Search
Now showing items 21-30 of 40
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
(
Hindawi
, 2021 , Article)
Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ...
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
(
IEEE
, 2021 , Article)
Natural scene text classification is considered to be a challenging task because of diversified set of image contents, presence of degradations including noise, low contrast/resolution and the random appearance of foreground ...
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
(
IEEE
, 2021 , Article)
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ...
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
(
IEEE
, 2021 , Article)
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the ...
D2D-V2X-SDN: Taxonomy and Architecture towards 5G Mobile Communication System
(
IEEE
, 2021 , Article)
In the era of information society and 5G networks, cars are extremely important mobile information carriers. In order to meet the needs of multi-scenario business requirements such as vehicle assisted driving and in-vehicle ...
Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review
(
IEEE
, 2021 , Article)
Over the last few decades, the development in the field of navigation and routing devices has become a hindering task for the researchers to develop smart and intelligent guiding mechanism at indoor and outdoor locations ...
Systematic Mapping Study on Security Approaches in Secure Software Engineering
(
IEEE
, 2021 , Article)
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ...
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ...