Accounting & Information Systems: Recent submissions
Now showing items 241-260 of 527
-
Possible effect on the perception and attitude of employees after adoption of new information technology and business strategies: a case study of Namibia
( Inderscience , 2021 , Article)Technology adoption and upgradation are the two required aspects for any organisation to create a niche in the marketplace. It is an undeniable fact that this venture could not be completed successfully without the active ... -
Effective video summarization approach based on visual attention
( Tech Science Press , 2022 , Article)Video summarization is applied to reduce redundancy and develop a concise representation of key frames in the video, more recently, video summaries have been used through visual attention modeling. In these schemes, the ... -
D2D-V2X-SDN: Taxonomy and Architecture towards 5G Mobile Communication System
( IEEE , 2021 , Article)In the era of information society and 5G networks, cars are extremely important mobile information carriers. In order to meet the needs of multi-scenario business requirements such as vehicle assisted driving and in-vehicle ... -
An Efficient Multifeature Model for Improving the Performance of Critical Energy Infrastructure
( Hindawi , 2021 , Article)Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the ... -
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
( Hindawi , 2021 , Article)Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ... -
Taking Drones to Next Level: The Performance Evaluation of MAA with BCO Routing Protocols for Flying Ad-hoc Networks (FANETs)
( ADCAIJ , 2021 , Article)Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance ... -
Role of critical success factors in offshore quality requirement change management using SLR
( IEEE , 2021 , Article)In software engineering field, requirement change management is a challenging job. Ignoring incoming changes results in customer displeasure. It may also result in late product transportation. Managing requirement changes ... -
Offline Pashto Characters Dataset for OCR Systems
( Hindawi , 2021 , Article)In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ... -
Decision Support System to Risk Stratification in the Acute Coronary Syndrome Using Fuzzy Logic
( Hindawi , 2021 , Article)Acute coronary syndrome (ACS) is a set of symptoms and signs which define a range of conditions related with the unexpected reduced blood flow to the heart. In ACS, the heart muscles cannot function properly due to the ... -
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
( Hindawi , 2021 , Article)Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ... -
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
( IEEE , 2022 , Article)Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, ... -
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
( PLOS , 2022 , Article)Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ... -
Web 2.0 Technologies Adoption Barriers for External Contacts and Participation: A Case Study of Federal Establishment of Africa
( Inderscience , 2022 , Article)Ever since the evolution of web technology in the 1990's, the web traffic got subjected to many developments. Web 1.0 and 2.0 are some of the innovations that made the world as a global village and increased the communication ... -
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment
( Elsevier , 2022 , Article)Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach ... -
An Intelligent and Secure Air Quality Monitoring System Using Neural Network Algorithm and Blockchain
( Taylor & Francis , 2022 , Article)Indoor air pollution is more dangerous for residents. So, it is necessary to monitor the quality of indoor air and take some preventive steps to reduce the possible dangers to the health of the inhabitants. The cost and ... -
Towards Enhancing the Capability of IoT Applications by Utilizing Cloud Computing Concept
( Wiley , 2022 , Article)The emergence of smart and innovative applications in diverse domains has inspired our lives by presenting many state-of-The art applications ranging from offline to smart online systems, smart communication system to ... -
Dimensional approach to assess the benefits of video lecture capturing in higher education: a case study of Qatar
( Inderscience , 2022 , Article)Education sectors have undergone many dynamic changes surpassing the age-old methodologies with contemporary digitalised ones. This journey of a couple of decades could witness many state-of-the-art pedagogy-related ... -
Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan
( Elsevier , 2022 , Article)The significant proliferation in the mobile health applications (Apps) amidst Coronaviruses disease 2019 (COVID-19) resulted in decision making problems for healthcare professionals, decision makers and mobile users in ... -
Container Performance and Vulnerability Management for Container Security Using Docker Engine
( Wiley , 2022 , Article)Containers have evolved to support microservice architecture as a low-cost alternative to virtual machines. Containers are increasingly prevalent in the virtualization landscape because of better working; containers can ... -
Systematic Analysis of Risk Associated with Supply Chain Operations Using Blockchain Technology
( Wiley , 2022 , Article)Advancements in information and communication technologies (ICT), big data analytics, and artificial intelligence- (AI-) based techniques brought a dramatic revolution in diverse research domains, including healthcare, ...