K.O, Fapohunda; Numan, Paulson Eberechukwu; S, Zubair; Bala, Dyaji Charles; Fauzi, Mohd Husaini Bin Mohd; Yusof, Kamaludin Mohammed(2018-09-01)
Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah ...
Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the ...
Motivated by the need to overcome dynamic traffic congestion problems and driving safety issues, lane keeping control of vehicles has become a very active research area and is a driver-assistance vehicle feature that ...
Cloud security mitigation techniques has not reached the level of transparency and hence, the journey of understanding and accepting cloud computing services still remains uncharted for many organizations or individuals. ...
Packet Scheduling (PS) is essential in Long Term Evolution (LTE) cellular system to handle huge traffic via allocating common resources among users. The main target of PS, in LTE systems, is the Radio Resource Management ...
The rapid development of cloud computing has attracted a lot of companies stepping into the cloud family to enhance business efficiency. Cloud Computing is a computing model that enables far-reaching access to a shared ...
A heterogeneous network (HetNet) in LTE is typically a combination of macrocells and small cells contributing to meeting the increasing demand for network capacity. Cell range extension (CRE) is the process to extend the ...
Recently, the Electroencephalography (EEG) signals of human brain are considered by researchers for performing different applications that can solve numerous problems. These research works tackle the problems of movements ...
With the advancement of the digital video and digital image editing tools, this increases the difficulty for humans to identify visually the authentic video from the forged copy. This needs a powerful method that investigates ...
In Software Defined Networking (SDN) which is a new network architecture, the controller represents the main and intelligent part of its components. Today, there exists many SDN controllers both open source and commercial ...
The paper investigate a major challenge of the protection of mutual and transmitted data that exchanged between smart buildings and data centers that works through private cloud computing environment. This challenge faces ...
Rapid technological advancements are changing our day-to-day lives. Technology has improved the way people think, act and respond. Presently, with the growth of digital revolution, everyone is reliant on information ...
Expanding requests on a system data transfer capacity is a natural event on genuine circumstances. In diverse cases, the accessible blockage control instrument within reach cannot meet these requests appropriately because ...
IOT (Internet of Things) type of application is an important challenge. It can be developed for a large variety of fields. However, each thing (device) should be smart device. It is very important in many fields to obtain ...