Search
Now showing items 41-50 of 79
A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
(
Multidisciplinary Digital Publishing Institute (MDPI)
, 2023 , Article)
Internet of Things (IoT) devices have drawn significant attention over the last few years due to their significant contribution to every domain of life, but the major application of these devices has been witnessed in the ...
Human–Computer Interaction and Participation in Software Crowdsourcing
(
Multidisciplinary Digital Publishing Institute (MDPI)
, 2023 , Article)
Improvements in communication and networking technologies have transformed people’s lives and organizations’ activities. Web 2.0 innovation has provided a variety of hybridized applications and tools that have changed ...
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
(
IEEE
, 2020 , Article)
Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ...
Parallelisation of a cache-based stream-relation join for a near-real-time data warehouse
(
MDPI
, 2020 , Article)
Near real-time data warehousing is an important area of research, as business organisations want to analyse their businesses sales with minimal latency. Therefore, sales data generated by data sources need to reflect ...
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ...
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
(
Hindawi
, 2020 , Article)
Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ...
A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization
(
Tech Science Press
, 2022 , Article)
Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is ...
An Efficient Multifeature Model for Improving the Performance of Critical Energy Infrastructure
(
Hindawi
, 2021 , Article)
Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the ...
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
(
Hindawi
, 2021 , Article)
Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ...
Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing
(
Springer Nature
, 2022 , Article)
Big data has revolutionized the world by providing tremendous opportunities for a variety of applications. It contains a gigantic amount of data, especially a plethora of data types that has been significantly useful in ...