Reviewing software testing models and optimization techniques: an analysis of efficiency and advancement needs

S Kumar - Journal of Computers, Mechanical and Management, 2023 - jcmm.co.in
Software testing is a crucial component of software engineering that aims to confirm the
intended functionality of software modules and minimize the likelihood of future failures. This …

6G enabled industrial internet of everything: Towards a theoretical framework

PK Padhi, F Charrua-Santos - Applied System Innovation, 2021 - mdpi.com
Currently, the deficiencies of the 5G mobile system as an enabler of Internet of Everything
(IoE) applications are stimulating global research activities to focus on the sixth generation …

Elicitation of nonfunctional requirements in agile development using cloud computing environment

M Younas, DNA Jawawi, MA Shah, A Mustafa… - IEEE …, 2020 - ieeexplore.ieee.org
Nonfunctional requirements get less attention because functional requirements are
considered more important in the domain of agile software methodologies. This is due to the …

Applications of the R-Transform for Advancing Cryptographic Security

T Gunasekar, P Raghavendran - Driving Transformative Technology …, 2024 - igi-global.com
Cryptography, the discipline of disguising information, relies on mathematical principles for
encoding and decoding data. This chapter presents an inventive approach to encrypting and …

Advancing Cryptographic Security With Kushare Transform Integration

R Prabakaran, T Gunasekar - Driving Transformative Technology …, 2024 - igi-global.com
This chapter introduces a groundbreaking encryption approach utilizing the Kushare
transform and modular arithmetic, departing from conventional cryptographic methods. It …

[Retracted] A Secure Private Cloud Storage Platform for English Education Resources Based on IoT Technology

W Li, Y Guo - Computational and Mathematical Methods in …, 2022 - Wiley Online Library
The contemporary ubiquitous “cloud” network knowledge and information resources, as well
as ecological pedagogy theory, have enlarged teaching research's perspective, widened …

Investigation of cybersecurity attacks and threats on cloud using black widow algorithm with recurrent neural network

S Senthil Kumar, S Arockia Panimalar… - SN Computer …, 2022 - Springer
The amount of personal and sensitive information collected by data collectors is rising.
Those details are processed and saved on the cloud's servers. Risks and hazards exist in …

Privacy-Preserving Data Storage and Processing in the Cloud

PK Goel - Driving Transformative Technology Trends With Cloud …, 2024 - igi-global.com
In the ever-expanding landscape of cloud computing, concerns over the privacy of sensitive
data have become paramount. This chapter delves into the intricate realm of privacy …

[PDF][PDF] Factors Affecting the Adoption of Cloud for Software Development: A Case from Turkey

E Pisirir, O Chouseinoglou… - International Journal of …, 2023 - repository.bilkent.edu.tr
Cloud-based solutions for software development activities have been emerging in the last
decade. This study aims to develop a hybrid technology adoption model for cloud use in …

Digitalization of Organizational Memory

OE Cicek - Driving Transformative Technology Trends With Cloud …, 2024 - igi-global.com
Organizational memory has a crucial role for businesses, especially in the context of cloud
computing. Cloud computing technologies facilitate the storage, management, and access of …