Search
Now showing items 31-40 of 40
Systematic Mapping Study on Security Approaches in Secure Software Engineering
(
IEEE
, 2021 , Article)
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ...
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ...
Smart Object Detection and Home Appliances Control System in Smart Cities
(
Tech Science Press
, 2021 , Article)
During the last decade the emergence of Internet of Things (IoT) based applications inspired the world by providing state of the art solutions to many common problems. From traffic management systems to urban cities planning ...
Making the Sourcing Decision of Software Maintenance and Information Technology
(
IEEE
, 2021 , Article)
Outsourcing has been getting a significant growth for the last few years. Organizations tend to outsource Information Technology (IT), primarily to take advantage of the availability of qualified, trained and skilled ...
Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management from Vendors' Perspective
(
IEEE
, 2021 , Article)
Software project management inspires and urges the spirit of software developing team members which continues until project completion. Obviously, success of every project based on right selection of team members that ...
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition
(
Hindawi
, 2021 , Article)
The interest in Facial Expression Recognition (FER) is increasing day by day due to its practical and potential applications, such as human physiological interaction diagnosis and mental disease detection. This area has ...
Blockchain-Based Automated System for Identification and Storage of Networks
(
Hindawi
, 2021 , Article)
Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ...
Isolated Handwritten Pashto Characters Recognition using KNN classifier
(
IEEE
, 2021 , Article)
Regional and cultural diversities around the world and especially in Pakistan has given birth to a large number of writing systems and scripts consists of varying character sets. Developing an optimal OCR system for such ...
Possible effect on the perception and attitude of employees after adoption of new information technology and business strategies: a case study of Namibia
(
Inderscience
, 2021 , Article)
Technology adoption and upgradation are the two required aspects for any organisation to create a niche in the marketplace. It is an undeniable fact that this venture could not be completed successfully without the active ...
Adaptive architecture and principles for securing the iot systems
(
Springer
, 2021 , Book chapter)
There is an increasing interest in IoT-enabled smart digital systems. However, it is important to address their security concerns. This paper aims to address this need and proposes an adaptive architecture driven approach ...