Accounting & Information Systems: Recent submissions
Now showing items 221-240 of 562
-
The digital transformation of FinTech: Disruptions and value paths
( Association for Information Systems , 2019 , Conference)The latest tech-enabled financial services supported by the blockchain technology promises to disrupt the strategic positioning of financial institutions and pave the way for FinTechs and TechFins to gain financial centrality. ... -
Electronic performance monitoring friend or foe? Empowering employees through data analytics
( Association for Information Systems , 2018 , Conference)Recent advances in electronic performance monitoring (EPM) have raised employee concerns regarding invasion of privacy and the erosion of trust. However, the use of data analytics on the EPM data promises to improve ... -
Effectiveness of social media sentiment analysis tools with the support of emoticon/emoji
(2019 , Conference)Organizations are increasingly interested in using microblogging platforms, such as Twitter, to get rapid feedback in several domains using sentiment analysis algorithms to rate, for example, whether a target audience is ... -
Isolated Handwritten Pashto Characters Recognition using KNN classifier
( IEEE , 2021 , Article)Regional and cultural diversities around the world and especially in Pakistan has given birth to a large number of writing systems and scripts consists of varying character sets. Developing an optimal OCR system for such ... -
IoT-enabled smart child safety digital system architecture
( IEEE , 2020 , Conference)Safety of a child in a large public event is a major concern for event organizers and parents. This paper addresses this important concern and proposes an architecture model of the IoT-enable smart child safety tracking ... -
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
( IEEE , 2020 , Article)Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ... -
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
( IEEE , 2020 , Article)Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ... -
Blockchain-Based Automated System for Identification and Storage of Networks
( Hindawi , 2021 , Article)Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ... -
Augmented Reality Interface for Complex Anatomy Learning in the Central Nervous System: A Systematic Review
( Hindawi , 2020 , Article)The medical system is facing the transformations with augmentation in the use of medical information systems, electronic records, smart, wearable devices, and handheld. The central nervous system function is to control the ... -
Parallelisation of a cache-based stream-relation join for a near-real-time data warehouse
( MDPI , 2020 , Article)Near real-time data warehousing is an important area of research, as business organisations want to analyse their businesses sales with minimal latency. Therefore, sales data generated by data sources need to reflect ... -
Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions
( Hindawi , 2020 , Article)The aim of the Internet of things (IoT) is to bring every object (wearable sensors, healthcare sensors, cameras, home appliances, smart phones, etc.) online. These different objects generate huge data which consequently ... -
An efficient approach for textual data classification using deep learning
( Frontiers , 2022 , Article)Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset ... -
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
( Hindawi , 2020 , Article)The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile ... -
Possible linkage between internet addiction, socio-demographic, and behavioural constructs: a case study of Saudi Arabia and Bahrain-based employees
( Inderscience , 2020 , Article)Internet addiction (IA) is much sought after concept in the present-day human lives in which technology has emerged as a vital part. The ever-growing role of internet technology also accrues to a sizable amount of problems ... -
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
( Hindawi , 2020 , Article)Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ... -
A comprehensive analysis of healthcare big data management, analytics and scientific programming
( IEEE , 2020 , Article)Healthcare systems are transformed digitally with the help of medical technology, information systems, electronic medical records, wearable and smart devices, and handheld devices. The advancement in the medical big data, ... -
Toward a Significant E-Voting Adoption Model: The Digital Divide
(2022 , Article)Technology, through internet use, has changed how citizens interact and communicate with their governments. However, in any society, a proportion of people cannot access this type of interaction due to digital divide issues. ... -
Big data velocity management-from stream to warehouse via high performance memory optimized index join
( IEEE , 2020 , Article)Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ... -
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
( IEEE , 2020 , Article)White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ... -
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
( Hindawi , 2020 , Article)In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ...