Author:
Hatem Ahmed Sameer,Abed Jameel Kadhim,Ajel Ahmed R.
Reference25 articles.
1. T. H. Luan, L. Gao, Z. Li, Y. Xiang, G. We, L. Sun, M. Burwood, I. Engineering, and Z. Gongshang, “Fog computing: focusing on mobile users at the edge,” International Conference on Networking and Internet Architecture, pp. 1–11, 2016.
2. Fog computing and its role in the internet of things
3. Secure Medical Image Steganography Method Based on Pixels Variance Value and Eight Neighbors
4. Based on IoT Healthcare Application for Medical Data Authentication: Towards A New Secure Framework Using Steganography
5. An open-source non-contact thermometer using low-cost electronic components
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Posture Using MS-IoT-Based Solution to Provide Timely Treatment;Advances in Psychology, Mental Health, and Behavioral Studies;2024-04-12