Academic literature on the topic 'Ubiquitous Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ubiquitous Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ubiquitous Network"

1

Morikawa, Hiroyuki. "Realizing the Ubiquitous Network." IEEJ Transactions on Electronics, Information and Systems 124, no. 1 (2004): 12–17. http://dx.doi.org/10.1541/ieejeiss.124.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rueangprathum, Atchara, Somchai Limsiroratana, and Suntorn Witosurapot. "Enabling Semantic-Based Ubiquitous Learning in UPnP Network Environment." International Journal of Information and Education Technology 5, no. 10 (2015): 794–98. http://dx.doi.org/10.7763/ijiet.2015.v5.613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Yu-Cheng, and Toly Chen. "A ubiquitous manufacturing network system." Robotics and Computer-Integrated Manufacturing 45 (June 2017): 157–67. http://dx.doi.org/10.1016/j.rcim.2015.10.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

CHANG, K., and Y. J. YOON. "Antennas for Ubiquitous Sensor Network." IEICE Transactions on Communications E91-B, no. 6 (June 1, 2008): 1697–704. http://dx.doi.org/10.1093/ietcom/e91-b.6.1697.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Toliupa, Sergey, Yuriy Kravchenko, and Aleksander Trush. "ORGANIZATION OF IMPLEMENTATION OF UBIQUITOUS SENSOR NETWORKS." Informatics Control Measurement in Economy and Environment Protection 8, no. 1 (February 28, 2018): 36–39. http://dx.doi.org/10.5604/01.3001.0010.8643.

Full text
Abstract:
The article deals with the implementation of one of the most promising technologies of the 21st century – the permeable sensor networks of the USN. The features, architecture, organization and routing algorithms of sensory networks are described. It is determined that further improvement of the work of such networks requires standardization of the development process and implementation process. USN's Vertical Sensor Networks is one of the most promising technologies of the 21st century. Cheap and "smart" sensors, in large quantities combined into a wireless network connected to the public communications network, today provide an unprecedentedly wide range of control and management services for buildings, businesses, cars, and so forth. USN networks, depending on the type of sensors, can be deployed on the ground, in the air, under and over water, in buildings and, finally, on the skin and inside living organisms, including humans. They are also widely used in such important areas as military affairs, crisis and emergency management, and the fight against terrorism.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Joohwan, Doohee Nam, and Sungjoon Baek. "Bird's-Eye View Service under Ubiquitous Transportation Sensor Network Environments." Journal of the Institute of Webcasting, Internet and Telecommunication 13, no. 2 (April 30, 2013): 225–31. http://dx.doi.org/10.7236/jiibc.2013.13.2.225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Feltus, Christophe. "AI’S Contribution to Ubiquitous Systems and Pervasive Networks Security – Reinforcement Learning vs Recurrent Networks." Journal of Ubiquitous Systems and Pervasive Networks 15, no. 02 (March 1, 2021): 01–09. http://dx.doi.org/10.5383/juspn.15.02.001.

Full text
Abstract:
Reinforcement learning and recurrent networks are two emerging machine-learning paradigms. The first learns the best actions an agent needs to perform to maximize its rewards in a particular environment and the second has the specificity to use an internal state to remember previous analysis results and consider them for the current one. Research into RL and recurrent network has been proven to have made a real contribution to the protection of ubiquitous systems and pervasive networks against intrusions and malwares. In this paper, a systematic review of this research was performed in regard to various attacks and an analysis of the trends and future fields of interest for the RL and recurrent network-based research in network security was complete.
APA, Harvard, Vancouver, ISO, and other styles
8

Almuhaideb, Abdullah Mohammed, and Bala Srinivasan. "Authentication in Ubiquitous Networking." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 57–83. http://dx.doi.org/10.4018/ijisp.2015070104.

Full text
Abstract:
Mobile authentication is an essential service to ensure the security of engaging parties in a ubiquitous wireless network environment. Several solutions have been proposed mainly based on both centralised and distributed authentication models to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, namely flexibility, security and performance issues and vulnerabilities. These shortcomings are influenced by the resource limitations of both wireless networks and the mobile devices together with inter-technology and inter-provider challenges. In this paper, the authors reviewed the major techniques in the field of ubiquitous mobile access authentication, which has attracted many researchers in the past decade. After investigating existing mobile authentication models and approaches, the common challenges are summarised to serve as the solution key requirements. The identified key solution requirements allow analysing and evaluating mobile authentication approaches.
APA, Harvard, Vancouver, ISO, and other styles
9

Zittrain, Jonathan. "Ubiquitous human computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3813–21. http://dx.doi.org/10.1098/rsta.2008.0116.

Full text
Abstract:
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Shakarchi, Eddie, Pasquale Cozza, Andrew Harrison, Carlo Mastroianni, Matthew Shields, Domenico Talia, and Ian Taylor. "Distributing Workflows over a Ubiquitous P2P Network." Scientific Programming 15, no. 4 (2007): 269–81. http://dx.doi.org/10.1155/2007/191393.

Full text
Abstract:
This paper discusses issues in the distribution of bundled workflows across ubiquitous peer-to-peer networks for the application of music information retrieval. The underlying motivation for this work is provided by the DART project, which aims to develop a novel music recommendation system by gathering statistical data using collaborative filtering techniques and the analysis of the audio itsel, in order to create a reliable and comprehensive database of the music that people own and which they listen to. To achieve this, the DART scientists creating the algorithms need the ability to distribute the Triana workflows they create, representing the analysis to be performed, across the network on a regular basis (perhaps even daily) in order to update the network as a whole with new workflows to be executed for the analysis. DART uses a similar approach to BOINC but differs in that the workers receive input data in the form of a bundled Triana workflow, which is executed in order to process any MP3 files that they own on their machine. Once analysed, the results are returned to DART's distributed database that collects and aggregates the resulting information. DART employs the use of package repositories to decentralise the distribution of such workflow bundles and this approach is validated in this paper through simulations that show that suitable scalability is maintained through the system as the number of participants increases. The results clearly illustrate the effectiveness of the approach.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Ubiquitous Network"

1

Sareh, Said Adel Mounir. "Ubiquitous sensor network in the NGN environment." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0016/document.

Full text
Abstract:
Ubiquitous Sensor Network (USN) est un réseau conceptuel construit sur des réseaux physiques existantes. Il se sert des données détectées et fournit des services de connaissances à quiconque, n'importe où et à tout moment, et où l'information est générée en utilisant la sensibilité au contexte. Dispositifs et USN portables intelligents émergent rapidement en offrant de nombreux services fiables facilitant la vie des gens. Ces petits terminaux et terminaux très utiles besoin d'un substrat de communication globale pour fournir un service complet de l'utilisateur final global. En 2010, ITU -T a fourni les exigences pour supporter des applications et services USN dans le Next Generation Network (NGN) de l'environnement d'exploiter les avantages du réseau de base. L'un des principaux marchés prometteurs pour l'application et les services USN est la e- santé. Il fournit le suivi des patients en continu et permet une grande amélioration dans les services médicaux. D'autre part, des Véhicules Ad-hoc NETwork (VANET) est une technologie émergente qui permet une communication intelligente entre les véhicules mobiles. Intégrer VANET avec USN a un grand potentiel pour améliorer la sécurité routière et la fluidité du trafic. La plupart des applications VANET sont appliqués en temps réel et ils sont sensibles à retarder, en particulier ceux liés à la sécurité et à la santé. Dans ce travail, nous proposons d'utiliser l'IP Multimédia Subsystem (IMS) comme une sous- couche de contrôle de service dans l'environnement USN fournir un substrat mondiale pour un service complet de bout en bout. De plus, nous vous proposons d'intégrer VANETs avec USN pour des applications et des installations riches plus, ce qui facilitera la vie des humains. Nous avons commencé à étudier les défis sur la route pour atteindre cet objectif
Ubiquités Sensor Network (USN) is a conceptual network built over existing physical networks. It makes use of sensed data and provides knowledge services to anyone, anywhere and at anytime, and where the information is generated by using context awareness. Smart wearable devices and USNs are emerging rapidly providing many reliable services facilitating people life. Those very useful small end terminals and devices require a global communication substrate to provide a comprehensive global end user service. In 2010, the ITU-T provided the requirements to support USN applications and services in the Next Génération Network (NGN) environment to exploit the advantages of the core network. One of the main promising markets for the USN application and services is the e-Health. It provides continuous patients’ monitoring and enables a great improvement in medical services. On the other hand, Vehicular Ad-Hoc NETwork (VANET) is an emerging technology, which provides intelligent communication between mobile vehicles. Integrating VANET with USN has a great potential to improve road safety and traffic efficiency. Most VANET applications are applied in real time and they are sensitive to delay, especially those related to safety and health. In this work, we propose to use IP Multimedia Subsystem (IMS) as a service controller sub-layer in the USN environment providing a global substrate for a comprehensive end-to-end service. Moreover, we propose to integrate VANETs with USN for more rich applications and facilities, which will ease the life of humans. We started studying the challenges on the road to achieve this goal
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, W. Y. (Wan-Young). "Ubiquitous healthcare system based on a wireless sensor network." Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514292903.

Full text
Abstract:
Abstract This dissertation aimed at developing a multi-modal sensing u-healthcare system (MSUS), which reflects the unique properties of a healthcare application in a wireless sensor network. Together with health parameters, such as ECG, SpO2 and blood pressure, the system also transfers context-aware data, including activity, position and tracking data, in a wireless sensor network environment at home or in a hospital. Since packet loss may have fatal consequences for patients, health-related data are more critical than most other types of monitoring data. Thus, compared to environmental, agricultural or industrial monitoring, healthcare monitoring in a wireless environment imposes different requirements and priorities. These include heavy data traffic with wavelike parameters in wireless sensor network and fatal data loss due to the traffic. To ensure reliable data transfer in a wireless sensor network, this research placed special emphasis on the optimization of sampling rate, packet length and transmission rate, and on the traffic reduction method. To improve the reliability and accuracy of diagnosis, the u-healthcare system also collects context-aware information on the user’s activity and location and provides real-time tracking. Waveform health parameters, such as ECG, are normally sampled in the 100 to 400 Hz range according to the monitoring purpose. This type of waveform data may incur a heavy burden in wireless communication. To reduce wireless traffic between the sensor nodes and the gateway node, the system utilizes on-site ECG analysis implemented on the sensor nodes as well as query architecture. A 3D VRML viewer was also developed for the realistic monitoring of the user’s moving path and location. Two communication methods, an 802.15.4-based wireless sensor network and a CDMA cellular network are used by sensors placed on the users’ bodies to gather medical data, which is then transmitted to a server PC at home or in the hospital, depending on whether the sensor is within or outside the range of the wireless sensor network.
APA, Harvard, Vancouver, ISO, and other styles
3

Lipshin, Jason Martin. "Network design : a theory of scale for ubiquitous computing." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/89972.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Comparative Media Studies, 2014.
"June 2014." Cataloged from PDF version of thesis.
Includes bibliographical references (pages 126-141).
Ubiquitous computing (aka "ubicomp") describes the process of embedding computation into everyday things. From smart toasters and smart shoes to smart toys and smart buildings, ubicomp describes user experiences which are both big and small and which operate at a wide variety of scales and gradations in between. However, existing research in new media studies and human computer interaction does not adequately address this question of scale in relation to ubiquitous computing. In this thesis, I propose a more robust theoretical framework I call "network design." It argues that differently scaled ubicomp systems have their own potentials and challenges, histories and precedents, material affordances and ethical implications. This thesis identifies and analyzes the operation of ubiquitous computing networks at three scales: the body scale, the architectural scale and the urban scale. The case studies for each chapter, respectively, include: exercise wristwatches and quantified self literature, responsive environments like smart homes and smart offices, and smart city initiatives dealing with sensors placed in urban infrastructure. In each scale, I identify common characteristics of that scale, historical precedents, as well what happens when this particular kind of network "scales up" or "scales down." Thus, although I am interested in describing the unique characteristics of differently scaled ubicomp networks, I am also interested in describing situations when scales interact.
by Jason Martin Lipshin.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, R. J. (Russell J. ). "Solutions for ubiquitous information services : multiple protocols and scalable servers." Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/8489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Junkang. "Ubiquitous communications for wireless personal area networks in a heterogeneous environment." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/6497.

Full text
Abstract:
The widespread use of wireless technologies has led to a tremendous development in wireless communication systems. Currently, an individual mobile user may carry multiple personal devices with multiple wireless interfaces, which can interconnect with each other to form a Wireless Personal Area Network (WPAN) which moves with this user. These devices exist in a heterogeneous environment which is composed of various wireless networks with differing coverage and access technologies and also the topology, device conditions and wireless connections in the WPAN may be dynamically changing. Such individual mobile users require ubiquitous communications anytime, anywhere, with any device and wish content to be efficiently and continuously transferred across the various wireless networks both outside and inside WPANs, wherever they move. This thesis presents research carried out into how to implement ubiquitous communications for WPANs in such an environment. Two main issues are considered. The first is how to initiate content transfer and keep it continuous, no matter which wireless network is used as a user moves or how the WPAN changes dynamically. The second is how to implement this transfer in the most efficient way: selecting the most suitable transfer mode for a WPAN according to the user’s and application’s requirements. User-centric (personal-area-centric) and contentcentric mechanisms are proposed in this thesis to address these issues. A scheme based on a Personal Distributed Environment (PDE) concept and designed as a logical user-based management entity is presented. This is based on three mechanisms which are proposed to overcome the technical problems in practical scenarios, which cannot be solved by existing approaches. A novel mechanism is proposed to combine local direct and global mobile communications, in order to implement ubiquitous communications in both infrastructure-less and infrastructurebased networks. This enables an individual user’s ubiquitous communications to be initiated in an infrastructure-less network environment and kept continuous when they move across infrastructure-based networks. Its advantages are evaluated by a performance analysis model and compared to existing solutions and verified by experiments. A cooperation and management scheme is also proposed for dynamic changes of multiple mobile routers and flexible switching of personal device roles in a WPAN while keeping ongoing ubiquitous communications continuous. This adopts a novel view of WPANs which solves the addressing problems caused by changes of mobile routers and makes these transparent to personal devices in the WPAN and external content sources. It provides an efficient method for changing the mobile router of a single WPAN or a WPAN merging with another moving network. Its benefits are demonstrated through performance analysis models. Finally, a novel user-centric and contentcentric mechanism for decision making, to select the most appropriate mobile router in a dynamically changing WPAN environment is proposed. This selects the most suitable content transfer mode for the WPAN to fulfil an individual user’s various requirements. It has different strategies to suit various types of applications. Selection results are demonstrated to verify the proposed mechanism in multiple scenarios of changing user requirements, applications and WPAN conditions.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Weisong. "A pervasive information framework based on semantic routing and cooperative caching." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B31065326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Weisong, and 陳偉松. "A pervasive information framework based on semantic routing and cooperative caching." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31065326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prakash, Abhinav. "Rendering Secured Connectivity in a Wireless IoT Mesh Network with WPAN's and VANET's." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1491557510577536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wullems, Christian John. "Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16707/1/Christian_Wullems_Thesis.pdf.

Full text
Abstract:
Context-aware computing has been a rapidly growing research area, however its uses have been predominantly targeted at pervasive applications for smart spaces such as smart homes and workplaces. This research has investigated the use of location and other context data in access control policy, with the purpose of augmenting existing IP and application-layer security to provide fine-grained access control and effective enforcement of security policy. The use of location and other context data for security purposes requires that the technologies and methods used for acquiring the context data are trusted. This thesis begins with the description of a framework for the analysis of location systems for use in security services and critical infrastructure. This analysis classifies cooperative locations systems by their modes of operation and the common primitives they are composed of. Common location systems are analyzed for inherent security flaws and limitations based on the vulnerability assessment of location system primitives and the taxonomy of known attacks. An efficient scheme for supporting trusted differential GPS corrections is proposed, such that DGPS vulnerabilities that have been identified are mitigated. The proposal augments the existing broadcast messaging protocol with a number of new messages facilitating origin authentication and integrity of broadcast corrections for marine vessels. A proposal for a trusted location system based on GSM is presented, in which a model for tamper resistant location determination using GSM signaling is designed. A protocol for association of a user to a cell phone is proposed and demonstrated in a framework for both Web and Wireless Application Protocol (WAP) applications. After introducing the security issues of existing location systems and a trusted location system proposal, the focus of the thesis changes to the use of location data in authorization and access control processes. This is considered at both the IP-layer and the application-layer. For IP-layer security, a proposal for location proximity-based network packet filtering in IEEE 802.11 Wireless LANs is presented. This proposal details an architecture that extends the Linux netfilter system to support proximity-based packet filtering, using methods of transparent location determination through the application of a pathloss model to raw signal measurements. Our investigation of application-layer security resulted in the establishment of a set of requirements for the use of contextual information in application level authorization. Existing network authentication protocols and access control mechanisms are analyzed for their ability to fulfill these requirements and their suitability in facilitating context-aware authorization. The result is the design and development of a new context-aware authorization architecture, using the proposed modifications to Role-based Access Control (RBAC). One of the distinguishing characteristics of the proposed architecture is its ability to handle authorization with context-transparency, and provide support for real-time granting and revocation of permissions. During the investigation of the context-aware authorization architecture, other security contexts in addition to host location were found to be useful in application level authorization. These included network topology between the host and application server, the security of the host and the host execution environment. Details of the prototype implementation, performance results, and context acquisition services are presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Wullems, Christian John. "Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16707/.

Full text
Abstract:
Context-aware computing has been a rapidly growing research area, however its uses have been predominantly targeted at pervasive applications for smart spaces such as smart homes and workplaces. This research has investigated the use of location and other context data in access control policy, with the purpose of augmenting existing IP and application-layer security to provide fine-grained access control and effective enforcement of security policy. The use of location and other context data for security purposes requires that the technologies and methods used for acquiring the context data are trusted. This thesis begins with the description of a framework for the analysis of location systems for use in security services and critical infrastructure. This analysis classifies cooperative locations systems by their modes of operation and the common primitives they are composed of. Common location systems are analyzed for inherent security flaws and limitations based on the vulnerability assessment of location system primitives and the taxonomy of known attacks. An efficient scheme for supporting trusted differential GPS corrections is proposed, such that DGPS vulnerabilities that have been identified are mitigated. The proposal augments the existing broadcast messaging protocol with a number of new messages facilitating origin authentication and integrity of broadcast corrections for marine vessels. A proposal for a trusted location system based on GSM is presented, in which a model for tamper resistant location determination using GSM signaling is designed. A protocol for association of a user to a cell phone is proposed and demonstrated in a framework for both Web and Wireless Application Protocol (WAP) applications. After introducing the security issues of existing location systems and a trusted location system proposal, the focus of the thesis changes to the use of location data in authorization and access control processes. This is considered at both the IP-layer and the application-layer. For IP-layer security, a proposal for location proximity-based network packet filtering in IEEE 802.11 Wireless LANs is presented. This proposal details an architecture that extends the Linux netfilter system to support proximity-based packet filtering, using methods of transparent location determination through the application of a pathloss model to raw signal measurements. Our investigation of application-layer security resulted in the establishment of a set of requirements for the use of contextual information in application level authorization. Existing network authentication protocols and access control mechanisms are analyzed for their ability to fulfill these requirements and their suitability in facilitating context-aware authorization. The result is the design and development of a new context-aware authorization architecture, using the proposed modifications to Role-based Access Control (RBAC). One of the distinguishing characteristics of the proposed architecture is its ability to handle authorization with context-transparency, and provide support for real-time granting and revocation of permissions. During the investigation of the context-aware authorization architecture, other security contexts in addition to host location were found to be useful in application level authorization. These included network topology between the host and application server, the security of the host and the host execution environment. Details of the prototype implementation, performance results, and context acquisition services are presented.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Ubiquitous Network"

1

Kumar, Navin, M. Vinodhini, and Ranga Rao Venkatesha Prasad, eds. Ubiquitous Communications and Network Computing. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79276-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Navin, and Arpita Thakre, eds. Ubiquitous Communications and Network Computing. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73423-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Navin, and R. Venkatesha Prasad, eds. Ubiquitous Communications and Network Computing. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20615-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Teddy, Mantoro, and SpringerLink (Online service), eds. Trustworthy Ubiquitous Computing. Paris: Atlantis Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garbinato, Benoît. Middleware for Network Eccentric and Mobile Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, and Korea (South) Chŏngbo Tʻongsinbu, eds. USN kiban haeksim ŭngyong sŏbisŭ kisul kaebal =: Development of core application service technology based on Ubiquitous Sensor Network. [Seoul]: Chŏngbo Tʻongsinbu, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. [Seoul]: Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vasseur, Jean-Philippe. Interconnecting smart objects with IP: The next Internet. Burlington, MA: Morgan Kaufmann Publishers/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Interconnecting smart objects with IP: The next Internet. Burlington, MA: Morgan Kaufmann Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ubiquitous positioning. Boston: Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Ubiquitous Network"

1

Aouami, Rachid, Rashedul Hoque, and Sébastien Roy. "Load Balancing and Network Life in Linear Wireless Sensor Networks." In Ubiquitous Networking, 133–46. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86356-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srinivasan, Ramesh, and J. J. Garcia-Luna-Aceves. "Optimized Network Coding with Real-Time Loss Prediction for Hybrid 5G Networks." In Ubiquitous Networking, 82–97. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29419-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amato, Giuseppe, Mathias Broxvall, Stefano Chessa, Mauro Dragone, Claudio Gennaro, Rafa López, Liam Maguire, et al. "Robotic UBIquitous COgnitive Network." In Ambient Intelligence - Software and Applications, 191–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28783-1_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chkirbene, Zina, Ridha Hamila, and Sebti Foufou. "A Survey on Data Center Network Topologies." In Ubiquitous Networking, 143–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02849-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eagle, Nathan, and Alex Pentland. "Social Network Computing." In UbiComp 2003: Ubiquitous Computing, 289–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39653-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mai, Dinh Loc, and Myung Kyun Kim. "Multi-hop LoRa Network with Pipelined Transmission Capability." In Ubiquitous Networking, 125–35. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58008-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saber, Mohammed, Mohammed Ghaouth Belkasmi, Sara Chadli, and Mohamed Emharraf. "Implementation and Performance Evaluation of Network Intrusion Detection Systems." In Ubiquitous Networking, 484–95. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68179-5_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Durresi, Arjan, Mimoza Durresi, and Leonard Barolli. "Secure Ubiquitous Health Monitoring System." In Network-Based Information Systems, 273–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85693-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Banik, Sejuti, Irvin Steve Cardenas, and Jong-Hoon Kim. "IoT Platforms for 5G Network and Practical Considerations: A Survey." In Ubiquitous Networking, 205–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58008-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sakib, Nazmus, Sohel Bashar, and Ashikur Rahman. "Road Accident Analysis of Dhaka City Using Counter Propagation Network." In Ubiquitous Networking, 164–79. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29419-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ubiquitous Network"

1

Istrate, Cristiana, George Suciu, Sebastian Ene, and Ijaz Hussain. "AN INTRODUCTION TO UBIQUITOUS COMPUTING IN THE MILITARY NETWORK." In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-026.

Full text
Abstract:
Ubiquitous computing analysis represents an emerging area that implements communication technologies in day-to-day life actions. Ubiquitous computing changes the methods in which people use computers, considering these are involved in everyday aspects. In ubiquitous computing, several types of processes operate automatically in the background and communicate on the user's account. The ubiquitous computing theory is to provide any information for everyone at anytime and anywhere instantly. Mobile ad-hoc Networks are currently a growing technology for the next generation of wireless communication networks. A mobile ad-hoc network can portray as a military or rescue operation network in which a set of mobile nodes are used to send out a mission operation in diplomatic terms. This paper presents common architecture principles of universal systems and analyses significant features in context-aware ubiquitous systems. The main purpose of this work is to define a principle for researchers who are new to ubiquitous computing and want to gain depth on analysis and implementation of a novel method for the ubiquitous computing system in military sectors, in order to contribute towards further research regulations expected into the quality-of-service pledge of ubiquitous computing. The ubiquitous computing is the future of technology related to the internet or smart devices. Moreover, the applicability of technologies found in smartphones, smart TVs and sensors can guide to an increase in strategic capabilities, like sensing and detecting, exchanging and sharing unique real-time data in the military field. This study aims to sketch particular methods by which the learning and teaching methods can be improved. The intelligence of technology advanced in the military sectors along with ubiquitous computing providing a rise in optimization, security, and defence.
APA, Harvard, Vancouver, ISO, and other styles
2

Othman, Masuri. "Nanosensors for ubiquitous network." In 2010 International Conference on Enabling Science and Nanotechnology (ESciNano). IEEE, 2010. http://dx.doi.org/10.1109/escinano.2010.5701089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Futahp, Abdo, Andrey Koucheryavy, Alexander Paramonov, and Andrey Prokopiev. "Ubiquitous sensor networks in the heterogeneous LTE network." In 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015. http://dx.doi.org/10.1109/icact.2015.7224752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hazra, Swarnali, and S. K. Setua. "Privacy Preservation in Ubiquitous Network." In 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2015. http://dx.doi.org/10.1109/ficloud.2015.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moo Wan Kim and Kwang Sik Kim. "Experiment of IMS core network enabling ubiquitous network." In 8th International Conference on Advanced Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icact.2006.205997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dhananjay Singh, U. S. Tiwary, and Wan-Young Chung. "Connectivity of ubiquitous sensor network with fixed network." In 2007 International Conference on Control, Automation and Systems. IEEE, 2007. http://dx.doi.org/10.1109/iccas.2007.4406759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu zhiwei, Li Shaoying, and Jiang Lihua. "Ubiquitous Public Service Network (UPSN): the critical path to Ubiquitous Network Society (UNS) for China." In 2010 2nd International Conference on Industrial and Information Systems (IIS 2010). IEEE, 2010. http://dx.doi.org/10.1109/indusis.2010.5565775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ichikawa, Haruhisa, Masashi Shimizu, and Kazunori Akabane. "Invited Talk: Appliance Defined Ubiquitous Network." In 2007 International Symposium on Applications and the Internet Workshops. IEEE, 2007. http://dx.doi.org/10.1109/saint-w.2007.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jeon, Hongseok, Taeyeon Kim, Seungik Lee, and Bhumchul Lee. "Content delivery in Smart Ubiquitous Network." In 2014 16th International Conference on Advanced Communication Technology (ICACT). Global IT Research Institute (GIRI), 2014. http://dx.doi.org/10.1109/icact.2014.6778966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kikuchi, Hiroaki, Fumikazu Iseki, and Moo Wan Kim. "Development of University Network based on Wireless Ubiquitous Network." In The 9th International Conference on Advanced Communication Technology. IEEE, 2007. http://dx.doi.org/10.1109/icact.2007.358336.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Ubiquitous Network"

1

Fu, Xiaodong, Weisong Shi, and Vijay Karamcheti. Automatic Deployment of Transcoding Components for Ubiquitous, Network-Aware Access to Internet Services. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

García-Mantilla, Daniel. PLAC Network Best Practices Series: Target-Income Design of Incentives, Benchmark Portfolios and Performance Metrics for Pension Funds. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003599.

Full text
Abstract:
In defined contribution systems, at the end of the accumulation phase the assets in the retirement account are exchanged for a pension. The conversion rate from assets to retirement income (which depends on the level of interest rates) is very volatile, and its variations constitute the main investment risk facing pension fund affiliates. In this sense, performance metrics, management fees and benchmark portfolios that focus on assets (and asset returns) and ignore the variations in the conversion rate, embed several problems: i. they send wrong signals to regulators, fund managers and workers, ii. they provide wrong incentives to pension fund management companies, and iii. they leave pension fund affiliates exposed to their largest risk factor, even during the last few years preceding their retirement date. We find that regulatory incentives with these fundamental problems are ubiquitous in the region. The document presents a series of best practices, and delivers a practical set of tools to assist regulators and supervisors in designing a framework that improves security and sufficiency of retirement income, and provides relevant and timely information to pension fund affiliates. The framework achieves that by fostering an integration of the accumulation and the payout phases, and an alignment of the regulatory incentives for pension fund management companies with the retirement income objectives of pension fund affiliates. Using historical data from Colombia as a case study, the document illustrates and quantifies the improvements in terms of pension benefits and retirement income security that the proposed framework could bring.
APA, Harvard, Vancouver, ISO, and other styles
3

African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.

Full text
Abstract:
This report maps the African landscape of Open Science – with a focus on Open Data as a sub-set of Open Science. Data to inform the landscape study were collected through a variety of methods, including surveys, desk research, engagement with a community of practice, networking with stakeholders, participation in conferences, case study presentations, and workshops hosted. Although the majority of African countries (35 of 54) demonstrates commitment to science through its investment in research and development (R&D), academies of science, ministries of science and technology, policies, recognition of research, and participation in the Science Granting Councils Initiative (SGCI), the following countries demonstrate the highest commitment and political willingness to invest in science: Botswana, Ethiopia, Kenya, Senegal, South Africa, Tanzania, and Uganda. In addition to existing policies in Science, Technology and Innovation (STI), the following countries have made progress towards Open Data policies: Botswana, Kenya, Madagascar, Mauritius, South Africa and Uganda. Only two African countries (Kenya and South Africa) at this stage contribute 0.8% of its GDP (Gross Domestic Product) to R&D (Research and Development), which is the closest to the AU’s (African Union’s) suggested 1%. Countries such as Lesotho and Madagascar ranked as 0%, while the R&D expenditure for 24 African countries is unknown. In addition to this, science globally has become fully dependent on stable ICT (Information and Communication Technologies) infrastructure, which includes connectivity/bandwidth, high performance computing facilities and data services. This is especially applicable since countries globally are finding themselves in the midst of the 4th Industrial Revolution (4IR), which is not only “about” data, but which “is” data. According to an article1 by Alan Marcus (2015) (Senior Director, Head of Information Technology and Telecommunications Industries, World Economic Forum), “At its core, data represents a post-industrial opportunity. Its uses have unprecedented complexity, velocity and global reach. As digital communications become ubiquitous, data will rule in a world where nearly everyone and everything is connected in real time. That will require a highly reliable, secure and available infrastructure at its core, and innovation at the edge.” Every industry is affected as part of this revolution – also science. An important component of the digital transformation is “trust” – people must be able to trust that governments and all other industries (including the science sector), adequately handle and protect their data. This requires accountability on a global level, and digital industries must embrace the change and go for a higher standard of protection. “This will reassure consumers and citizens, benefitting the whole digital economy”, says Marcus. A stable and secure information and communication technologies (ICT) infrastructure – currently provided by the National Research and Education Networks (NRENs) – is key to advance collaboration in science. The AfricaConnect2 project (AfricaConnect (2012–2014) and AfricaConnect2 (2016–2018)) through establishing connectivity between National Research and Education Networks (NRENs), is planning to roll out AfricaConnect3 by the end of 2019. The concern however is that selected African governments (with the exception of a few countries such as South Africa, Mozambique, Ethiopia and others) have low awareness of the impact the Internet has today on all societal levels, how much ICT (and the 4th Industrial Revolution) have affected research, and the added value an NREN can bring to higher education and research in addressing the respective needs, which is far more complex than simply providing connectivity. Apart from more commitment and investment in R&D, African governments – to become and remain part of the 4th Industrial Revolution – have no option other than to acknowledge and commit to the role NRENs play in advancing science towards addressing the SDG (Sustainable Development Goals). For successful collaboration and direction, it is fundamental that policies within one country are aligned with one another. Alignment on continental level is crucial for the future Pan-African African Open Science Platform to be successful. Both the HIPSSA ((Harmonization of ICT Policies in Sub-Saharan Africa)3 project and WATRA (the West Africa Telecommunications Regulators Assembly)4, have made progress towards the regulation of the telecom sector, and in particular of bottlenecks which curb the development of competition among ISPs. A study under HIPSSA identified potential bottlenecks in access at an affordable price to the international capacity of submarine cables and suggested means and tools used by regulators to remedy them. Work on the recommended measures and making them operational continues in collaboration with WATRA. In addition to sufficient bandwidth and connectivity, high-performance computing facilities and services in support of data sharing are also required. The South African National Integrated Cyberinfrastructure System5 (NICIS) has made great progress in planning and setting up a cyberinfrastructure ecosystem in support of collaborative science and data sharing. The regional Southern African Development Community6 (SADC) Cyber-infrastructure Framework provides a valuable roadmap towards high-speed Internet, developing human capacity and skills in ICT technologies, high- performance computing and more. The following countries have been identified as having high-performance computing facilities, some as a result of the Square Kilometre Array7 (SKA) partnership: Botswana, Ghana, Kenya, Madagascar, Mozambique, Mauritius, Namibia, South Africa, Tunisia, and Zambia. More and more NRENs – especially the Level 6 NRENs 8 (Algeria, Egypt, Kenya, South Africa, and recently Zambia) – are exploring offering additional services; also in support of data sharing and transfer. The following NRENs already allow for running data-intensive applications and sharing of high-end computing assets, bio-modelling and computation on high-performance/ supercomputers: KENET (Kenya), TENET (South Africa), RENU (Uganda), ZAMREN (Zambia), EUN (Egypt) and ARN (Algeria). Fifteen higher education training institutions from eight African countries (Botswana, Benin, Kenya, Nigeria, Rwanda, South Africa, Sudan, and Tanzania) have been identified as offering formal courses on data science. In addition to formal degrees, a number of international short courses have been developed and free international online courses are also available as an option to build capacity and integrate as part of curricula. The small number of higher education or research intensive institutions offering data science is however insufficient, and there is a desperate need for more training in data science. The CODATA-RDA Schools of Research Data Science aim at addressing the continental need for foundational data skills across all disciplines, along with training conducted by The Carpentries 9 programme (specifically Data Carpentry 10 ). Thus far, CODATA-RDA schools in collaboration with AOSP, integrating content from Data Carpentry, were presented in Rwanda (in 2018), and during17-29 June 2019, in Ethiopia. Awareness regarding Open Science (including Open Data) is evident through the 12 Open Science-related Open Access/Open Data/Open Science declarations and agreements endorsed or signed by African governments; 200 Open Access journals from Africa registered on the Directory of Open Access Journals (DOAJ); 174 Open Access institutional research repositories registered on openDOAR (Directory of Open Access Repositories); 33 Open Access/Open Science policies registered on ROARMAP (Registry of Open Access Repository Mandates and Policies); 24 data repositories registered with the Registry of Data Repositories (re3data.org) (although the pilot project identified 66 research data repositories); and one data repository assigned the CoreTrustSeal. Although this is a start, far more needs to be done to align African data curation and research practices with global standards. Funding to conduct research remains a challenge. African researchers mostly fund their own research, and there are little incentives for them to make their research and accompanying data sets openly accessible. Funding and peer recognition, along with an enabling research environment conducive for research, are regarded as major incentives. The landscape report concludes with a number of concerns towards sharing research data openly, as well as challenges in terms of Open Data policy, ICT infrastructure supportive of data sharing, capacity building, lack of skills, and the need for incentives. Although great progress has been made in terms of Open Science and Open Data practices, more awareness needs to be created and further advocacy efforts are required for buy-in from African governments. A federated African Open Science Platform (AOSP) will not only encourage more collaboration among researchers in addressing the SDGs, but it will also benefit the many stakeholders identified as part of the pilot phase. The time is now, for governments in Africa, to acknowledge the important role of science in general, but specifically Open Science and Open Data, through developing and aligning the relevant policies, investing in an ICT infrastructure conducive for data sharing through committing funding to making NRENs financially sustainable, incentivising open research practices by scientists, and creating opportunities for more scientists and stakeholders across all disciplines to be trained in data management.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography