تصفح حسب الناشر
السجلات المعروضة 1 -- 20 من 22
-
AI-Enabled Sensing and Decision-Making for IoT Systems
( Hindawi , 2021 , Article)The influential stage of Internet of Things (IoT) has reformed all fields of life in general but specifically with the emergence of artificial intelligence (AI) has drawn the attention of researchers into a new paradigm ... -
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
( Hindawi , 2021 , Article)Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ... -
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
( Hindawi , 2020 , Article)Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ... -
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
( Hindawi , 2020 , Article)The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ... -
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
( Hindawi , 2021 , Article)Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ... -
Bidirectional Language Modeling: A Systematic Literature Review
( Hindawi , 2021 , Article)In transfer learning, two major activities, i.e., pretraining and fine-tuning, are carried out to perform downstream tasks. The advent of transformer architecture and bidirectional language models, e.g., bidirectional ... -
Blockchain-Based Automated System for Identification and Storage of Networks
( Hindawi , 2021 , Article)Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ... -
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
( Hindawi , 2021 , Article)Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ... -
Complexity of Deep Convolutional Neural Networks in Mobile Computing
( Hindawi , 2020 , Article)Neural networks employ massive interconnection of simple computing units called neurons to compute the problems that are highly nonlinear and could not be hard coded into a program. These neural networks are computation-intensive, ... -
Cyber Security against Intrusion Detection Using Ensemble-Based Approaches
( Hindawi , 2023 , Article)The attacks of cyber are rapidly increasing due to advanced techniques applied by hackers. Furthermore, cyber security is demanding day by day, as cybercriminals are performing cyberattacks in this digital world. So, ... -
Decision Support System to Risk Stratification in the Acute Coronary Syndrome Using Fuzzy Logic
( Hindawi , 2021 , Article)Acute coronary syndrome (ACS) is a set of symptoms and signs which define a range of conditions related with the unexpected reduced blood flow to the heart. In ACS, the heart muscles cannot function properly due to the ... -
An Efficient Decision Support System for the Selection of Appropriate Crowd in Crowdsourcing
( Hindawi , 2021 , Article)Crowdsourcing is a complex task-solving model that utilizes humans for solving organizational specific problems. For assigning a crowdsourced task to an online crowd, crowd selection is carried out to select appropriate ... -
An Efficient Multifeature Model for Improving the Performance of Critical Energy Infrastructure
( Hindawi , 2021 , Article)Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the ... -
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition
( Hindawi , 2021 , Article)The interest in Facial Expression Recognition (FER) is increasing day by day due to its practical and potential applications, such as human physiological interaction diagnosis and mental disease detection. This area has ... -
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
( Hindawi , 2021 , Article)Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ... -
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
( Hindawi , 2020 , Article)Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ... -
Offline Pashto Characters Dataset for OCR Systems
( Hindawi , 2021 , Article)In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ... -
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
( Hindawi , 2021 , Article)Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ... -
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
( Hindawi , 2020 , Article)Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ... -
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
( Hindawi , 2020 , Article)The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile ...