بحث بسيط
السجلات المعروضة 31 -- 40 من 81
Wind farms selection using geospatial technologies and energy generation capacity in Gwadar
(
Elsevier
, 2021 , Article)
Pakistan has been a victim of energy crisis since last few decades. This energy crisis has adversely affected country’s socio-economic development and continues to do so. The continuously increasing demand–supply gap has ...
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
(
Hindawi
, 2021 , Article)
Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ...
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
(
IEEE
, 2021 , Article)
Natural scene text classification is considered to be a challenging task because of diversified set of image contents, presence of degradations including noise, low contrast/resolution and the random appearance of foreground ...
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
(
IEEE
, 2021 , Article)
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ...
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
(
IEEE
, 2021 , Article)
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the ...
D2D-V2X-SDN: Taxonomy and Architecture towards 5G Mobile Communication System
(
IEEE
, 2021 , Article)
In the era of information society and 5G networks, cars are extremely important mobile information carriers. In order to meet the needs of multi-scenario business requirements such as vehicle assisted driving and in-vehicle ...
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
(
Hindawi
, 2020 , Article)
Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ...
A systematic review on cloud storage mechanisms concerning e-healthcare systems
(
MDPI
, 2020 , Article)
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ...