Search
Now showing items 21-30 of 47
Towards Sustainable Energy: A Systematic Review of Renewable Energy Sources, Technologies, and Public Opinions
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The use of renewable energy resources, such as solar, wind, and biomass will not diminish their availability. Sunlight being a constant source of energy is used to meet the ever-increasing energy need. This review discusses ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...
Trust management techniques for the internet of things: A survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ...
When energy trading meets blockchain in electrical power system: The state of the art
(
MDPI AG
, 2019 , Article)
With the rapid growth of renewable energy resources, energy trading has been shifting from the centralized manner to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted in the ...
Understanding probabilistic cognitive relaying communication with experimental implementation and performance analysis
(
MDPI AG
, 2019 , Article)
Efficiently use of the limited wireless spectrum can be achieved by cooperative cognitive relaying, where secondary users (SUs), who do not pay for the licensed spectrum and have better channel condition to the primary ...
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Classification of corneal nerve images using machine learning techniques
(
Penerbit UTHM
, 2019 , Article)
Recent research shows that small nerve fiber damage is an early detector of neuropathy. These small nerve fibers are present in the human cornea and can be visualized through the use of a corneal confocal microscope. A ...
HapticSnakes: multi-haptic feedback wearable robots for immersive virtual reality
(
Springer London
, 2019 , Article)
Haptic feedback plays a large role in enhancing immersion and presence in VR. However, previous research and commercial products have limitations in terms of variety and locations of delivered feedbacks. To address these ...
Assisting individuals with autism and cognitive disorders: An augmented reality based framework
(2019 , Article)
Individuals with autism require systematic assistance while dealing with the surrounding environment and its objects. The project aim is to develop a framework that could be of substantial help to people with autism and ...
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
(
NLM (Medline)
, 2019 , Article)
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ...