Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar Jan 2021

A Bibliometric Analysis On Optimization Of Application Layer Protocols In The Internet Of Things, Sagar Jaikar

Library Philosophy and Practice (e-journal)

Internet of Things (IoT), getting popular day by day, thanks to the every object that has been made intelligent and started communicated among themselves with ease. These objects are equipped with sensors and capable of connecting and exchanging the application data over the Internet. While the application data is getting exchanged among these intelligent objects smoothly, there are various concerns with these intelligent objects like they are constrained when it comes to resources like memory, processing capability, power consumption etc. In this regard many attempts are made to enhance or to optimize existing messaging protocols so that we can get …


A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud Oct 2020

A User Study Of A Wearable System To Enhance Bystanders’ Facial Privacy, Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia, Jaouad A. Mouloud

Information Science Faculty Publications

The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called …


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani Jan 2019

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is …


Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …