In today’s scenario a device is considered smart if it has the ability to sense touch. Everything that is consider...
In the era of computer age, with the invention of new technologies the need tocompute with accuracy is increasing. The n...
Smart cities are the need of developing India. One of the main concerns of smart cities is security of its people and sa...
The study investigated the computerization of stock control in Federal Ministry of works, Kaduna State Nigeria. A survey...
Integrating multiple information and communication technologies in a smart city requires numerous web applications as we...
The output of the system is a sequence of actions in some applications. There is no such measure as the best action in a...
Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources in a website for fast develo...
Phishing is a lawless activity using social work techniques information such as online banking secret codes and credit c...
In this paper, we propose Securitas, a protocol identification system used for network trace, which exploits the semanti...
Present Estimation techniques does not gives desirable results with present COCOMO models, normal neural networks etc. T...