بحث
الآن تُعرض المواد 1 -- 10 من 27
A re-organizing biosurveillance framework based on fog and mobile edge computing
(Springer, 2021)
Biological threats are becoming a serious security issue for many countries across the world. Effective biosurveillance systems can primarily support appropriate responses to biological threats and consequently save human ...
AI Techniques for COVID-19
(Institute of Electrical and Electronics Engineers Inc., 2020)
Artificial Intelligence (AI) intent is to facilitate human limits. It is getting a standpoint on human administrations, filled by the growing availability of restorative clinical data and quick progression of insightful ...
Mitigating insider threats on the edge: A knowledgebase approach
(Zarka Private University, 2020)
Insider Threats, who are cloud internal users, cause very serious problems, which in terns, leads to devastating attacks for both individuals and organizations. Although, most of the attentions, in the real world, is for ...
Exploring Diverse Features for Sentiment Quantification Using Machine Learning Algorithms
(Institute of Electrical and Electronics Engineers Inc., 2020)
In the era of web 2.0, online forums, blogs and Twitter are becoming primary sources for sharing views, opinions and comments about different topics. Classifying these views, opinions and comments is known as sentiment ...
Extending UML use case diagrams to represent non-interactive functional requirements
(Wroclaw University of Science and Technology, 2020)
Background: The comprehensive representation of functional requirements is a crucial activity in the analysis phase of the software development life cycle. Representation of a complete set of functional requirements helps ...
Identity Management System Model in the Internet of Things
(UIKTEN - Association for Information Communication Technology Education and Science, 2020)
This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply ...
Mastering software engineering with the help of the level model of competencies acquisition
(Institute of Physics Publishing, 2020)
The paper proposes the use of an activity-based approach to acquiring the competencies of software engineering with the help of the author's model of level acquiring professional competencies. The approach allows the teacher ...
Design of 1-Bit Digital Subwavelength Metasurface Element for Sub-6 GHz Applications
(Institute of Electrical and Electronics Engineers Inc., 2020)
This paper proposes a novel 1-bit, electronically reconfigurable, subwavelength metasurface unit cell for sub-6 GHz applications. 180° phase shift is achieved by integrating a single PIN diode in the structure. The unit ...
Meta-Heuristics for Solving the Software Component Allocation Problem
(Institute of Electrical and Electronics Engineers Inc., 2020)
The software component allocation problem is concerned with mapping a set of software
components to the computational units available in a heterogeneous computing system while maximizing a certain objective function. This ...
Implementing agility in large software development projects
(UIKTEN - Association for Information Communication Technology Education and Science, 2020)
The present paper focuses on providing an in-depth understanding of the concept of agility and its uses in the software development projects. The paper also explains the key issues experienced by large companies while ...