K Okereafor, O Osuagwu, SF Ayegba… - Journal Homepage: http …, 2020 - academia.edu
Biometric systems verify humans using their unique physiological or behavioural patterns to offer more secure authentication over passwords and tokens. Despite their benefits …
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world …
Cloud computing is an umbrella term used to refer to Internet based development and services. The cloud is a metaphor for the Internet. A number of characteristics define cloud …
With the increasing use of social networking site, there are increments in the malicious, fake, and viruses. Daily approximately 20 million users will register in one day on different social …
Due to the advent of computer technology image-processing techniques have become increasingly important in a wide variety of applications. Image segmentation is a classic …
Organizations across the world are thinking about incorporating the Smart City idea in their urban communities and executing big data applications that bolster smart city parts to …
ABSTRACT A wireless sensor network (WSN) has imperative applications, for example, remote natural checking and target following. This has been empowered by the accessibility …
EJ Saini, RC Gangwar, EM Marwaha - researchgate.net
Data mining is process of extraction of hidden predictive information from the voluminous databases. It is used to finds previously unknown patterns and trends from databases. These …
Ontologies are used to represent the domain knowledge. But the ontologies created by different creators are different and inconsistent. Huge difference exists between domains …