Search
Now showing items 41-50 of 136
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
(
Hindawi
, 2020 , Article)
In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...
An Integrated Design for Classification and Localization of Diabetic Foot Ulcer based on CNN and YOLOv2-DFU Models
(
IEEE
, 2020 , Article)
Diabetes is a chronic disease, if not treated in time may lead to many complications including diabetic foot ulcers (DFU). DFU is a dangerous disease, it needs regular treatment otherwise it may lead towards foot amputation. ...
The Effect of Audit Committee’s Characteristics on the Audit Report Timeliness: Empirical Evidence from the UK
(
Alexandria University
, 2021 , Article)
This paper examines the association between the attributes of the audit committees (ACs)
and the audit report timeliness for UK FTSE350 companies over the period 2017 to 2019. In
particular, we investigate the impact of ...
Systematic Mapping Study on Security Approaches in Secure Software Engineering
(
IEEE
, 2021 , Article)
In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ...
An agile educational framework: A response for the covid-19 pandemic
(
Taylor & Francis
, 2021 , Article)
The COVID-19 pandemic has caused an emergent move in all countries across the world. All education institutions were forced to shut down until further notice and were forced to come up with creative solutions to continue ...
Determinants of the continuous use of mobile apps: The mediating role of users awareness and the moderating role of customer focus
(
Growing Science
, 2021 , Article)
This research empirically explored the factors influencing the continuous use of mobile Apps in Jordan. The research utilized the Theory of Planned Behavior, the Diffusion of Innovation Theory and the Social Cognitive ...
Big data velocity management-from stream to warehouse via high performance memory optimized index join
(
IEEE
, 2020 , Article)
Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ...
Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine
(
Tech Science Press
, 2021 , Article)
During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto ...
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
(
PLOS
, 2022 , Article)
Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ...
Utilizing the theory of reasoned action in understanding students’ choice in selecting accounting as major
(
Taylor & Francis
, 2020 , Article)
Many researchers have endeavoured to explore the factors that influence the choice of students to major in accounting. To this end, and by using the theory of reasoned action (TRA), this study contributes to the accounting ...