|
|
|
Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed ...
ver más
|
|
|
|
|
|
Huynh Thanh Thien, Pham-Viet Tuan and Insoo Koo
Recently, simultaneous wireless information and power transfer (SWIPT) systems, which can supply efficiently throughput and energy, have emerged as a potential research area in fifth-generation (5G) system. In this paper, we study SWIPT with multi-user, ...
ver más
|
|
|
|
|
|
Cheah WaiShiang,Aida Shafreena bt Ahmad Puad,Puah Chin Hong,Alfian Abdul Halin
Pág. pp. 32 - 48
Mobile application development is receiving much attention nowadays. With the enhancement of mobile application tools like an Android studio, etc. and kinds of online support, the development of the mobile application is getting easier. Indeed, mobile ap...
ver más
|
|
|
|
|
|
Csaba Csiszár, Azamat Zarkeshev
Pág. 784 - 790
Technology of autonomous vehicles (AVs) is getting mature and some types of autonomous public transportation have been successfully tested. However, the replacement of conventional public transportation requires new planning and operational methods. The ...
ver más
|
|
|
|
|
|
Christian Schmitt,Peter Liggesmeyer
Pág. 15 - 34
This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security infor...
ver más
|
|
|