Search
Now showing items 71-80 of 377
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
(
IEEE
, 2021 , Article)
With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the ...
D2D-V2X-SDN: Taxonomy and Architecture towards 5G Mobile Communication System
(
IEEE
, 2021 , Article)
In the era of information society and 5G networks, cars are extremely important mobile information carriers. In order to meet the needs of multi-scenario business requirements such as vehicle assisted driving and in-vehicle ...
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
(
Hindawi
, 2020 , Article)
Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ...
A systematic review on cloud storage mechanisms concerning e-healthcare systems
(
MDPI
, 2020 , Article)
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ...
Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review
(
IEEE
, 2021 , Article)
Over the last few decades, the development in the field of navigation and routing devices has become a hindering task for the researchers to develop smart and intelligent guiding mechanism at indoor and outdoor locations ...
Systematic Mapping Study on Security Approaches in Secure Software Engineering
(
IEEE
, 2021 , Article)
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ...
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ...
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
(
Hindawi
, 2020 , Article)
Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ...
An Integrated Design for Classification and Localization of Diabetic Foot Ulcer based on CNN and YOLOv2-DFU Models
(
IEEE
, 2020 , Article)
Diabetes is a chronic disease, if not treated in time may lead to many complications including diabetic foot ulcers (DFU). DFU is a dangerous disease, it needs regular treatment otherwise it may lead towards foot amputation. ...
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
(
IEEE
, 2020 , Article)
White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ...