Search
Now showing items 1-10 of 149
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
(
IEEE
, 2020 , Article)
White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ...
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
Analyzing factors that influence offshore outsourcing decision of application maintenance
(
IEEE
, 2020 , Article)
Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ...
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
(
IEEE
, 2020 , Article)
Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ...
Blockchain-Based Automated System for Identification and Storage of Networks
(
Hindawi
, 2021 , Article)
Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ...
Toward a Significant E-Voting Adoption Model: The Digital Divide
(2022 , Article)
Technology, through internet use, has changed how citizens interact and communicate with their governments. However, in any society, a proportion of people cannot access this type of interaction due to digital divide issues. ...
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
(
Hindawi
, 2020 , Article)
Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ...
A systematic review on cloud storage mechanisms concerning e-healthcare systems
(
MDPI
, 2020 , Article)
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ...
Parallelisation of a cache-based stream-relation join for a near-real-time data warehouse
(
MDPI
, 2020 , Article)
Near real-time data warehousing is an important area of research, as business organisations want to analyse their businesses sales with minimal latency. Therefore, sales data generated by data sources need to reflect ...
Possible linkage between internet addiction, socio-demographic, and behavioural constructs: a case study of Saudi Arabia and Bahrain-based employees
(
Inderscience
, 2020 , Article)
Internet addiction (IA) is much sought after concept in the present-day human lives in which technology has emerged as a vital part. The ever-growing role of internet technology also accrues to a sizable amount of problems ...










