scroll to top
Press enter or spacebar to select a desired language.
Press enter or spacebar to select a desired language.
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "QA76.75-76.765"

1 - 10 of 12,297 results for
 "QA76.75-76.765"
Press enter or spacebar to adjust the number of results displayed.

Challenges and Opportunities in the Internet of Intelligence of Things in Higher Education—Towards Bridging Theory and Practice

Publication Type: Academic Journal

Source(s): IoT, Vol 4, Iss 19, Pp 430-465 (2023)

Abstract: The application of the Internet of Things is increasing in momentum as advances in artificial intelligence exponentially increase its integration. This has caused continuous shifts in the Internet of Things paradigm with increasing levels of complexity...

IoT-Applicable Generalized Frameproof Combinatorial Designs

Publication Type: Academic Journal

Source(s): IoT, Vol 4, Iss 20, Pp 466-485 (2023)

Abstract: Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share ...

Exploring the Confluence of IoT and Metaverse: Future Opportunities and Challenges

Publication Type: Academic Journal

Source(s): IoT, Vol 4, Iss 18, Pp 412-429 (2023)

Abstract: The Internet of Things (IoT) and the metaverse are two rapidly evolving technologies that have the potential to shape the future of our digital world. IoT refers to the network of physical devices, vehicles, buildings, and other objects that are connec...

A Differential Datalog Interpreter

Publication Type: Academic Journal

Source(s): Software, Vol 2, Iss 20, Pp 427-446 (2023)

Abstract: The core reasoning task for datalog engines is materialization, the evaluation of a datalog program over a database alongside its physical incorporation into the database itself. The de-facto method of computing is through the recursive application of ...

User Authorization in Microservice-Based Applications

Publication Type: Academic Journal

Source(s): Software, Vol 2, Iss 19, Pp 400-426 (2023)

Abstract: Microservices have emerged as a prevalent architectural style in modern software development, replacing traditional monolithic architectures. The decomposition of business functionality into distributed microservices offers numerous benefits, but intro...

A Quantitative Review of the Research on Business Process Management in Digital Transformation: A Bibliometric Approach

Publication Type: Academic Journal

Source(s): Software, Vol 2, Iss 18, Pp 377-399 (2023)

Abstract: In recent years, research on digital transformation (DT) and business process management (BPM) has gained significant attention in the field of business and management. This paper aims to conduct a comprehensive bibliometric analysis of global research...

An Automated Approach to Horn Antenna Impedance Matching and Manufacturing Using 3D Printing

Publication Type: Academic Journal

Source(s): Journal of Communications Software and Systems, Vol 19, Iss 3, Pp 188-198 (2023)

Abstract: In this paper, we propose a streamlined design and automation of a horn antenna and its rectangular waveguide-based feeder using computer simulation-based optimizations and additive manufacturing. The approach enables time-effectiveness with a holistic...

Frequency Synchronization in Frequency Domain OFDM-IM based WLAN Systems

Publication Type: Academic Journal

Source(s): Journal of Communications Software and Systems, Vol 19, Iss 3, Pp 199-206 (2023)

Abstract: The next-generation of wireless local area network systems are being conceptualized with new applications, smart devices and use cases which mandate unprecedented levels of high data rates, spectral efficiency, reliability, low latency and high energy ...

An Exploratory Analysis of Feature Selection for Malware Detection with Simple Machine Learning Algorithms

Publication Type: Academic Journal

Source(s): Journal of Communications Software and Systems, Vol 19, Iss 3, Pp 207-219 (2023)

Abstract: Computers have become increasingly vulnerable to malicious attacks with an increase in popularity and the proliferation of open system architectures. There are numerous malware detection technologies available to protect the computer operating system f...

Recommendation of Regression Models for Real Estate Price Prediction using Multi-Criteria Decision Making

Publication Type: Academic Journal

Source(s): Journal of Communications Software and Systems, Vol 19, Iss 3, Pp 220-229 (2023)

Authors:

Abstract: Accurate prediction of real estate prices is an essential task for establishing real estate policies. Even though various regression models for real estate price prediction have been developed so far, selecting the most suitable regression model is a c...

sponsored