بحث بسيط
السجلات المعروضة 21 -- 30 من 66
Container Performance and Vulnerability Management for Container Security Using Docker Engine
(
Wiley
, 2022 , Article)
Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can ...
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment
(
Elsevier
, 2022 , Article)
Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach ...
Innovations and Hotel Performance in the Aftermath Announcement of Qatar Hosting FIFA 2022 World Cup
(
Cognizant Communication Corporation
, 2022 , Article)
This article explores innovation processes in tourism within the context of Qatar Hotel sector. A theoretical framework, drawing on the existing literature, is developed to analyze innovation- performance relationships. ...
Ensemble deep learning for brain tumor detection
(
Frontiers
, 2022 , Article)
With the quick evolution of medical technology, the era of big data in medicine is quickly approaching. The analysis and mining of these data significantly influence the prediction, monitoring, diagnosis, and treatment of ...
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
(
PLOS
, 2022 , Article)
Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ...
A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization
(
Tech Science Press
, 2022 , Article)
Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is ...
Systematic analysis of software development in cloud computing perceptions
(
Wiley
, 2022 , Article)
Cloud computing is characterized as a shared computing and communication infrastructure. It encourages the efficient and effective developmental processes that are carried out in various organizations. Cloud computing ...
Systematic Analysis of Risk Associated with Supply Chain Operations Using Blockchain Technology
(
Wiley
, 2022 , Article)
Advancements in information and communication technologies (ICT), big data analytics, and artificial intelligence- (AI-) based techniques brought a dramatic revolution in diverse research domains, including healthcare, ...
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
(
IEEE
, 2022 , Article)
Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, ...
Effective video summarization approach based on visual attention
(
Tech Science Press
, 2022 , Article)
Video summarization is applied to reduce redundancy and develop a concise representation of key frames in the video, more recently, video summaries have been used through visual attention modeling. In these schemes, the ...