The turn of the new millennium has brought with it an explosion of activity around electronic services (e-services) in the form of e-commerce, e-business, e-government, e-learning, and …
N Vithanwattana, G Karthick, G Mapp, C George… - Journal of Reliable …, 2022 - Springer
The deployment of Internet of Things platforms as well as the use of mobile and wireless technologies to support healthcare environments have enormous potential to transform …
N Vithanwattana, G Karthick, G Mapp… - 2021 IEEE Globecom …, 2021 - ieeexplore.ieee.org
The Internet of Things is driving impactful and significant changes in healthcare systems across the globe. The use of mobile and wireless technologies to support healthcare …
JDK Waguia, A Menshchikov - 2021 28th Conference of Open …, 2021 - ieeexplore.ieee.org
The rapid growth of technology tends to improve human's life, to save time and to impose a rhythm to human day to day activity. More than ever, the world is facing tremendous …
Cloud computing is a rapidly expanding technology that every business today aspires to incorporate into its operations to increase profitability and scalability. Because the public's …
S Ahmad Taufek, A Uzir - Journal of Information and Knowledge …, 2022 - ir.uitm.edu.my
In recent years, there has been a significant increase in the number of peoples utilising cloud storage. This has resulted in a significant increase in cloud storage research and …
Abstract The deployment of Mobile Health (mHealth) platforms as well as the use of mobile and wireless technologies have significant potential to transform healthcare services. The …
S Owusu-Ansah, S Budu, RAA Budu - e-Services, 2019 - books.google.com
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit …
N Alzin, Z Mahrousa, M Rahhal - 2021 - academia.edu
Security threats in cloud computing have still raised concerns for companies and individuals. So, most researches have raced to propose models that keep secure data transmission in …