Search
Now showing items 101-110 of 368
Mitigating insider threats on the edge: A knowledgebase approach
(Zarka Private University, 2020)
Insider Threats, who are cloud internal users, cause very serious problems, which in terns, leads to devastating attacks for both individuals and organizations. Although, most of the attentions, in the real world, is for ...
Exploring Diverse Features for Sentiment Quantification Using Machine Learning Algorithms
(Institute of Electrical and Electronics Engineers Inc., 2020)
In the era of web 2.0, online forums, blogs and Twitter are becoming primary sources for sharing views, opinions and comments about different topics. Classifying these views, opinions and comments is known as sentiment ...
Identity identification and management in the internet of things
(Zarka Private University, 2020)
Henceforth, users agreed on the necessity of continuous Internet connection independently of the place, the manner, and the time. Nowadays, several elite services are accessible by people over the Internet of Things (IoT), ...
Optimization of the application software in biomechanics and their contribution to the biological field
(Eastern Macedonia and Thrace Institute of Technology, 2019)
Biomechanics refers to study of movement within dynamic biological systems. Advancement of computer software technologies such as JAVA language leads to combine stimuli and signals by biological systems and utilize them ...
Extending UML use case diagrams to represent non-interactive functional requirements
(Wroclaw University of Science and Technology, 2020)
Background: The comprehensive representation of functional requirements is a crucial activity in the analysis phase of the software development life cycle. Representation of a complete set of functional requirements helps ...
Identity Management System Model in the Internet of Things
(UIKTEN - Association for Information Communication Technology Education and Science, 2020)
This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply ...
Dynamic resource allocation for opportunistic software-defined IoT networks: Stochastic optimization framework
(Institute of Advanced Engineering and Science, 2020)
Several wireless technologies have recently emerged to enable efficient and scalable Internet-of-Things (IoT) networking. Cognitive radio (CR) technology, enabled by software-defined radios, is considered one of the main ...
Blockchain and Fog Computing for Cyber-Physical Systems: The Case of Smart Industry
(IEEE Computer Society, 2020)
Blockchain has revolutionized how transactions are conducted by ensuring secure and auditable peer-to-peer coordination. This
is due to both the development of decentralization, and the promotion of
trust among peers. ...
Mastering software engineering with the help of the level model of competencies acquisition
(Institute of Physics Publishing, 2020)
The paper proposes the use of an activity-based approach to acquiring the competencies of software engineering with the help of the author's model of level acquiring professional competencies. The approach allows the teacher ...
Design of 1-Bit Digital Subwavelength Metasurface Element for Sub-6 GHz Applications
(Institute of Electrical and Electronics Engineers Inc., 2020)
This paper proposes a novel 1-bit, electronically reconfigurable, subwavelength metasurface unit cell for sub-6 GHz applications. 180° phase shift is achieved by integrating a single PIN diode in the structure. The unit ...