Search
Now showing items 21-30 of 31
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review
(
Elsevier
, 2023 , Article Review)
In recent years, the healthcare industry has faced new challenges around staffing, human interaction, and the adoption of telehealth. Technological innovations can improve efficiency, productivity, and patient outcomes, ...
Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML
(
Elsevier
, 2022 , Article Review)
Internet of Medical Things (IoMT) supports traditional healthcare systems by providing enhanced scalability, efficiency, reliability, and accuracy of healthcare services. It enables the development of smart hardware as ...
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges
(
Elsevier
, 2022 , Article Review)
As the globally increasing population drives rapid urbanization in various parts of the world, there is a great need to deliberate on the future of the cities worth living. In particular, as modern smart cities embrace ...
Toward accountable human-centered AI: rationale and promising directions
(
Emerald Group Holdings Ltd.
, 2022 , Article Review)
Purpose: Along with the various beneficial uses of artificial intelligence (AI), there are various unsavory concomitants including the inscrutability of AI tools (and the opaqueness of their mechanisms), the fragility of ...
Deep visual social distancing monitoring to combat COVID-19: A comprehensive survey
(
Elsevier Ltd
, 2022 , Article Review)
Since the start of the COVID-19 pandemic, social distancing (SD) has played an essential role in controlling and slowing down the spread of the virus in smart cities. To ensure the respect of SD in public areas, visual SD ...
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article Review)
Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ...
When a disaster happens, we are ready: Location mention recognition from crisis tweets
(
Elsevier
, 2022 , Article Review)
Geolocation information is important for humanitarian organizations to gain situational awareness and deliver timely aid during disasters. Towards addressing the problem of recognizing locations, i.e., Location Mention ...
TOSSIM and distributed binary consensus algorithm in wireless sensor networks
(
Academic Press
, 2014 , Article Review)
In this paper, we present distributed binary consensus algorithm over the wireless sensor networks (WSN) in the presence of faulty nodes. We assume that each fault occurs during the execution of an algorithm on a sensor ...
Role of contextual properties in enterprise service migration to cloud computing
(
John Wiley and Sons Ltd
, 2013 , Article Review)
This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
Live migration of virtual machine memory content in networked systems
(
Elsevier
, 2022 , Article Review)
Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...