature Survey on Applications of 5G Technologies for Water Resource Management." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1190–95. http://dx.doi.org/10.22214/ijraset.2023.49600.

Full text
Abstract:
Abstract: Information and Communication Technology (ICT) has become the integral part of our everyday life. ICT has been playing vital and essential role in all modern and advance field. ICT covers computing, communication, information accessing, processing and transmitting the same with high security. In addition to increased network capacity requirements to handle a large number of devices running apps that need high data rates and always-on access, 5G can provide high speeds, low latency, and more capacity with the potential to change what we have experienced with our mobile device. This wi
APA, Harvard, Vancouver, ISO, and other styles
16

Yewande Goodness Hassan, Anuoluwapo Collins, Gideon Opeyemi Babatunde, Abidemi Adeleye Alabi, and Sikirat Damilola Mustapha. "Holistic software solutions for securing Iot ecosystems against data theft and network-based cyber threats." Gulf Journal of Advance Business Research 3, no. 1 (2025): 252–61. https://doi.org/10.51594/gjabr.v3i1.77.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) ecosystems, particularly in smart environments, has introduced unprecedented opportunities and challenges. As IoT devices become increasingly interconnected, vulnerabilities to data theft and network-based cyber threats continue to rise, necessitating robust and holistic security solutions. This paper examines the current landscape of IoT security, focusing on software-based approaches to mitigate risks. Key challenges, including device-level vulnerabilities, network-based threats, and regulatory gaps, are analyzed in detail. Additionally, ad
APA, Harvard, Vancouver, ISO, and other styles
17

Derek Asir Muthurajan Caleb. "Automated fibre channel device onboarding using FIDO protocol: Transforming SAN infrastructure management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 2530–39. https://doi.org/10.30574/wjaets.2025.15.2.0657.

Full text
Abstract:
The onboarding of Fibre Channel (FC) devices in Storage Area Network (SAN) environments presents significant operational challenges for data center administrators, involving multiple manual configuration steps that create bottlenecks in infrastructure expansion. This article explores how adapting the FIDO protocol—originally developed for IoT device authentication—can revolutionize FC device provisioning by enabling automated, secure onboarding processes. Through a comprehensive article of current onboarding workflows and their limitations, it presents a technical framework for implementing FI
APA, Harvard, Vancouver, ISO, and other styles
18

Prasanth Kosaraju. "Safeguarding OT Networks in Biotech Manufacturing Plants." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 972–81. https://doi.org/10.32996/jcsts.2025.7.3.109.

Full text
Abstract:
This article presents advanced methodologies for securing operational technology networks in biotech manufacturing environments. The integration of comprehensive security approaches is essential for protecting critical systems that control the production of life-saving therapeutics. Segmented network architectures establish the foundation for defense-in-depth strategies, while zero-trust security models provide continuous verification of device identity and strict access controls. Performance optimization techniques ensure the low-latency communication required for real-time monitoring, suppor
APA, Harvard, Vancouver, ISO, and other styles
19

Vázquez-Gallego, Francisco, Luis Alonso, and Jesus Alonso-Zarate. "Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/685164.

Full text
Abstract:
Machine-to-Machine (M2M) area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC) protocols which are based on a tree-splitting algorithm to resolve collision
APA, Harvard, Vancouver, ISO, and other styles
20

Vázquez-Gallego, Francisco, Luis Alonso, and Jesús Alonso-Zárate. "Energy Analysis of Contention Tree-based Access Protocols in Dense Machine-to-Machine Area Networks." Journal of Sensors 2015, no. 685164 (2015): 12. https://doi.org/10.5281/zenodo.46816.

Full text
Abstract:
Machine-to-Machine (M2M) area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC) protocols which are based on a tree-splitting algorithm to resolve col
APA, Harvard, Vancouver, ISO, and other styles
21

Arun Sugumar. "AI-Driven 5G Network Slicing: Revolutionizing Enterprise Connectivity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2601–8. https://doi.org/10.32628/cseit25112729.

Full text
Abstract:
This article explores the transformative impact of AI-enhanced 5G network slicing on enterprise connectivity across various industries. Network slicing represents a paradigm shift from traditional networking approaches, enabling the creation of multiple virtualized networks on shared physical infrastructure, each optimized for specific applications. While network slicing offers significant advantages over conventional models, its true potential emerges through artificial intelligence integration. The article examines how AI transforms network slicing from static configuration into dynamic, sel
APA, Harvard, Vancouver, ISO, and other styles
22

Hsieh, Caleb, Armand Ryden, and Michelle Zeidler. "1263 Mandibular Advancement Device referrals and compliance at the VA." Sleep 43, Supplement_1 (2020): A480—A481. http://dx.doi.org/10.1093/sleep/zsaa056.1257.

Full text
Abstract:
Abstract Introduction For patients with obstructive sleep apnea (OSA) who are either intolerant or otherwise non-compliant with positive airway pressure (PAP) therapy, the use of a mandibular advancement device (MAD) is a viable and minimally invasive alternative for select individuals. Many device variations exist, but the common mechanism of action involves airway augmentation via traction on the lower jaw provided by a dental appliance. Prior studies have identified factors associated with treatment success, however, actual clinical experiences fluctuate widely. To identify patients within
APA, Harvard, Vancouver, ISO, and other styles
23

Ryu, Hojeong, and Sungjun Kim. "Pseudo-Interface Switching of a Two-Terminal TaOx/HfO2 Synaptic Device for Neuromorphic Applications." Nanomaterials 10, no. 8 (2020): 1550. http://dx.doi.org/10.3390/nano10081550.

Full text
Abstract:
Memristor-type synaptic devices that can effectively emulate synaptic plasticity open up new directions for neuromorphic hardware systems. Here, a double high-k oxide structured memristor device (TaOx/HfO2) was fabricated, and its synaptic applications were characterized. Device deposition was confirmed through TEM imaging and EDS analysis. During the forming and set processes, switching of the memristor device can be divided into three types by compliance current and cycling control. Filamentary switching has strengths in terms of endurance and retention, but conductance is low. On the other
APA, Harvard, Vancouver, ISO, and other styles
24

Vostrikov, M. V., A. V. Daneyv, K. V. Menaker, and V. N. Sizykh. "EVALUATION OF THE RELIABILITY OF AN AUTOMATED FILTRATION DEVICE IN THE UPGRADED MICROPROCESSOR RELAY PROTECTION OF CONTACT NETWORK FEEDERS." Izvestiya of Samara Scientific Center of the Russian Academy of Sciences 23, no. 6 (2021): 126–39. http://dx.doi.org/10.37313/1990-5378-2021-23-6-126-139.

Full text
Abstract:
The article presents the results of scientific research in the field of assessing the reliability and safety of the patented automated device for filtering and isolating the first harmonic based on the PLL scheme integrated into a typical microprocessor system for relay protection of AC contact network feeders in order to meet the reliability and safety indicators during its operation. The operation of the device is based on pre-filtering the signal using a low-pass filter tuned to the cutoff frequency of the third harmonic, fixing zero timestamps, forming control pulses, rectification of the
APA, Harvard, Vancouver, ISO, and other styles
25

Ramadan, Zardi, Yulindon Yulindon, Yustini Yustini, and Aprinal Adila Asril. "Installation and Activation of Fiber To The Home (FTTH) Network Using Gigabit Passive Optical Network (GPON) Technology and Quality of Service (QoS) Analysis." JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development 2, no. 1 (2024): 17–24. http://dx.doi.org/10.62671/jataed.v2i1.62.

Full text
Abstract:
This research discusses the design, implementation, and evaluation of Fiber to the Home (FTTH) networks using Gigabit Passive Optical Network (GPON) technology, including network topology design, device installation, activation, and quality of service analysis. Attenuation measurements were conducted before and after activation to ensure compliance with ITU-T G.984 standards, while Quality of Service (QoS) analysis using Wireshark application evaluated parameters such as throughput, packet loss, delay, and jitter. Results show an increase in network efficiency after activation, with a decrease
APA, Harvard, Vancouver, ISO, and other styles
26

Nunday, Elizabeth Joseph. "Electronic Fiscal Device (EFD) Utilization among Entrepreneurs in Tanzania: Assessing Knowledge, Attitudes, and Challenges." East African Journal of Information Technology 8, no. 1 (2025): 46–56. https://doi.org/10.37284/eajit.8.1.2857.

Full text
Abstract:
The adoption of Electronic Fiscal Devices (EFDs) has been a critical policy initiative to enhance tax compliance and revenue collection efficiency. However, the effective utilization of EFDs among entrepreneurs in Mkuranga District, Tanzania, remains a challenge. This study examines the role of knowledge, attitudes, and operational challenges in influencing EFD adoption. Using a descriptive survey research design, data were collected from 136 entrepreneurs through structured questionnaires and analyzed using multiple regression analysis. The findings reveal that attitude significantly influenc
APA, Harvard, Vancouver, ISO, and other styles
27

Mukhin, Vadym, Pavlo Anakhov, Viktoriia Zhebka, et al. "Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards." International Journal of Computer Network and Information Security 14, no. 5 (2022): 1–10. http://dx.doi.org/10.5815/ijcnis.2022.05.01.

Full text
Abstract:
A hybrid network, which consists of the sections of communication lines with the transmission of signals of different physical nature on different transmission media, has been considered. Communication lines respond differently to threats, which allows to choose the line with the best performance for the transmission of information. The causal diagram of events that determine the state of the information transmission network, such as changes in emergency/accident-free time intervals, has been presented. The application scheme of the protection measures against dangerous events has been shown.
APA, Harvard, Vancouver, ISO, and other styles
28

Olajumoke Omotola Oyewole, Ololade Gilbert Fakeyede, Evelyn Chinedu Okeleke, Apeh Jonathan Apeh, and Olubukola Rhoda Adaramodu. "SECURITY CONSIDERATIONS AND GUIDELINES FOR AUGMENTED REALITY IMPLEMENTATION IN CORPORATE ENVIRONMENTS." Computer Science & IT Research Journal 4, no. 2 (2023): 69–84. http://dx.doi.org/10.51594/csitrj.v4i2.607.

Full text
Abstract:
This research paper explores the intricate tapestry of security considerations in integrating augmented reality (AR) within corporate landscapes. The journey begins with an in-depth literature review, providing insights into authentication, data privacy, network security, and device vulnerabilities specific to AR systems. A conceptual framework, synthesizing the augmented reality security framework with legal, ethical, and human-centric dimensions, serves as a foundational guide. The guidelines proposed outline a strategic roadmap, emphasizing policy formulation, employee training, security au
APA, Harvard, Vancouver, ISO, and other styles
29

Qin, Yabo, Zongwei Wang, Yaotian Ling, Yimao Cai, and Ru Huang. "A TaOx-Based RRAM with Improved Uniformity and Excellent Analog Characteristics by Local Dopant Engineering." Electronics 10, no. 20 (2021): 2451. http://dx.doi.org/10.3390/electronics10202451.

Full text
Abstract:
Resistive random-access memory (RRAM) with the ability to store and process information has been considered to be one of the most promising emerging devices to emulate synaptic behavior and accelerate the computation of intelligent algorithms. However, variation and limited resistance levels impede RRAM as a synapse for weight storage in neural network mapping. In this work, we investigate a TaOx-based RRAM with Al ion local doping. Compared with a device without doping, the device with locally doped Al ion exhibits excellent uniformity and analog characteristics. The operating voltage and res
APA, Harvard, Vancouver, ISO, and other styles
30

Iqbal, Adeel, Tahir Khurshaid, Yazdan Ahmad Qadri, Ali Nauman, and Sung Won Kim. "Priority-Aware Spectrum Management for QoS Optimization in Vehicular IoT." Sensors 25, no. 11 (2025): 3342. https://doi.org/10.3390/s25113342.

Full text
Abstract:
Vehicular Internet of Things (V-IoT) networks, sustained by a high-density deployment of roadside units and sensor-equipped vehicles, are currently at the edge of next-generation intelligent transportation system evolution. However, offering stable, low-latency, and energy-efficient communication in such heterogeneous and delay-prone environments is challenging due to limited spectral resources and diverse quality of service (QoS) requirements. This paper presents a Priority-Aware Spectrum Management (PASM) scheme for IoT-based vehicular networks. This dynamic spectrum access scheme integrates
APA, Harvard, Vancouver, ISO, and other styles
31

Lakhan, Abdullah, Muhammad Faisal Memon, Rahila Shah, and Amjad Ali. "A novel Primary Key infrastructure IoT enabled secure Access Control Framework Based smart home applications." VFAST Transactions on Software Engineering 13, no. 1 (2025): 37–48. https://doi.org/10.21015/vtse.v13i1.2040.

Full text
Abstract:
This paper presents a comprehensive security framework for smart home environments, integrating advanced authentication, access control mechanisms, and machine learning for robust IoT protection. A typical smart home ecosystem is illustrated with interconnected devices—air conditioning systems, robotic assistants, surveillance cameras, and thermostats—linked through a centralised wireless network that facilitates seamless communication and remote control via the internet. The framework emphasises secure authentication and authorisation processes, using public key infrastructure (PKI) to valida
APA, Harvard, Vancouver, ISO, and other styles
32

Nathani, Harshit H., Kuldeep J. Surati, Mrs Keyaben Sanket Kumar Patel, and Himani Parmar. "Networking and Server Management by Microsoft Azure Intune Portal." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2840–43. https://doi.org/10.22214/ijraset.2025.67923.

Full text
Abstract:
Abstract: This research paper explores the significance of the Microsoft Azure Intune Portal and Cloud Management Server in the administration of networking and server infrastructure within contemporary enterprises. It analyzes how these technologies optimize IT operations, bolster security, and enhance scalability by centralizing the management of mobile devices, virtual networks, and server environments. Microsoft Azure Intune offers a comprehensive solution that integrates mobile device management (MDM) and mobile application management (MAM), enabling organizations to secure and oversee th
APA, Harvard, Vancouver, ISO, and other styles
33

Bartolomei, Lorenzo, Diego Cavaliere, Alessandro Mingotti, Lorenzo Peretto, and Roberto Tinarelli. "Testing of Electrical Energy Meters Subject to Realistic Distorted Voltages and Currents." Energies 13, no. 8 (2020): 2023. http://dx.doi.org/10.3390/en13082023.

Full text
Abstract:
This paper presents a study on revenue active electrical energy meters. The huge installation along the distribution network of these devices made them a key element for energy billing, but also for monitoring the grid status. Hence, it is evident that the relevance of guaranteeing a trusty metering performance, and consequently a proper standardization, is needed. The operation of the meters is regulated by standards harmonized with the European Directive 2014/32/EU (known as MID). Still, and not infrequently, compliance to some legacy standards is declared on the device specifications. Thus,
APA, Harvard, Vancouver, ISO, and other styles
34

Alhashmi, Noora, Bashaer Aljneibi, Mahra Alameri, Richard Ikuesan, and Farkhund Iqbal. "Forensic Examinations of Alexa for Smart Home Privacy and Cybercrime Investigation." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 8–17. https://doi.org/10.34190/iccws.20.1.3390.

Full text
Abstract:
Integrating Internet of Things (IoT) devices into smart homes has necessitated the development of novel strategies to address the difficulties and complexities of cyber-attacks and privacy concerns in the current digital threat landscape. One unaddressed challenge is the lack of clarity of information collected and stored by these IoT devices in smart homes. The data storage process and privacy compliance of smart home appliances, such as security cameras, thermostats, and smart speakers, are examined in this study. More specifically, this study focuses on sensitive data storage and potential
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Dong Keun, Min-Hwi Kim, Suhyun Bang, et al. "Multilevel Switching Characteristics of Si3N4-Based Nano-Wedge Resistive Switching Memory and Array Simulation for In-Memory Computing Application." Electronics 9, no. 8 (2020): 1228. http://dx.doi.org/10.3390/electronics9081228.

Full text
Abstract:
In this research, nano-wedge resistive switching random-access memory (ReRAM) based on a Si3N4 switching layer and silicon bottom electrode was fabricated, and its multilevel switching characteristics were investigated. The wedge bottom electrode was formed by a tetramethyl ammonium hydroxide (TMAH) wet-etching process. The nano-wedge ReRAM was demonstrated to have different reset current levels by varying the compliance currents. To explain the effect of modulating the compliance currents, the switching characteristics of both the SET and RESET behaviors were shown. After measuring the device
APA, Harvard, Vancouver, ISO, and other styles
36

Fang, Shanxiang, Yao Du, Yong Zhang, Fanbo Meng, and Marcelo H. Ang. "Research on Robotic Compliance Control for Ultrasonic Strengthening of Aviation Blade Surface." Micromachines 14, no. 4 (2023): 730. http://dx.doi.org/10.3390/mi14040730.

Full text
Abstract:
In order to satisfy the requirement of the automatic ultrasonic strengthening of an aviation blade surface, this paper puts forward a robotic compliance control strategy of contact force for ultrasonic surface strengthening. By building the force/position control method for robotic ultrasonic surface strengthening., the compliant output of the contact force is achieved by using the robot’s end-effector (compliant force control device). Based on the control model of the end-effector obtained from experimental determination, a fuzzy neural network PID control is used to optimize the compliance c
APA, Harvard, Vancouver, ISO, and other styles
37

Paul, Biplob, and Muzaffar Rao. "Zero-Trust Model for Smart Manufacturing Industry." Applied Sciences 13, no. 1 (2022): 221. http://dx.doi.org/10.3390/app13010221.

Full text
Abstract:
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to emerging technologies where serverless applications are running on containers, mobile endpoints, IoT, and cyber-physical systems. Since the beginning of the fourth industrial revolution (Industry 4.0), there has been a massive investment in smart manufacturing which responds in real-time to the supply chain and connects the digital and physica
APA, Harvard, Vancouver, ISO, and other styles
38

Challener, Douglas, Priya Sampathkumar, and John O. O’Horo. "Practice Variation in Validation of Device Denominator Data for National Healthcare Safety Network Reporting." Infection Control & Hospital Epidemiology 41, S1 (2020): s354—s355. http://dx.doi.org/10.1017/ice.2020.973.

Full text
Abstract:
Background: The NHSN is a widely used CDC program for tracking healthcare-associated infections (HAIs). The goal of the NHSN is to help healthcare organizations to identify and track the incidence of HAI and to prevent adverse events as well as to simplify mandatory quality reporting to the CMS. Healthcare organizations provide both event data for HAIs and information about the population at risk. For device-related infections, device denominator data (eg, data related to urinary or intravascular catheters, and ventilators) must be collected and reported. NHSN guidelines require that electroni
APA, Harvard, Vancouver, ISO, and other styles
39

Antonov, Sergey V., Vyacheslav S. Butko, and Vladimir I. Zykov. "Searching for and warning people in buildings in case of fires and emergencies via wireless Wi-Fi network." Fire and Emergencies: prevention, elimination 3 (2023): 105–11. http://dx.doi.org/10.25257/fe.2023.3.105-111.

Full text
Abstract:
PURPOSE. The article discusses issues of searching for people in a burning building and monitoring compliance with evacuation rules to a refuge area. In case of fires or other emergencies in buildings evacuating people from technical rooms is a great concern. Management information system (MIS) model for warning of emergency in building has been worked out to solve this problem. The article is aimed at substantiating radio channel system use for searching for people during fires and emergencies via wireless Wi-Fi network. METHODS. Mobile device transmits signal powers from nearby Wi-Fi routers
APA, Harvard, Vancouver, ISO, and other styles
40

SULYMA, Volodymyr, Volodymyr GAPONOV, Leonid MESCHERYAKOV, and Vitaly KRAVCHENKO. "Design Requirements for the Device for Differentiating Pathological States of Biological Tissues." Eurasia Proceedings of Science Technology Engineering and Mathematics 29 (December 15, 2024): 311–19. https://doi.org/10.55549/epstem.1574795.

Full text
Abstract:
The appearance of the device for mini-gamma-quantum differentiation of biological tissues, the arrangement of units (research unit and control unit), units (cassette holder, electronic units, etc.) and individual parts (cassette, etc.), as well as control panels (front and rear) have ergonomic indicators that ensure convenience use (preparation for operation – ease of installation of the device on the table, connection to the electrical network and grounding, loading/unloading of biological tissue samples into/from the cassette, etc.); ease of use (ease of working with the control panel and th
APA, Harvard, Vancouver, ISO, and other styles
41

Verde, Laura, Nadia Brancati, Giuseppe De Pietro, Maria Frucci, and Giovanna Sannino. "A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–16. http://dx.doi.org/10.1145/3433993.

Full text
Abstract:
Edge Analytics and Artificial Intelligence are important features of the current smart connected living community. In a society where people, homes, cities, and workplaces are simultaneously connected through various devices, primarily through mobile devices, a considerable amount of data is exchanged, and the processing and storage of these data are laborious and difficult tasks. Edge Analytics allows the collection and analysis of such data on mobile devices, such as smartphones and tablets, without involving any cloud-centred architecture that cannot guarantee real-time responsiveness. Mean
APA, Harvard, Vancouver, ISO, and other styles
42

Haytham.B. Alaboodi. "Challenges and Recommendations for Improving Blockchain-Based Bank Transfer Security in 5G IoT Applications." Journal of Electrical Systems 20, no. 11s (2024): 1642–52. https://doi.org/10.52783/jes.7559.

Full text
Abstract:
Blockchain technology in 5G IoT applications may improve security and efficiency. This paper examines blockchain-based bank transfer security problems and solutions for IoT applications. The security improvement framework we propose uses modern cryptographic algorithms and efficient consensus procedures for 5G-enabled IoT devices. Simulations show a 35% increase in transaction validation speed, from 2.3 seconds to 1.5 seconds. The framework also reduces energy usage per transaction by 42%, making it better for resource-constrained IoT devices. Bank transfer security indicators including fraud
APA, Harvard, Vancouver, ISO, and other styles
43

Marshall, Byron, Michael Curry, Robert E. Crossler, and John Correia. "Machine Learning and Survey-based Predictors of InfoSec Non-Compliance." ACM Transactions on Management Information Systems 13, no. 2 (2022): 1–20. http://dx.doi.org/10.1145/3466689.

Full text
Abstract:
Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones’ InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectivenes
APA, Harvard, Vancouver, ISO, and other styles
44

Pareek, Pallavi, Surendra Yadav, and Surendra Singh Choudhary. "Addressing applications and security issues in the Internet of Things (IoT) : A comprehensive review." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 1977–89. http://dx.doi.org/10.47974/jdmsc-2073.

Full text
Abstract:
The Internet of Things IoT connects human beings, smart devices, smart systems and a large amount of data changing the world network. With the number of interconnected devices increasing, data protection and communication security become difficult. The number of IoT devices has increased over time, mostly in two sectors: industry and residences. What was previously presented is a complete ecosystem for Amazon Echo devices and the Alexa Voice Service. That is why Apple, Microsoft, and Google have all done the same. Platform providers are also accountable for device security since the platform t
APA, Harvard, Vancouver, ISO, and other styles
45

Segun, Adewumi Adebayo, Eleyele Dolapo Emmanuel, Alagbe Atilade George, and Azeez Ibraheem Abiodun. "DESIGN, SIMULATION AND PERFORMANCE EVALUATION OF HELICAL ANTENNA FOR 4G AND 5G MOBILE NETWORKS COMPLIANCE." Acta Electronica Malaysia 8, no. 2 (2024): 39–44. https://doi.org/10.26480/aem.02.2024.39.44.

Full text
Abstract:
The 5G cellular network aims to address bandwidth needs due to the large number of subscribers worldwide. However, higher-bandwidth antennas are needed to integrate into the design. Helical antennas offer design simplicity, gain, and wider bandwidth, but their radiation pattern narrows bandwidth as diameter and turn increase. This paper aims to develop and evaluate the performance of helical antennas at different dimensions and turns for 4G and 5G network frequency applications. The study used MATLAB 2021a to design and simulate helical antennas with various turns. Parameters like width, spaci
APA, Harvard, Vancouver, ISO, and other styles
46

Pyo, Juyeong, Seung-Jin Woo, Kisong Lee, and Sungjun Kim. "Demonstration of Threshold Switching and Bipolar Resistive Switching in Ag/SnOx/TiN Memory Device." Metals 11, no. 10 (2021): 1605. http://dx.doi.org/10.3390/met11101605.

Full text
Abstract:
In this work, we observed the duality of threshold switching and non-volatile memory switching of Ag/SnOx/TiN memory devices by controlling the compliance current (CC) or pulse amplitude. The insulator thickness and chemical analysis of the device stack were confirmed by transmission electron microscope (TEM) images of the Ag/SnOx/TiN stack and X-ray photoelectron spectroscopy (XPS) of the SnOx film. The threshold switching was achieved at low CC (50 μA), showing volatile resistive switching. Optimal CC (5 mA) for bipolar resistive switching conditions with a gradual transition was also found.
APA, Harvard, Vancouver, ISO, and other styles
47

B, Mohammed Yakoob, and G. Manoj. "Exploring the Role of Network Marketing in the Business Development : An Analysis of Managerial Perspectives." Shanlax International Journal of Management 11, S1-May (2024): 54–63. http://dx.doi.org/10.34293/management.v11is1-may.7837.

Full text
Abstract:
Network advertising and marketing, frequently called multi-level advertising has actually advanced as a prominent service growth approach particularly in the production sector. This technique promotes products and services through personal networks and word-of-mouth marketing, providing a fresh perspective for managers to consider. In the manufacturing industry, network marketing brings both potential and problems that necessitate careful consideration and strategic planning. From a managerial position, network marketing in the manufacturing sector has multiple advantages, including economical
APA, Harvard, Vancouver, ISO, and other styles
48

Rakhimov, O. S., D. N. Mirzoev, and E. I. Grachieva. "Experimental study of quality and electricity losses in low voltage rural electric networks." Power engineering: research, equipment, technology 23, no. 3 (2021): 209–22. http://dx.doi.org/10.30724/1998-9903-2021-23-3-209-222.

Full text
Abstract:
THE PURPOSE. Due to the increase in the number of farms in the Devashtichsky district of the Sughd region of Tajikistan, over the past 3-4 years, a disproportionate distribution of electricity in the 0.4 kV network has been observed. Unbalance currents of phase loads in relation to asymmetric phase voltages at the terminals of consumers of a three-phase network cause additional losses of electricity, which can reach 21% of the standard losses. In the decree of the President of the Republic of Tajikistan dated May 10, 2009 No. 29 “On energy saving and reduction of electricity losses” it is indi
APA, Harvard, Vancouver, ISO, and other styles
49

Rakhimov, O. S., D. N. Mirzoev, and E. I. Grachieva. "Experimental study of quality and electricity losses in low voltage rural electric networks." Power engineering: research, equipment, technology 23, no. 3 (2021): 224–37. http://dx.doi.org/10.30724/1998-9903-2021-23-3-209-224-237.

Full text
Abstract:
THE PURPOSE. Due to the increase in the number of farms in the Devashtichsky district of the Sughd region of Tajikistan, over the past 3-4 years, a disproportionate distribution of electricity in the 0.4 kV network has been observed. Unbalance currents of phase loads in relation to asymmetric phase voltages at the terminals of consumers of a three-phase network cause additional losses of electricity, which can reach 21% of the standard losses. In the decree of the President of the Republic of Tajikistan dated May 10, 2009 No. 29 “On energy saving and reduction of electricity losses” it is indi
APA, Harvard, Vancouver, ISO, and other styles
50

Gronwald, Jacek, Lukasz Lasyk, Jakub Barbasz, et al. "Evaluation of the constructed device along with the software for digital archiving, sending the data, and supporting the diagnosis of cervical cancer." Journal of Clinical Oncology 38, no. 15_suppl (2020): e18017-e18017. http://dx.doi.org/10.1200/jco.2020.38.15_suppl.e18017.

Full text
Abstract:
e18017 Background: The incidence and mortality of cervical cancer are high in Poland. There are effective methods of the prevention and the early diagnosis, however they require well-trained medical professionals including cytologists. Within this project we built a prototype of a new device together with implemented software to convert the currently used optical microscopes to fully independent scanning systems for cytological samples. The use of the device is intended to improve the effectiveness of cytological screening, and registration of cytological tests’ results. The features of the so
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!