Search
Now showing items 31-39 of 39
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
(
IEEE
, 2020 , Article)
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ...
A comprehensive analysis of healthcare big data management, analytics and scientific programming
(
IEEE
, 2020 , Article)
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ...
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
(
Hindawi
, 2020 , Article)
The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ...
IoT-enabled smart child safety digital system architecture
(
IEEE
, 2020 , Conference Paper)
Safety of a child in a large public event is a major concern for event organizers and parents. This paper addresses this important concern and proposes an architecture model of the IoT-enable smart child safety tracking ...
Effectiveness of social media sentiment analysis tools with the support of emoticon/emoji
(2019 , Conference Paper)
Organizations are increasingly interested in using microblogging platforms, such as Twitter, to get rapid feedback in several domains using sentiment analysis algorithms to rate, for example, whether a target audience is ...
Pedagogical potentials of IEEE 802.11 WLAN to higher educational institutions: A case study of Nigerian based University
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The research on 'Pedagogical potentials of IEEE 802.11 WLAN to Nigerian based University' is an in depth study to evaluate the potentials of its implementation to the entire teaching and tutoring vertical in Nigerian ...
Violators versus non-violators of information security measures in organizations-A study of distinguishing factors
(
Taylor and Francis Inc.
, 2019 , Article)
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, ...
Are enterprises ready for big data analytics? A survey-based approach
(
Inderscience Publishers
, 2017 , Article)
Big data analytics is a fascinating topic in the field of computer science and information systems as it challenges fundamental aspects of computation. The aim of this study is to investigate the acceptance and usage of ...
Factors influence consumers' adoption of mobile payment devices in Qatar
(
Inderscience
, 2015 , Article)
This research examines the factors that influence the customers' intention in adapting Mobile Payment Device (MPD) technology in an emerging economy (Qatar). Unified Theory of Acceptance and Use of Technology Model (UTAUT) ...