We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 289 results
  1. Review of Quantum Image Processing

    As an interdisciplinary between quantum computing and image processing, quantum image processing provides more possibilities for image processing due...

    Zhaobin Wang, Minzhe Xu, Yaonan Zhang in Archives of Computational Methods in Engineering
    Article 14 May 2021
  2. The State of the Art in Quality Infrastructure Data

    The interest in quality infrastructure (QI) has increased significantly over the last decade among researchers, practitioners, policymakers, and...
    Ulrich Harmes-Liedtke, Ann-Sara Ramkissoon in Handbook of Quality System, Accreditation and Conformity Assessment
    Living reference work entry 2024
  3. Untangling E-Voting Platform for Secure and Enhanced Voting Using Blockchain Technology

    In any country or organization where an election takes place, the voting procedure plays the most vital role. It must be secure and transparent at...
    Muskan Malhotra, Amit Kumar, ... Vibhash Yadav in Transforming Management with AI, Big-Data, and IoT
    Chapter 2022
  4. A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition

    In recent years, the number of cyber-attacks increased affecting different application types and targets. Many studies tried to focus on proposing...

    Article 01 January 2021
  5. The Big Picture—Information Technology in Enterprises

    The term “information technology (IT)” comes with two meanings today: firstly, the original meaning in terms of tools and applications which create,...
    Chapter 2022
  6. Application of Big Data Analytics and Internet of Medical Things (IoMT) in Healthcare with View of Explainable Artificial Intelligence: A Survey

    The integration of Big Data Analytics (BDA) and the Internet of Medical Things (IoMT) has brought a significant transformation in the healthcare...
    Anurag Sinha, Den Whilrex Garcia, ... Pallab Banerjee in Interpretable Cognitive Internet of Things for Healthcare
    Chapter 2023
  7. Map** Risk Assessment Strategy for COVID-19 Mobile Apps’ Vulnerabilities

    Recent innovations in mobile technologies are playing an important and vital role in combating the COVID-19 pandemic. While mobile apps’...
    Tanusree Sharma, Hunter A. Dyer, ... Masooda Bashir in Intelligent Computing
    Conference paper 2022
  8. Deep Learning-Based Automated Learning Environment Using Smart Data to Improve Corporate Marketing, Business Strategies, Fraud Detection in Financial Services, and Financial Time Series Forecasting

    The automated learning environment is based on recurrent neural network trained with long short-term memory, used because of its ability to learn, in...
    Zair Bouzidi, Mourad Amad, Abdelmalek Boudries in International Conference on Managing Business Through Web Analytics
    Conference paper 2022
  9. Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs

    Side-channel disassembly attacks recover CPU instructions from power or electromagnetic side-channel traces measured during code execution. These...

    Ognjen Glamočanin, Shashwat Shrivastava, ... Mirjana Stojilović in Journal of Hardware and Systems Security
    Article Open access 01 September 2023
  10. An Efficient Group-based Service Authentication and Session Key Negotiation Scheme for mMTC Devices in 5G

    With the development of the telecommunication network, the core network is about to enter the era of 5G. 5G is considered an indispensable piece of...

    Wei-Kuo Chiang, Kai-Heng Lin in Mobile Networks and Applications
    Article 10 November 2022
  11. Soft Computing and Machine Learning Techniques for e-Health Data Analytics

    Medical diagnosis has been a vital part of the healthcare system. The role of computer aided systems is important to identify the exact diseases by...
    Biswajit Brahma, Hemanta Kumar Bhuyan in Connected e-Health
    Chapter 2022
  12. Group signature with time-bound keys and unforgeability of expiry time for smart cities

    Internet of Things (IoT) lays the foundation for the various applications in smart cities, yet resource-constrained IoT devices are prone to suffer...

    Article Open access 03 May 2021
  13. Imposing Security and Privacy in the Healthcare Industry Using Blockchain Technology

    Blockchain is a leading central concept, and it is gaining more attention in various businesses and various scenarios. It has been one of the...
    J. Bheemeswara Sastry, Barnali Gupta Banik in Intelligent Interactive Multimedia Systems for e-Healthcare Applications
    Chapter 2022
  14. A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Collaborative Robot

    More and more, we may expect to see robots working side by side with humans as technology advances. Collaborative robot (cobot) is a methodology that...

    Mohit Sajwan, Simranjit Singh in Archives of Computational Methods in Engineering
    Article 30 May 2023
  15. Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment

    The architecture development of cloud computing technology is growing tremendously in recent times, which leads to improvement of scalability,...

    R SHANTHAKUMARI, S MALLIGA in Sādhanā
    Article 20 April 2019
  16. Introducing robust reachability

    We introduce a new property called robust reachability which refines the standard notion of reachability in order to take replicability into account....

    Guillaume Girol, Benjamin Farinier, Sébastien Bardin in Formal Methods in System Design
    Article 21 November 2022
  17. Diabetes and hypertension MobileHealth systems: a review of general challenges and advancements

    Mobile health (mHealth) systems are sip** into more and more healthcare functions with self-management being the foremost modus operandi. However,...

    Bliss Utibe-Abasi Stephen, Benedicta C. Uzoewulu, ... Simeon Ozuomba in Journal of Engineering and Applied Science
    Article Open access 18 July 2023
  18. Data distribution and secure data transmission using IANFIS and MECC in IoT

    IoT entities amass a massive quantity of sensing data and transmit it to the cloud for processing as well as reasoning. Such disparate networks raise...

    B. M. Pampapathi, M. Nageswara Guptha, M. S. Hema in Journal of Ambient Intelligence and Humanized Computing
    Article 06 January 2021
  19. Combinatorial Cryptography and Latin Squares

    In this chapter, we first overview the applications of combinatorics in cryptography. Then, we take look at some historical applications of...
    Behrouz Zolfaghari, Khodakhast Bibak in Perfect Secrecy in IoT
    Chapter 2022
  20. The Many Approaches to Innovation Strategy

    Innovation strategy is a core part of corporate strategy. This chapter has the objective of defining a rigorous link between the main approaches and...
    Marco Cantamessa, Francesca Montagna in Management of Innovation and Product Development
    Chapter 2023
Did you find what you were looking for? Share feedback.