بحث بسيط
السجلات المعروضة 61 -- 70 من 377
Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine
(
Tech Science Press
, 2021 , Article)
During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto ...
Offline Pashto Characters Dataset for OCR Systems
(
Hindawi
, 2021 , Article)
In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ...
Green-Agile Maturity Model: An Evaluation Framework for Global Software Development Vendors
(
IEEE
, 2021 , Article)
Agile methods are extensively adapted by software development organizations due to the competitive benefits it offers. In recent years global software development (GSD) projects practice agile methods as prominent methods ...
Wind farms selection using geospatial technologies and energy generation capacity in Gwadar
(
Elsevier
, 2021 , Article)
Pakistan has been a victim of energy crisis since last few decades. This energy crisis has adversely affected country’s socio-economic development and continues to do so. The continuously increasing demand–supply gap has ...
Do information and communication technology and renewable energy use matter for carbon dioxide emissions reduction? Evidence from the Middle East and North Africa region
(
Elsevier
, 2021 , Article)
This study aims to investigate whether information and communication technologies (ICT) and renewable energy consumption can help improve environmental quality for a selected group of the Middle East and North Africa (MENA) ...
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
(
Hindawi
, 2021 , Article)
Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ...
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
(
IEEE
, 2021 , Article)
Natural scene text classification is considered to be a challenging task because of diversified set of image contents, presence of degradations including noise, low contrast/resolution and the random appearance of foreground ...
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
(
IEEE
, 2021 , Article)
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ...