Search
Now showing items 21-30 of 111
Efficient Power Grid Management Using Sliced-Based Mechanism for Systematic Allocation of Solar Energy Resources: A Conceptual Framework
(
Frontiers
, 2022 , Article)
The over-population and the limited energy resources have puzzled the government and private organizations to think about the providence of non-stop energy resources to the industries, hospitals, smart homes, and shopping ...
Container Performance and Vulnerability Management for Container Security Using Docker Engine
(
Wiley
, 2022 , Article)
Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can ...
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
(
Hindawi
, 2021 , Article)
Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ...
Ensemble deep learning for brain tumor detection
(
Frontiers
, 2022 , Article)
With the quick evolution of medical technology, the era of big data in medicine is quickly approaching. The analysis and mining of these data significantly influence the prediction, monitoring, diagnosis, and treatment of ...
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
(
PLOS
, 2022 , Article)
Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ...
A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization
(
Tech Science Press
, 2022 , Article)
Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is ...
Taking Drones to Next Level: The Performance Evaluation of MAA with BCO Routing Protocols for Flying Ad-hoc Networks (FANETs)
(
ADCAIJ
, 2021 , Article)
Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance ...
Systematic analysis of software development in cloud computing perceptions
(
Wiley
, 2022 , Article)
Cloud computing is characterized as a shared computing and communication infrastructure. It encourages the efficient and effective developmental processes that are carried out in various organizations. Cloud computing ...
Systematic Analysis of Risk Associated with Supply Chain Operations Using Blockchain Technology
(
Wiley
, 2022 , Article)
Advancements in information and communication technologies (ICT), big data analytics, and artificial intelligence- (AI-) based techniques brought a dramatic revolution in diverse research domains, including healthcare, ...
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
(
IEEE
, 2022 , Article)
Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, ...