Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sadiku, Matthew N. O.
- Identity Theft
Abstract Views :154 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 422-424Abstract
Identity theft (IT) occurs when someone uses your sensitive personal information without your consent. The personal information may include name, date of birth, address, social security number, mother's maiden name, bank account number, credit card number, phone number, driver's license number, state ID number, or email password. Identity theft has become a major area of public concern and a growing problem throughout the world. No one is safe from becoming its victim. The paper provides a brief introduction to IT.Keywords
Identity Theft, Identity Fraud, Internet Fraud, Cybercrime.References
- i. H. Berghel, “Identity theft and financial fraud: some strangeness in the proportions,” Computer, January 2012, pp.86-89.
- ii. B. W. Reyns, “ Online routines and identity theft victimization: further expanding routine activity theory beyond direct-contact offenses,” Journal of Research in Crime and Delinquency, vol. 50, no. 2, 2013, pp. 216-238.
- iii. A. Awasthi, “Reducing identity theft using one-time passwords and SMS,” The EDP Audit, Control, and Security Newsletter (EDPACS), vol. 52, no. 5, 2015, pp. 9-19.
- iv. N. L. Piquero , M. A. Cohen, and A. R. Piquero, “How much is the public willing to pay to be protected from identity theft?” Justice Quarterly, vol. 28, no. 3, 2011, pp. 437-459.
- v. G. Kołaczek, “An approach to identity theft detection using social network analysis,” Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009, pp. 78-81.
- vi. J. Whitson, “Identity theft and the challenges of caring for your virtual self,” Interactions, vol. 16, no. 2, March/April 2009, pp. 41-45.
- vii. R. Haygood and R. Hensley, “Preventing identity theft: new legal obligations for businesses,” Employment Relations Today, Autumn 2006, pp.71-83.
- viii. W. I. Wang, Y. Yuan, and N. Archer, ”A contextual framework for combating identity theft,” IEEE Security & Privacy, March/April 2006, pp. 30-38.
- a. D. J. Solove, “Identity theft, privacy, and the architecture of vulnerability,” Hastings Law Journal, vol. 54, 2003, pp. 1227-1276.
- Online Laboratory
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 425-426Abstract
The online laboratory offers a convenient, less expensive, and more efficient means of providing laboratory experiments to students using the Internet. The experiments can be accessed anytime and anywhere with limited access to a traditional campus setting. However, online laboratory presents educators with a host of new challenges. This paper presents a brief introduction and challenges of online experimentation.Keywords
Online Laboratory, Virtual Lab, Remote Lab, Online Experiments.References
- i. S. B. B Kanmani and M. Soni, “Online courseware for electronics laboratory courses: An example,” Proceedings of the IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), 2014, pp. 372-376.
- ii. Maiti and B. Tripathy, “Remote laboratories: design of experiments and their Web implementation,” Educational Technology & Society, vol. 16, no. 3, 2013, pp. 220–233.
- iii. M. Rabek and K. Zakova, “Simple experiment integration into modular online laboratory environment,” Proceedings of the 4th Experiment@ International Conference, June 2017, pp. 264-268.
- iv. Maiti, “NETLab: An online laboratory management system,” Proceedings o IEEE EDUCON Education Engineering – The Future of Global Learning Engineering Education, 2010, pp. 1351-1357.
- v. Deaky, “Contribution to Online Laboratory Implementation and Standardization,” Proceedings of the IEEE Global Engineering Education Conference (EDUCON), 2013, pp. 1342-1346.
- Mobile Internet
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 429-430Abstract
Mobile Internet refers to accessing the Internet with handheld mobile devices through wireless communication infrastructures. It provides mobile platform for mobile commerce, entertainment, and online learning. The mobile Internet market is growing rapidly due to the increasing demand for mobile phones. Many forecasters suggest that in the near future most Internet access will take place using always-on mobile devices. This paper provides a brief introduction to mobile Internet.Keywords
Mobile Internet, m-Internet, Wireless Internet, Internet Access.References
- i. D. Ma et al., “Factors enabling the use of mobile Internet services by information disadvantaged people,” Proceedings of the First IEEE International Conference on Computer Communication and the Internet, 2016, pp. 28-31.
- ii. H. Y. Wang et al., “Gender activities in mobile Internet,” Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, June 2010, pp. 1282-1284.
- iii. R. Staton, “The mobile Internet: What is it? How will it be built? And what services will it deliver?” International Review of Law Computers & Technology, vol. 15, no. 1, 2001, pp. 59-71.
- iv. J. Montavont, D. Roth, and T. Noel, “Mobile IPv6 in Internet of Things: analysis, experimentations and optimization,” Ad Hoc Networks, vol. 14, 2014, pp. 15-25.
- v. M.N.O. Sadiku, and S.M. Musa and S. R. Nelatury, “Internet of Things: an introduction,” International Journal of Engineering Research and Advanced Technology, vol. 2, no.3, March 2016, pp. 39-43.
- vi. T. Yoong-En and D. S. K. Seong, “Visual history mechanism on mobile Internet browser,” Proceedings of the 4th International Conference on Mobile Technology, Applications and Systems, 2007, pp. 372-379.
- vii. G. Buchanan et al., “Improving mobile Internet usability,” Proceedings of the 10th International Conference on World Wide Web, March 2001, pp. 673-680.
- viii. O. Pitkanen et al., “Assessing legal challenges on the mobile Internet,” International Journal of Electronic Commerce, vol. 8, no. 1, 2003, pp. 101-120.
- Internet Addiction
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 431-432Abstract
The Internet is one of the most widely used media in modern society. However, it has great potential to affect the emotions of humans and anxiety levels. Internet addicts suffer from emotional problems such as depression and anxiety-related disorders. Some of them are also addicted to alcohol, drugs, tobacco, or sex. Young adults between the ages of 18-29 are considered as the most preoccupied population with Internet. Internet addiction is a medically recognized disorder. This paper provides a brief introduction to Internet addiction.Keywords
Internet Addiction, Problematic Internet Use, Internet Addiction Disorder, Internet Dependence.References
- i. C. Randler, M. B. Horzum, and C. Vollmer, “Internet addiction and its relationship to chronotype and personality in a Turkish university student sample,” Social Science Computer Review, vol. 32, no. 4, 2014, pp. 484-495.
- ii. ”Internet addiction disorder,” Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Internet_addiction_disorder
- iii. F. Saliceti, “Internet addiction disorder (IAD),” Procedia - Social and Behavioral Sciences, vol. 191, 2015, pp. 1372 – 1376.
- iv. K. S. Young, “Internet sex addiction risk factors, stages of development, and treatment,” American Behavioral Scientist, vol. 52, no.1, September 2008, pp. 21-37.
- v. F. Khazaei, O. Khazaei, and B. Ghanbari-H, “Positive psychology interventions for Internet addiction treatment,” Computers in Human Behavior , vol. 72, 2017, pp. 304-311.
- vi. K. S. Young, “The evolution of Internet addiction,” Addictive Behaviors, vol. 64, 2017, pp. 229–230.
- vii. “Resources for Internet Addiction,” IEEE Technology and Society Magazine, December 2016, pp. 16.
- Computational Electromagnetics
Abstract Views :152 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 8 (2017), Pagination: 414-416Abstract
Computational electromagnetic (CEM) involves using numerical methods to solve real-life electromagnetic problems. Over the years, a great number of CEM tools have been developed to simulate and to analyze electromagnetic systems. This has been made possible due to the numerous contributions from several institutions, universities, and industries around the world. This paper provides a brief introduction to CEM.Keywords
Computational Electromagnetic, Numerical Electromagnetic.- Named Data Networking
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 7 (2017), Pagination: 371-372Abstract
To cope with today's communication needs, named data networking (NDN) has been introduced as a promising candidate for the future Internet. NDN is a new architecture, which is compatible with today's Internet. The elegance of its architecture and its adequateness to today's Internet usage make it a good candidate for the next generation of networks. This paper provides a brief introduction to NDN.Keywords
Named Data Networking, Content-Centric Networking, Content-Based Networking, Data-Oriented Networking, Information-Centric Networking.- Crowd Sourcing:A Primer
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 12 (2017), Pagination: 529-530Abstract
Crowd sourcing is the process of getting work done by online community or crowd of people in the form of an open call, the voluntary undertaking of a task. It allows businesses and organizations to use multiple sources to develop solutions for their problems. Users can participate remotely from anywhere in the world by using their own devices and perform tasks in exchange for monetary rewards. The underlying principle of crowd sourcing is that more heads are better than one. This paper provides a brief introduction to crowd sourcing--what it does, how it works, and its limitations.Keywords
Crowd Sourcing, Crowd Wisdom, Crowd Creation, Crowd Funding, Crowd Democracy.References
- i. “Crowdsourcing,” Wikipedia, the free encyclopedia, https://en.wikipedia.org/wiki/Crowdsourcing
- ii. G. Chatzimilioudis et al., “Crowdsourcing with smartphones,” IEEE Internet Computing, September/October, 2012, pp. 36-44.
- iii. D. C. Brabham, “Crowdsourcing as a model for problem solving: An introduction and cases,” Convergence: The International Journal of Research into New Media Technologies, vol. 14, no. 1, 2008, pp. 75-90.
- iv. “List of crowdsourcing projects,” Wikipedia, the free encyclopedia, https://en.wikipedia.org/wiki/List_of_crowdsourcing_projects
- v. A. Doan et al., “Crowdsourcing applications and platforms: Data management perspective,” Proceedings of the VLDB Endowment, vol. 4, no. 12, 2011, pp. 1508-1509.
- vi. S. Shafiee, H. Shafiee, and F. Mortazavi, “Security of Crowd Sourcing,” Proceedings of the 10th International Conference on e-Commerce with a Focus on Tourism, April 2016, pp. 1-6.
- vii. P. Whitla, “Crowdsourcing and its application in marketing activities,”.
- viii. Contemporary Management Research, vol. 5, no. 1, March 2009, pp. 15-28.
- ix. P. Dutil, “Crowdsourcing as a new instrument in the government’s arsenal: Explorations and considerations,” Canadian Public Administration, vol. 58, no. 3, Sept. 2015, pp. 363-383.
- x. S. Greengard, “Following the Crowd,” Communications of the ACM, vol. 54, no. 2, February 2011, pp. 20-22.
- Web Computing:An Introduction
Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 12 (2017), Pagination: 531-532Abstract
Web computing is computing enabled by and situated on the web. It involves accessing a machine that is somewhere connected to the Internet to process some data and obtain results. It is based on a client/server model. The main objective of web computing is to perform CPU intensive tasks by outsourcing the computations to external clients. This paper provides a brief introduction to web computing.Keywords
Web Computing, Web-Based Computing.References
- i. A. L. Rosenberg, “Accountable web-computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 2, February 2003, pp. 97-106.
- ii. N. B. Serbedzija, “Web computing in theory and practice: an introduction to the Minitrack,” Proceedings of the Thirty-First Hawaii International Conference on System Sciences, January 1998, pp. 602-603.
- iii. H. Shen, Z. Yang, and C. Sun, “Collaborative web computing: from desktops to webtops,” IEEE Distributed Systems Online, vol. 8, no. 4, April 2007, pp. 1-4.
- iv. N. B. Serbedzija, “Web computing framework,” Journal of Systems Architecture, vol. 45, 1999, pp. 1293-1306.
- v. I. Hababeh, I. Khalil, and A. Khreishah, “Designing high performance web-based computing services to promote telemedicine database management system,” IEEE Transactions on Services Computing, vol. 8, no. 1, Jan/Feb. 2015, pp. 47-64.
- vi. S. R. Wilkinson, “Web computing for bioinformatics applications,” Doctoral Dissertation, University of Alabama at Birmingham, 2015.
- vii. S. Wong, “An authentication protocol in web-computing,” Proceedings of 20th IEEE International Parallel & Distributed Processing Symposium, 2006.
- viii. C. J. Romanowski, R. K. Raj, and M. Kwon, “Work on progress - An immersion course concentration in mobile web computing,” Proceedings of 41st ASEE/IEEE Frontiers in Education Conference, Rapid City, SD, October, 2011.
- Surveillance Networks
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 11 (2017), Pagination: 453-454Abstract
Surveillance networks have increased in popularity the last decades as safety and security have become critical issues in many infrastructures such as power stations, airports, hospitals, and schools. They are to provide protection from a wide range of threats or attacks and serve as a deterrent to crime. This paper provides a brief introduction to surveillance networks, their applications, and challenges.Keywords
Surveillance Network, Computer Surveillance, Sensor Network.- Computational Economics
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
Source
International Journal of Engineering Research, Vol 6, No 11 (2017), Pagination: 464-465Abstract
The recent advances in modeling tools have greatly expanded the possibility set for economists. This has led to the rapid emergence of computational economics as an independent branch in economics. Computational economics is a multidisciplinary field that explores the interaction of economics and computational systems. It has added a new dimension to microelectronics. This paper provides a brief introduction to computational economics.Keywords
Computational Economics, Agent-Based Computational Economics.- Embedded Computing Systems
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
Source
International Journal of Scientific Engineering and Technology, Vol 6, No 12 (2017), Pagination: 361-363Abstract
An embedded system is any computer that relies on its own microprocessor and is a part of a larger system. It is usually embedded as a part of a complete device that serves a more general purpose. Our society is increasingly depending on embedded computing systems such as robots, unmanned aerial vehicles self-driving cars, unmanned underwater vehicles, military and aerospace electronics. This paper provides a brief introduction on embedded computing systems.Keywords
Embedded Computing Systems.References
- i. G. J. Myatt, “Data mining in the chemical industry”.
- ii. http://www.nargund.com/gsu/mgs8040/lecture/chemical_industry_myatt2.pdf
- iii. L. Jozwiak, “Embedded computing technology for highly-demanding cyber-physical systems,” IFAC-Papers OnLine, vol. 48, no. 4, 2015, pp. 19-30.
- iv. T. Furuichi and K. Yamada, “Next generation of embedded system on cloud computing,” Procedia Computer Science, vol. 35, 2014, pp.1605-1614.
- v. D. P.F. Moller, “Introduction to embedded computing systems,” in Guide to Computing Fundamentals in Cyber-Physical Systems: Concepts, Design Methods, and Applications. Switzerland: Springer, Chapter 2, 2016, pp. 37-80.
- vi. A. M. Wyglinski et al., “Security of autonomous systems employing embedded computing and sensors,” IEEE Micro, vol. 33, no. 1, 2013, pp. 80-86.
- vii. W. Wolf, “What is embedded computing?” Computer, vol. 35, no.1, 2002, pp. 136-137.
- viii. D. Serpanos and J. Henkel, “Dependability and security will change embedded Computing,” Computer, vol. 41, no. 1, 2008, pp. 103-105.
- ix. A. Hoover, “Computer vision in undergraduate education: modern embedded computing,” IEEE Transactions on Education, vol. 46, no. 2, May 2003, pp 235-240.
- x. M. Zwolinski et al., “The European masters in embedded computing systems (EMECS),” 11th European Workshop on Microelectronics Education (EWME), 2016, pp. 1-6.
- Wisdom of the Crowd
Abstract Views :183 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, Texas, US
2 Engineering Department, Lone Star College, Kingwood, Texas, US
3 College of Engineering, Technology and Computer Science, Indiana University-Purdue University, Fort Wayne, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, Texas, US
2 Engineering Department, Lone Star College, Kingwood, Texas, US
3 College of Engineering, Technology and Computer Science, Indiana University-Purdue University, Fort Wayne, US
Source
International Journal of Scientific Engineering and Technology, Vol 6, No 11 (2017), Pagination: 347-348Abstract
The wisdom of the crowd assumes that a crowd or group of people is remarkably more intelligent and smarter than the smartest individual among them. This operates in the world in many different guises. The wisdom-of-crowd phenomenon has been replicated across a number of disciplines. It has become increasingly relevant with the rapid spread of the Internet and social networks. This paper provides a brief introduction to the wisdom of the crowd.Keywords
Crowd Wisdom, Wisdom of the Crowd, Crowd Consensus, Crowd Sourcing, Diversity of Opinions, Collective Knowledge.- Wearable Computing
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 Prairie View A&M University, Prairie View, TX-77446, US
1 Prairie View A&M University, Prairie View, TX-77446, US
Source
International Journal of Engineering Research, Vol 6, No 10 (2017), Pagination: 445-447Abstract
Wearable computers are computer devices or systems integrated into the clothing or attached to the body of a person. The evolution of wearable computing devices, driven by the confluence of information and communication technology, has changed the way people use online services by keeping them always connected. This paper provides a brief introduction to wearable computing with its technical issues and challenges that must be addressed to reap the huge benefits.Keywords
Wearable Computing, Wearables, Wearable Technology, Body-Borne Computing.- Information Engineering
Abstract Views :141 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 10 (2017), Pagination: 448-449Abstract
Being in the age of information, we are bombarded with large volumes and diverse types of information. Information engineering is a family of data-oriented analysis and techniques used to design, develop, and maintain information systems which support strategic missions, decision processes, and daily operations of a company. It is often regarded as a data-oriented methodology rather than a process-oriented methodology. This paper provides a brief introduction to information engineering.Keywords
Information Engineering, Social Information Engineering, Information Integration.- Mobile Health
Abstract Views :152 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 10 (2017), Pagination: 450-452Abstract
Mobile health is the creative use of emerging mobile devices to deliver and improve healthcare practices. It integrates mobile technology with the health delivery with the premise of promoting a better health and improving efficiency. Mobile health has become an increasingly important issue in a number of disciplines such as health communication, public health, and health promotion. This paper provides a brief introduction to mobile health.Keywords
Mobile Health, mHealth, eHealth, Digital Health.- 5G Wireless Technology:A Primer
Abstract Views :729 |
PDF Views:2
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Scientific Engineering and Technology, Vol 7, No 7 (2018), Pagination: 62-64Abstract
5G stands for fifth generation wireless technology. It is the latest iteration of cellular technology that has three main features: greater speed, lower latency, and the ability to connect a lot more devices simultaneously. A commercial 5G wireless network is expected to be deployed by 2020. This paper provides a brief introduction to 5G wireless technology.Keywords
5G Wireless Technology, Evolution from 1G to 5G.References
- i. “5G,” Wikipedia, the free encyclopediahttps://en.wikipedia.org/wiki/5G
- ii. “5G Development with Matlab,” https://www.mathworks.com/content/dam/mathworks/ebook/gated/5G_ebook.pdf
- iii. A. Agarwal, G. Misra, and K. Agarwal, “The 5th generation mobile Wireless networks- Key concepts, network architecture and challenges,”http://pubs.sciepub.com/ajeee/3/2/1/
- iv. M. H. Alsharif and R. Nordin, “Evolution towards fifth generation (5G) wireless networks: Current trends and challenges in the deployment of millimeter wave, massive MIMO, and small cells,” Telecommunication Systems, vol. 64, 2017, pp. 617-637.
- v. M. R. Bhalla and A. V. Bhalla, “Generations of mobile wireless technology: A survey,” International Journal of Computer Applications, vol. 5, no. 4, August 2010, pp. 26-32.
- vi. R. S. Sapakal and S. S. Kadam, “5G mobile technology,” International Journal of Advanced Research in Computer Engineering & Technology, vol. 2, no. 2, February 2013, pp. 568-571.
- vii. “How 5G technology works,”https://www.rfpage.com/how-5g-technology-works/
- viii. D. H. Latha et al., “A study on 5th generation mobile technology – Future network service,” International Journal of Computer Science and Information Technologies, vol. 5, no. 6, 2014, pp. 8309-8313.
- ix. S. Andreev, “Delivering uniform connectively and service experience to converged 5G wireless networks,” Proceedings of the IEEE World Forum on Internet of Things, 2014, pp. 323-324.
- x. M. H. Alsharif et al., “How to make key wireless technologies environmental friendly: a review,” Transactions of Emerging Telecommunications Technologies, vol. 29, 2018.
- xi. “Understanding 5G: Perspectives on future technological advancements in mobile,”
- xii. https://www.gsmaintelligence.com/research/?file=141208-5g.pdf&download
- xiii. A. Campanaro, “What is 5G? The next wireless revolution explained,”
- xiv. https://www.nbcnews.com/mach/tech/what-5g-next-wireless-revolution-explained-ncna855816
- xv. C. X. Wang et al., “Cellular architecture and key technologies for 5G wireless communication networks,” IEEE Communications Magazine, February 2014, pp.
- xvi. 122-130.
- xvii. N. Marchetti, “Towards 5th generation wireless communication systems,”
- xviii. https://www.researchgate.net/publication/293593557_Towards_5th_Generation_Wireless_Communication_Systems
- 3D Printing in Healthcare
Abstract Views :517 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, TX, US
2 College of Engineering, Prairie View A&M University, Prairie View, TX, US
1 Department of Electrical and Computer Engineering, Prairie View A&M University, Prairie View, TX, US
2 College of Engineering, Prairie View A&M University, Prairie View, TX, US
Source
International Journal of Scientific Engineering and Technology, Vol 7, No 7 (2018), Pagination: 65-67Abstract
3D printing is the means of producing three dimensional solid objects from a digital model. It has been regarded as one of the pillars of the third industrial revolution. No industry has embraced the 3DP technology more enthusiastically than healthcare, especially surgery. With healthcare industry under political and economic pressure to perform, 3D printing allows manufacturers to cost effectively produce customised medical devices. 3DP has the potential to change healthcare by making care affordable, accessible, and personalized. This paper provides a brief introduction on how 3DP is used in healthcare industry.Keywords
Healthcare, 3D Printing, 4D Printing, Additive Manufacturing, Rapid Prototyping, Modeling.References
- i. (2017). 5 Ways 3D printing will change healthcare.http://www.rapidreadytech.com/2017/09/11806/, 2016.
- ii. Hurst, E.J. 3D printing in healthcare: emerging applications. Journal of Hospital Librarianship,16(3), 255-267.
- iii. Brunello, G. et al. (2016). Power-based 3D printing for bone tissue engineering. Biotechnology Advances, 34, 740-753.
- iv. PHIL FOR HUMANITY. (2013). THE PROS AND CONS OF 3D PRINTING.HTTP://WWW.PHILFORHUMANITY.COM/3D_PRINTING.HTML
- v. Liaw, C.Y. & Guvendiren, M. (2017). Current and emerging applications of 3D printing in medicine. Biofabrication, 9(2).
- vi. Pucci, J.U. et al. (2017). Three-dimensional printing: technologies, applications, and limitations in neurosurgery. Biotechnology Advances, 35, 21-529.
- vii. Thomas, D. & Singh, D. (2017). 3D printing in surgery – the evolving paradigm-shift in surgical implants on demand. International Journal of Surgery,42, 58-59.
- viii. Khoo, Z.X. et al. (2015). 3D printing of smart materials: A review on recent progresses in 4D printing. Virtual and Physical Prototyping, 10(3), 103-122.
- ix. Leist, S.K. & Zhou, J. (2016). Current status of 4D printing technology and the potential of light-reactive smart materials as 4D printable materials. Virtual and Physical Prototyping, 11(4), 249-262.