Academic literature on the topic 'Enhanced electronic access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Enhanced electronic access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Enhanced electronic access"

1

Onashoga, Adebukola, Adebayo Abayomi Alli, and Timileyin Ogunseye. "Enhanced Role Based Access Control Mechanism for Electronic Examination System." International Journal of Computer Network and Information Security 6, no. 3 (February 8, 2014): 1–9. http://dx.doi.org/10.5815/ijcnis.2014.03.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moothart, Tom. "Muddy waters bring the library blues and enhanced electronic access to journals." Serials Review 23, no. 4 (December 1997): 79–82. http://dx.doi.org/10.1080/00987913.1997.10764412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shrestha, Anish Prasad, Sang-Jo Yoo, Hyoung Jin Choi, and Kyung Sup Kwak. "Enhanced Rate Division Multiple Access for Electromagnetic Nanonetworks." IEEE Sensors Journal 16, no. 19 (October 2016): 7287–96. http://dx.doi.org/10.1109/jsen.2016.2598579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Fangzhou, Li Chen, Nan Zhao, Yunfei Chen, F. Richard Yu, and Guo Wei. "NOMA-Enhanced Computation Over Multi-Access Channels." IEEE Transactions on Wireless Communications 19, no. 4 (April 2020): 2252–67. http://dx.doi.org/10.1109/twc.2019.2963654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inan, Inanc, Feyza Keceli, and Ender Ayanoglu. "Analysis of the 802.11e enhanced distributed channel access function." IEEE Transactions on Communications 57, no. 6 (June 2009): 1753–64. http://dx.doi.org/10.1109/tcomm.2009.06.0701132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li Liew, Chern, Schubert Foo, and K. R. Chennupati. "A proposed information environment for enhanced integrated access and valueadding to electronic documents." Aslib Proceedings 52, no. 2 (March 2000): 58–75. http://dx.doi.org/10.1108/eum0000000007001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ALEMSEGED, Yohannes D., Chen SUN, Ha NGUYEN TRAN, and Hiroshi HARADA. "Enhanced Media Access Scheme for Distributed Spectrum Sensing." IEICE Transactions on Communications E93-B, no. 12 (2010): 3266–73. http://dx.doi.org/10.1587/transcom.e93.b.3266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Peng, F., B. Peng, and D. Qian. "Performance analysis of IEEE 802.11e enhanced distributed channel access." IET Communications 4, no. 6 (2010): 728. http://dx.doi.org/10.1049/iet-com.2009.0035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.

Full text
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
APA, Harvard, Vancouver, ISO, and other styles
10

Arunkumar, R. Josephius, and R. Anbuselvi. "An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 239. http://dx.doi.org/10.23956/ijarcsse.v7i8.57.

Full text
Abstract:
Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and describe a new proposed model called Electronic Health Record with Multi-Clouds Databases. This model will ensure the privacy of persons in a network and multi-cloud environment using cryptographic algorithm and distributed storage. This model is able to store any type of data such as number, string, image, etc. in a cloud environment. The Electronic Health Record with Multi-Clouds Database prevent from illegal intrusion and access to data in cloud environment and provide services such as data integrity, confidentiality and permanent availability of data in a safe and secure way. The evaluation results of proposed method show that despite increasing time of information storage and retrieval and System overhead
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Enhanced electronic access"

1

Milne, Patricia A., and n/a. "The effect of enhanced electronic access to information on academics' patterns of scholarly communication at the Australian National University." University of Canberra. Information Management & Tourism, 1998. http://erl.canberra.edu.au./public/adt-AUC20050819.124920.

Full text
Abstract:
This study examined the effect of enhanced electronic access to information on patterns of scholarly communication. Using a panel typology, the academics at the Australian National University were surveyed in 1991 and again in 1994, with the data collected by means of mailed questionnaires. The research drew on the literature of scholarly communication and information-seeking behaviour. Principles of systems theory were used to explain the changes taking place within the academics' environments, including both the system of scholarly communication and the culture of the three disciplinary groupings: science, social science and the humanities. Three research questions directed the study focussing on the effect of enhanced electronic access to information on the academics' use of the library and on their patterns of information seeking and dissemination. Results found that between 1991 and 1994, while some aspects of communication technologies - such as email - had been almost universally adopted, overall, few changes had taken place in academics' information related behaviour. Scientists were more likely to have adopted the new technologies than social scientists or scholars from the humanities. However, there was strong evidence that a small group of academics were adopting the new technologies with enthusiasm suggesting that the overall pattern of use would change in the future.
APA, Harvard, Vancouver, ISO, and other styles
2

Kavishe, George Firmin. "Management of electronic information resources (EIRs) to enhance their long-term links preservation and access in the University of KwaZulu-Natal (UKZN) Pietermaritzburg (PMB) and Howard College campus libraries." Thesis, 2013. http://hdl.handle.net/10413/10771.

Full text
Abstract:
The purpose of this study was to examine the management of electronic information resources (EIRs) to enhance their long-term links preservation and access in the University of KwaZulu-Natal Pietermaritzburg (PMB) and Howard College campus libraries. The study investigated the strategies and policies used in managing EIRs, how the librarians overcome technological obsolescence, the information and communication technology (ICT) infrastructures used in the management of the EIRs and the competency of the librarians in electronic preservation. The significance of this study lay in its addressing of the issue of long-term links preservation of and access to EIRs that has not been addressed by previous studies. There is rapid growth in the creation and dissemination of EIRs which has emphasized the digital environment’s speed and ease of dissemination with little regard for its long-term preservation and access. The study population was 33 and it comprised the subject librarians, metadata librarians and electronic resources librarian of PMB and Howard College campus libraries of the University of KwaZulu-Natal. Adopting a quantitative approach the research design was that of a survey and the research instrument was a self-administered questionnaire comprising both open and closed questions. A total of 28 librarians responded to the questionnaire giving a response rate of 84.8%. Data was analyzed using SPSS. Results were presented in the form of figures and tables. The study was underpinned by the Open Archival Information System (OAIS) Reference Model, which is being used widelyin the digital preservation community. The analysis of the findings revealed that there was an intermediate level of ICT knowledge and skill with regard to management of EIRs amongst the respondents and a need for training in EIRs management particularly with regards to metadata, migration, emulation, maintenances and bit preservation techniques.It was also revealed that the libraries were using the server’s hard drive to store the EIRs. The results also showed that there were an arguably high number of respondents ten (35.7%) who indicated that their libraries did not have anEIRs management policy. For those respondents who said that their libraries do have a policy, the vast majority indicated that the policy did provide guidelines for acquiring materials in electronic form and for transforming materials from print to electronic form. Recommendations emerging from the conclusion were made and suggestions for further research put forward.
Thesis (M.I.S.)-University of KwaZulu-Natal, Pietermaritzburg, 2013.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Enhanced electronic access"

1

Affairs, United States Congress Senate Committee on Governmental. E-government Act of 2001: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 803, to enhance the management and promotion of electronic government services and processes by establishing a federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to government information and services, and for other purposes. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

E-government Act of 2001: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 803, to enhance the management and promotion of electronic government services and processes by establishing a federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to government information and services, and for other purposes. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. Committee on Governmental Affairs. E-government Act of 2001: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 803, to enhance the management and promotion of electronic government services and processes by establishing a federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to government information and services, and for other purposes. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Congress. Senate. Committee on Governmental Affairs. E-government Act of 2001: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 803, to enhance the management and promotion of electronic government services and processes by establishing a federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to government information and services, and for other purposes. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

S. 803, E-government Act of 2001: Hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session on S. 803, to enhance the management and promotion of electronic government services and processes by establishing a Federal Chief Information Officer within the Office of Management and Budget, and by establishing a broad framework of measures that require using Internet-based information technology to enhance citizen access to government information and services, and for other purposes, July 11, 2001. Washington: U.S. G.P.O., 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Associaton, Videotex Industry, Information Industry Association, and Videotex Communications, eds. Public access videotex: A directory of companies providing videotex, videodisc and other enhanced electronic services. New York, N.Y: Newspaper Advertising Bureau, Inc., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Human Physiology: From Cells to Systems, Enhanced Content Edition (with Printed Access Card Electronic Concept Mapping). 6th ed. Brooks Cole, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Khanna, Muniya S., and Tommy Chou. Electronic Communication, Telehealth, and Social Media. Edited by Thomas H. Ollendick, Susan W. White, and Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.46.

Full text
Abstract:
Explosive growth of communication technologies and increased ubiquity of Internet access in both urban and rural communities and particularly in youth have occurred. Coupled with concerns regarding limitations to traditional service provision models, researchers and practitioners are looking to affordable, acceptable technologies to expand the reach of evidence-based care and reduce barriers to intervention and unmet need in areas with few providers. This chapter describes the present literature on use of video teleconferencing, web-based programs, social media, and smartphone apps to enhance mental health intervention delivery, psychiatric assessment, and training and supervision. The strengths of the various delivery methods are discussed for providing empirically supported mental healthcare, focusing on implications related to science and practice with children and families. Outlined also are current limitations, risks, and challenges to technology-mediated services, including the significant gaps in the evidence base underlying these technologies and the legal, ethical, and safety issues that remain.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Enhanced electronic access"

1

Finotto, Stefano, Marika Carpanoni, Patrizia Copelli, Chiara Marmiroli, and Daniela Mecugni. "Computer Laboratory: The Key to Access the Electronic Databases in Learning Evidence-Based Practice." In Methodologies and Intelligent Systems for Technology Enhanced Learning, 10th International Conference. Workshops, 138–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52287-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spiliotis, Aristotelis. "User Participation and Social Integration Through ICT Technologies." In New Business Models for the Reuse of Secondary Resources from WEEEs, 109–22. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-74886-9_9.

Full text
Abstract:
AbstractUser is one of the most important stakeholder cluster and its participation can link the end of life and early stages in the life cycle of each product when considering the adoption of a circular business model. This chapter presents the main elements of the customer engagement, as identified through a State-of-the-Art analysis carried out in the context of FENIX, as well as those electronic tools in which they will be integrated together with conventional tools for the conduction of commercial activities and the tools to facilitate the interaction with the other actors and activities of FENIX within a single access point digital platform (FENIX Marketplace). The SoA analysis identified the motivational factors that promote a greater customer engagement for the participation throughout all business routes (B2B, B2C but also C2C) applicable in the project. These strategies are improved and enhanced using benefits provided by the social media for the participation in the process. The customer involvement is directly linked to the motives provided within FENIX Marketplace.
APA, Harvard, Vancouver, ISO, and other styles
3

Sankaranarayanan, Suresh, and Vigneshwaran Udayasuriyan. "Biometric Secured Electronic Health Record." In Virtual and Mobile Healthcare, 221–48. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9863-3.ch011.

Full text
Abstract:
Lot of Hospitals around the world are going through transformation from paper based to Electronic Health record system which can be accessed from anywhere. But with such Electronic health record, security is very much needed towards avoiding hackers and unauthorized personnel to access the medical record pretending as doctor or patient. Lot of research been conducted in regards to an authentication of the biometric system and security on the digital electronic health records of the health care organization. In such biometric system, there has been an increase in the false rejection ratio due to a slight difference in the positioning of the finger on the biometric scanner. The small wounds and scratches on the fingers may also lead to the false rejection of the legitimate user. So accordingly the authors in this research have developed innovative and enhanced technology of the frame based biometric authentication system by segmenting the fingerprint image towards authenticating the medical personnel. This method reduces the False Rejection Ratio (FRR) and False Acceptance Ratio (FAR) compared to neighbouring nodal and data centric method. In addition, with the frame based biometric authentication, the authors have also developed level of strictness for doctor's and patient's based on placement of finger in biometric scanner. Lastly, the authors have also developed an application which integrates Frame based biometric methodology along with RFID and GSM for access of records in a secured way and also to provide a better treatment and medicines for incoming patients.
APA, Harvard, Vancouver, ISO, and other styles
4

Stamati, Teta, and Drakoulis Martakos. "Electronic Transformation of Local Government." In E-Government Services Design, Adoption, and Evaluation, 20–38. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2458-0.ch002.

Full text
Abstract:
The paper examines the critical success factors for employees’ adoption of the unified Local Government Access Framework (LGAF), deployed for the Central Union of Municipalities and Communities of Greece. Following an extensive bibliographical survey, an initial conceptual framework (CF1) based on the Technology Acceptance Model (TAM) for LGAF adoption is proposed, which is empirically explored within sixteen Local Governments Organizations. The CF1 is revised using the structured-case approach. New concepts discovered during each research cycle revealed that LGAF adoption is a procedure of experiential judgement. The applicability of the TAM is investigated and the model is enhanced, exploring additional variables that affect perceived ease of use, perceived usefulness and actual use. A final complementary CF2 is presented and the evaluation of this model according to the data received from the case studies is discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Sebina, Peter Mazebe II Mothataesi, and Balulwami Grand. "Freedom of Information and Records Management." In Advances in Electronic Government, Digital Divide, and Regional Development, 94–100. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5868-4.ch007.

Full text
Abstract:
The adoption of e-Government programmes in Africa have been occasioned by the desire to improve public service delivery and to further enhance the government-citizen relationship through provision of access to information. Key to e-Government is information- its creation, management, and uploading onto a defined platform; its consistent updating and archiving; and its access by citizens irrespective of their level of education, social standing, or geographical location. The main outcome of e-Government is enhanced accountability of the governance process. Accountability in e-Government is a value-add to the government-citizen relationship in that citizens become assured that government will account to them as collaborators in the governance process. The reality in Africa is that the adoption of e-Government on its own is unlikely to yield the needed accountability mechanism. This chapter argues that an e-Government programme in Africa, supported by Freedom of Information and records management will result in governance which is both accountable and integral.
APA, Harvard, Vancouver, ISO, and other styles
6

Gautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 944–56. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch044.

Full text
Abstract:
Recently, the electronic heath record (EHR) has become the chosen method to maintain a patient's health information. The advancement of cloud computing enables users to access their data with flexibility, providing large storage capability at low costs, which encourages EHR maintainers to consider shifting from their own storage to the cloud. In cloud computing, it is no doubt that securing EHRs poses a gigantic challenge. Various security properties like access control, data privacy, and scalable access between different clouds needs to be satisfied. This article presents a secure and efficient blueprint for securing data confidentiality on cloud computing storage. The proposed framework is carried out for EHR confidential data on cloud storage. Moreover, the proposed approach combines the obfuscation and RSA encryption together to enforce confidentiality and authentication. Through this framework, the data confidentiality and authentication scheme on EHR information can be enforced on clouds storage.
APA, Harvard, Vancouver, ISO, and other styles
7

Habibi, Ali Mohamed, and Ann Dashwood. "Changing the LAB Experience in Undergraduate Engineering." In Technology-Enhanced Formative Assessment Practices in Higher Education, 215–39. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0426-0.ch011.

Full text
Abstract:
The use of technology to enhance formative assessment in higher education continues to be a challenge regardless of advances in digital capabilities; yet research has shown its potential regardless of discipline. In undergraduate electrical and electronic engineering, which is the discipline focus in this chapter, lab work is an area that can be enhanced in this way but with such an enhancement comes a change in pedagogy from the conventional approach of in-lab physical practical work conducted by the individual student alone or in a group with limited support to one of working collaboratively in remote access laboratories scattered far and wide through an online learning systems that provides access to laboratory infrastructure and learning environments through the internet. In a collaborative learning environment, students work together to solve problems and need to become involved in dialogue to achieve a common goal where they depend on and are accountable to each other. This chapter explores students' experience of a collaborative approach to lab work regarding mastery of the voltage division rule and its relevance to formative assessment using remote access laboratories that depend on technology and internet access. The implications for task design and formative assessment are discussed based on the results of interviews with participating students. The nature of change in pedagogical practice is highlighted as are the implications for the design of formative assessment and the need to work at the level of “feedback markers” that are able to feed forward to progress learning.
APA, Harvard, Vancouver, ISO, and other styles
8

Bouarara, Hadj Ahmed. "Enhanced Bio-Inspired Algorithms for Detecting and Filtering Spam." In Global Implications of Emerging Technology Trends, 179–215. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4944-4.ch011.

Full text
Abstract:
The internet era promotes electronic commerce and facilitates access to many services. In today's digital society, the explosion in communication has revolutionized the field of electronic communication. Unfortunately, this technology has become incontestably the original source of malicious activities, especially the plague called undesirables email (SPAM) that has grown tremendously in the last few years. This chapter unveils fresh bio-inspired techniques (artificial social cockroaches [ASC], artificial haemostasis system [AHS], and artificial heart lungs system [AHLS]) and their application for SPAM detection. For the experimentation, the authors used the benchmark SMS Spam corpus V.0.1 and the validation measures (recall, precision, f-measure, entropy, accuracy, and error). They optimize the sensitive parameters of each algorithm (text representation technique, distance measure, weightings, and threshold). The results are positive compared to the result of artificial social bees and machine-learning algorithms (decision tree C4.5 and K-means).
APA, Harvard, Vancouver, ISO, and other styles
9

Tawileh, Wissam, Helena Bukvova, and Eric Schoop. "Virtual Collaborative Learning." In Cyber Behavior, 620–42. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5942-1.ch031.

Full text
Abstract:
New technologies are used increasingly to enhance people's lives in many fields, and education is a very important sector that can benefit from technological development. The idea of using technology to facilitate and enhance learning, known as electronic learning, has led to the development of a wide range of applications and implementations worldwide. Electronic learning can offer new opportunities for developing countries by increasing access to education and improving learning outcomes. This chapter presents Virtual Collaborative Learning (VCL) as a modern technology-enhanced team-learning arrangement based on a constructivist learning paradigm. By utilizing Web 2.0 tools to empower and enhance classical e-Learning methods, VCL reaches far beyond classical Web-Based Training. Opportunities and challenges of VCL for developing countries will be discussed based on a long European teaching and research experience.
APA, Harvard, Vancouver, ISO, and other styles
10

Tatnall, Arthur, Stephen Burgess, and Mohini Singh. "Community and Regional Portals in Australia." In Electronic Commerce in Small to Medium-Sized Enterprises, 304–21. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-146-9.ch018.

Full text
Abstract:
The importance of Web portals to small business has increased considerably in recent years. There are many different types of portals, but this chapter examines the use of community and regional portals by small businesses in Australia. In the chapter, two Australian regional portals are contrasted with the more generic e-malls, and the advantages of each are discussed. We show how portals can be used to advantage by small businesses in several different settings. Benefits to small business include: greater customer loyalty, improved business relationships, enhanced e-business trust, lower cost of infrastructure, ease of access to advice, and expanded business opportunities.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Enhanced electronic access"

1

Aubrey, Steve. "An immersive display with enhanced user/data access." In Electronic Imaging 2004, edited by Andrew J. Woods, John O. Merritt, Stephen A. Benton, and Mark T. Bolas. SPIE, 2004. http://dx.doi.org/10.1117/12.532451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Addas, Rima, and Ning Zhang. "An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records." In 2014 Ninth International Conference on Availability, Reliability and Security (ARES). IEEE, 2014. http://dx.doi.org/10.1109/ares.2014.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shi, Zhi-yong, Jia Liu, and Qing-bo Ou. "An Enhanced Secure Access Scheme Based on SIP in 3G Network." In 2009 International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2009. http://dx.doi.org/10.1109/ieec.2009.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kaur, Navjot, P. W. C. Prasad, Abeer Alsadoon, L. Pham, and A. Elchouemi. "An enhanced model of biometric authentication in E-Learning: Using a combination of biometric features to access E-Learning environments." In 2016 International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES). IEEE, 2016. http://dx.doi.org/10.1109/icaees.2016.7888025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Batra, Pulkit. "Automotive Anti-Theft System." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46037.

Full text
Abstract:
Automotive Theft has been a persistent problem around the world. Design and manufacture of anti-theft systems have become more and more intricate due to the rise in complexity of theft in the system. Most of the anti-theft systems existing in the market, are the alarm types which audibly prevent some thieves away but do not prevent one’s car from being stolen and even are not good enough to meet the growing complexity of theft in the country. This paper presents a simple and an efficient anti-theft system which provides enhanced security by the use of efficient access mechanisms and immobilization systems. This security system can immobilise an automobile and its key auto systems through remote control when it is stolen. It hence deters thieves from committing the theft. It also effectively prevents stealing of key auto systems for reselling by introducing four layers of security features written in the form of firmware and embedded on the Electronic Control Units (ECUs). The particulars of system design and operation are defined in the paper. The experimental outcomes show that this system is feasible and the owner can steadily control his vehicle within a few seconds.
APA, Harvard, Vancouver, ISO, and other styles
6

Altmann, F., C. Schmidt, J. Beyersdorfer, M. Simon-Najasek, C. Große, F. Schrank, and J. Kraft. "Enhanced Failure Analysis on Open TSV Interconnects." In ISTFA 2012. ASM International, 2012. http://dx.doi.org/10.31399/asm.cp.istfa2012p0055.

Full text
Abstract:
Abstract In this paper different methods and novel tools for failure localisation and high resolution material analysis for open TSV interconnects will be discussed. The paper shows the application of enhanced methods for the localisation of sidewall shorts in open TSV structures by adapted Photoemission Microscopy (PEM), Lock-in Thermography (LIT) and Electron Beam Absorbed Imaging (EBAC). In addition, a new highly efficient target preparation technique is presented, which allows the combination of Laser and FIB milling, in order to access TSV sidewall defects. Finally the use of this technique is demonstrated in a failure analysis case study.
APA, Harvard, Vancouver, ISO, and other styles
7

Jin-Bum Hwang and Jong-Wook Han. "Privacy enhanced access control mechanism for home networks." In 2005 12th IEEE International Conference on Electronics, Circuits and Systems - (ICECS 2005). IEEE, 2005. http://dx.doi.org/10.1109/icecs.2005.4633550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hryhorova, T. A., and O. S. Moskalenko. "Enhanced access to training information in E-learning systems." In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2018. http://dx.doi.org/10.23919/mipro.2018.8400124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hasan, Mohammad H., Fadi Alsaleem, Amin Abbasalipour, Siavash Pourkamali Anaraki, Muhammad Emad-Un-Din, and Roozbeh Jafari. "Machine Learning Augmentation in Micro-Sensor Assemblies." In ASME 2020 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/detc2020-22665.

Full text
Abstract:
Abstract The size and power limitations in small electronic systems such as wearable devices limit their potential. Significant energy is lost utilizing current computational schemes in processes such as analog-to-digital conversion and wireless communication for cloud computing. Edge computing, where information is processed near the data sources, was shown to significantly enhance the performance of computational systems and reduce their power consumption. In this work, we push computation directly into the sensory node by presenting the use of an array of electrostatic Microelectromechanical systems (MEMS) sensors to perform colocalized sensing-and-computing. The MEMS network is operated around the pull-in regime to access the instability jump and the hysteresis available in this regime. Within this regime, the MEMS network is capable of emulating the response of the continuous-time recurrent neural network (CTRNN) computational scheme. The network is shown to be successful at classifying a quasi-static input acceleration waveform into square or triangle signals in the absence of digital processors. Our results show that the MEMS may be a viable solution for edge computing implementation without the need for digital electronics or micro-processors. Moreover, our results can be used as a basis for the development of new types of specialized MEMS sensors (ex: gesture recognition sensors).
APA, Harvard, Vancouver, ISO, and other styles
10

Tyagi, Manoj, Manish Manoria, and Bharat Mishra. "An enhanced access control and data security framework for cloud application." In 2019 International Conference on Electrical, Electronics and Computer Engineering (UPCON). IEEE, 2019. http://dx.doi.org/10.1109/upcon47278.2019.8980079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography