بحث بسيط
السجلات المعروضة 31 -- 40 من 143
Transforming the Capabilities of Artificial Intelligence in GCC Financial Sector: A Systematic Literature Review
(
Wiley
, 2022 , Article)
Identity and access management is a business process framework that makes it easier to maintain genuine user identities and regulate access to sensitive assets. The word "access control"refers to an organization's policy ...
Matters may matter: The disclosure of key audit matters in the Middle East
(
Cogent OA
, 2022 , Article)
The main objective of this research is to investigate the extent of the disclosure of key audit matters (KAMs) and the factors that affect the level of KAMs' disclosure in the audit reports of the Middle East (ME) region. ...
Systematic Analysis of Risk Associated with Supply Chain Operations Using Blockchain Technology
(
Wiley
, 2022 , Article)
Advancements in information and communication technologies (ICT), big data analytics, and artificial intelligence- (AI-) based techniques brought a dramatic revolution in diverse research domains, including healthcare, ...
A Task-Technology-Identity Fit Model of Smartwatch Utilization and User Satisfaction: A Hybrid SEM-Neural Network Approach
(
Springer
, 2022 , Article)
Smartwatches are wearable devices intended to be smartphone companions that capture health data and ease access to notifications. They have also become personalisable standing as a fashion statement. This combination ...
Assessing the Role of AI-Based Smart Sensors in Smart Cities Using AHP and MOORA
(
Multidisciplinary Digital Publishing Institute (MDPI)
, 2023 , Article)
We know that in today’s advanced world, artificial intelligence (AI) and machine learning (ML)-grounded methodologies are playing a very optimistic role in performing difficult and time-consuming activities very conveniently ...
Making the Sourcing Decision of Software Maintenance and Information Technology
(
IEEE
, 2021 , Article)
Outsourcing has been getting a significant growth for the last few years. Organizations tend to outsource Information Technology (IT), primarily to take advantage of the availability of qualified, trained and skilled ...
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
(
Hindawi
, 2021 , Article)
Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ...
A comprehensive analysis of healthcare big data management, analytics and scientific programming
(
IEEE
, 2020 , Article)
Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ...
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
(
Hindawi
, 2020 , Article)
The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ...
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...