Search
Now showing items 11-20 of 37
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
(
IEEE
, 2021 , Article)
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the ...
Making the Sourcing Decision of Software Maintenance and Information Technology
(
IEEE
, 2021 , Article)
Outsourcing has been getting a significant growth for the last few years. Organizations tend to outsource Information Technology (IT), primarily to take advantage of the availability of qualified, trained and skilled ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
Systematic Mapping Study on Security Approaches in Secure Software Engineering
(
IEEE
, 2021 , Article)
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ...
Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine
(
Tech Science Press
, 2021 , Article)
During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto ...
Offline Pashto Characters Dataset for OCR Systems
(
Hindawi
, 2021 , Article)
In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ...
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
(
Hindawi
, 2021 , Article)
Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ...
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
(
IEEE
, 2021 , Article)
Natural scene text classification is considered to be a challenging task because of diversified set of image contents, presence of degradations including noise, low contrast/resolution and the random appearance of foreground ...
Empirical Investigation of Influencing Factors Regarding Offshore Outsourcing Decision of Application Maintenance
(
IEEE
, 2021 , Article)
Global Software Development (GSD) has been an emerging trend in the development of software globally, for the last two decades. Information Technology (IT) outsourcing includes application development, application maintenance, ...
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
(
IEEE
, 2021 , Article)
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ...