Search
Now showing items 1-10 of 11
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
(
Hindawi
, 2020 , Article)
Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ...
A systematic review on cloud storage mechanisms concerning e-healthcare systems
(
MDPI
, 2020 , Article)
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ...
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
(
Hindawi
, 2020 , Article)
Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ...
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...
Complexity of Deep Convolutional Neural Networks in Mobile Computing
(
Hindawi
, 2020 , Article)
Neural networks employ massive interconnection of simple computing units called neurons to compute the problems that are highly nonlinear and could not be hard coded into a program. These neural networks are computation-intensive, ...
Analyzing factors that influence offshore outsourcing decision of application maintenance
(
IEEE
, 2020 , Article)
Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ...
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
(
Hindawi
, 2020 , Article)
Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ...
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
(
Hindawi
, 2020 , Article)
The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile ...
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
A comprehensive analysis of healthcare big data management, analytics and scientific programming
(
IEEE
, 2020 , Article)
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ...