Search
Now showing items 1-10 of 238
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
Big data velocity management-from stream to warehouse via high performance memory optimized index join
(
IEEE
, 2020 , Article)
Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ...
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
(
IEEE
, 2020 , Article)
White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ...
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
(
IEEE
, 2020 , Article)
Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ...
Blockchain-Based Automated System for Identification and Storage of Networks
(
Hindawi
, 2021 , Article)
Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ...
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
(
Hindawi
, 2020 , Article)
Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ...
A systematic review on cloud storage mechanisms concerning e-healthcare systems
(
MDPI
, 2020 , Article)
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ...
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
(
Hindawi
, 2020 , Article)
The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ...
Analyzing factors that influence offshore outsourcing decision of application maintenance
(
IEEE
, 2020 , Article)
Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ...