Search
Now showing items 1-10 of 22
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
An Efficient Decision Support System for the Selection of Appropriate Crowd in Crowdsourcing
(
Hindawi
, 2021 , Article)
Crowdsourcing is a complex task-solving model that utilizes humans for solving organizational specific problems. For assigning a crowdsourced task to an online crowd, crowd selection is carried out to select appropriate ...
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition
(
Hindawi
, 2021 , Article)
The interest in Facial Expression Recognition (FER) is increasing day by day due to its practical and potential applications, such as human physiological interaction diagnosis and mental disease detection. This area has ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
A comprehensive analysis of healthcare big data management, analytics and scientific programming
(
IEEE
, 2020 , Article)
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ...
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
(
Hindawi
, 2020 , Article)
The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ...
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...
Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine
(
Tech Science Press
, 2021 , Article)
During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto ...
Offline Pashto Characters Dataset for OCR Systems
(
Hindawi
, 2021 , Article)
In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ...
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
(
Hindawi
, 2020 , Article)
Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ...