Search results for "oriente"
showing 10 items of 684 documents
Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development
2019
The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
Database Versioning 2.0, a Transparent SQL Approach Used in Quantitative Management and Decision Making
2015
Abstract Managerial decisions are based on accurate information and in today's time raw data is produced even with a stroke of a key. Regardless of the data creating process one needs to know how the information was extracted and which pool of data was used. One important factor is time therefore we need to structure it in layers of data history in such a way that it can be analyzed, (post)process, in order to be able to retrieve valuable information. The simplest way is to use a Database Management System (DBMS), but even with such a management system we face the issue of making it a self-contained database on each version of data added. Our proposed system, a continuation of previous work…
Cold recycling of reclaimed asphalt pavements
2018
Pavement engineers have in front of them multiple challenges linked to addressing issues related to social development and society’s expanding needs. One of the most substantial of these issues is perhaps how to effectively rehabilitate and/ or maintain the existing road network while preserving and sustaining limited natural resources. The re-usage of existing pavement materials to reconstruct/ rehabilitate our future pavements is the solution that is now more and more selected by the different road administrations around the world. However, upon closer inspection, one can find many areas and details, not negligible issues, that are simply extensions of HMA technology (i.e. mix design proc…
Rev. of. M. J. Geller, Melothesia in Babylonia: Medicine, Magic, and Astrology in the Ancient Near East
2015
Understanding the crowdfunding phenomenon and its implications for sustainability
2019
Abstract Nonetheless the large body of knowledge rapidly accumulated on crowdfunding as well as the growing relevance of this phenomenon for sustainability, there are very few studies on the role of crowdfunding for sustainability-oriented projects, and many related issues are still far from being fully understood. This signalises a clear need for unveiling the main dynamics of the relationship between crowdfunding and sustainability, and also opening up useful directions for future research on this relationship. To conceptualize the implications of crowdfunding for sustainability, we propose and use a framework, encompassing five dimensions, namely the project creator, the backers, the cam…
Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive
2014
Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…
Pottery of Phases 16-19” and "Pottery of Phases 20-23" in: Pfälzner, P. – Qasim, H. A. “Urban developments in North-Eastern Mesopotamia from the Nine…
2019
Pottery comes from various debris layers (mainly A16 to A18) and from floor layers of the domestic building of Phase A19.
The Ninevite 5 pottery assemblage of Phase A25 from the extra-mural dwellings and the kiln. In P. Pfaelzner and A. H. Hasim "From Akkadian Maridaban …
2021
The focus of the 2018 and 2019 excavations at Bassetki was on investigating the beginning of the city in the Ninevite 5 period, its importance in the Akkadian and Old Babylonian periods, and its function as a governor’s seat in Middle Assyrian times. Thus, the main stages of the urban development of Maridaban/Mardaman/Mardama can be traced, which are also documented textually. Der Fokus der Ausgrabungen 2018 und 2019 in Bassetki lag auf der Untersuchung des Beginns der Stadtanlage in der Ninive 5-Periode, ihrer Bedeutung in der Akkad- und der Altbabylonischen Zeit sowie ihrer Funktion als Statthaltersitz in Mittelassyrischer Zeit. Damit können die wesentlichen Etappen der Stadtentwicklung v…