198 results on '"Soh, Ben"'
Search Results
2. Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning
3. AMCB: Authenticated Medical Cyber-Physical Blockchain model
4. AMCB: enhancing the authentication process with blockchain integrated with PUF and machine learning
5. A new neural-network-based model for measuring the strength of a pseudorandom binary sequence
6. IiCE: A Proposed System Based on IoTaaS to Study Administrative Efficiency in Primary Schools
7. Energy Inefficacy in IoT Networks: Causes, Solutions and Enabling Techniques
8. A Comprehensive Study on the Energy Efficiency of IoT from Four Angles: Clustering and Routing in WSNs, Smart Grid, Fog Computing and MQTT & CoAP Application Protocols
9. Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration
10. IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks
11. Utilisation of hospital information systems for medical research in Saudi Arabia: A mixed-method exploration of the views of healthcare and IT professionals involved in hospital database management systems
12. A Conceptual Model for Cloud-Based E-Training in Nursing Education
13. Deployment of Fog Computing During Hajj Season: A Proposed Framework
14. The Efficacy of Facebook in Teaching and Learning: Studied via Content Analysis of Web Log Data
15. A Novel Approach of Using Data Flipping for Efficient Energy on the Internet of Things
16. Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems
17. Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning
18. A New Cryptosystem Based On Hidden Order Groups
19. Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel Proposal
20. Challenges and Solutions for Applications and Technologies in the Internet of Things
21. Byzantine Fault-Tolerant Architecture in Cloud Data Management
22. A Conceptual Model for Cloud-Based E-Training in Nursing Education
23. A Cloud-Based Architecture for Interactive E-Training
24. Managing Multi-Cloud Data Dependability Faults
25. Attitudes of Saudi female students toward the use of mobile devices in learning computer programming: An empirical study
26. A Proposed Methodology for an E-Health Monitoring System Based on a Fault-Tolerant Smart Mobile
27. An Aspect-Oriented Approach to Time-Constrained Strategies in Smart City IoT Applications.
28. RELATIONSHIP OF PERCEIVED USEFULNESS, PERCEIVED EASE OF USE, AND INTEGRATING PERSONAL INNOVATIVENESS IN INFORMATION TECHNOLOGY (PIIT) WITH THE INTENTION TO USE MOOCS CONTINUOUSLY USING THE TECHNOLOGY ACCEPTANCE MODEL.
29. Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing.
30. Systematic Literature Review on the Effectiveness of E-Coaching in Higher Education
31. Determinants of Medical Internet of Things Adoption in Healthcare and the Role of Demographic Factors Incorporating Modified UTAUT
32. Dynamic Hardware Redundancy Approaches Towards Improving Service Availability in Fog Computing
33. Requirement Engineering for E-Coaching in Higher Education
34. RETFAL: Real-Time Feedback System in Active Learning
35. Orchestrating the Resilience of Cloud Microservices Using Task-Based Reliability and Dynamic Costing
36. A Parallelism Extended Approach for the Enumeration of Orthogonal Arrays
37. Fog Computing: Strategies for Optimal Performance and Cost Effectiveness
38. Secure Wireless Control Area Network
39. A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks
40. A Step-by-Step Extending Parallelism Approach for Enumeration of Combinatorial Objects
41. Effects on Saudi Female Student Learning Experiences in a Programming Subject Using Mobile Devices: An Empirical Study.
42. Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique
43. Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks
44. A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements
45. A Digital Cash Protocol Based on Additive Zero Knowledge
46. Turning Mass Media to Your Media: Intelligent Search with Customized Results
47. Improving Fault Tolerance and Reliability of Heterogeneous Multi-Agent IoT Systems Using Intelligence Transfer
48. Applying Aspect-Oriented Design Methodology to Manage Time-Validity of Information in Internet-of-Things Systems
49. A New Adaptive Layered Multicast Protocol
50. Structure-free message aggregation and routing in traffic information system (SMART)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.