Accounting & Information Systems: المرسلات الحديثة
السجلات المعروضة 221 -- 240 من 543
-
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
( IEEE , 2020 , Article)White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ... -
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
( Hindawi , 2020 , Article)In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ... -
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
( Hindawi , 2020 , Article)Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ... -
Analyzing factors that influence offshore outsourcing decision of application maintenance
( IEEE , 2020 , Article)Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ... -
Big data velocity management-from stream to warehouse via high performance memory optimized index join
( IEEE , 2020 , Article)Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ... -
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
( Hindawi , 2020 , Article)Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ... -
Enterprise strategic shift of technology: cloud-based systems verses traditional distributed system
( Inderscience , 2020 , Article)Cloud computing can be perceived as an amalgamation of technology, facilitator, source and as an application that raised the curtain for a shift in the global data management system. There is a need for more research and ... -
An Integrated Design for Classification and Localization of Diabetic Foot Ulcer based on CNN and YOLOv2-DFU Models
( IEEE , 2020 , Article)Diabetes is a chronic disease, if not treated in time may lead to many complications including diabetic foot ulcers (DFU). DFU is a dangerous disease, it needs regular treatment otherwise it may lead towards foot amputation. ... -
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals
( Springer , 2021 , Article)Mobile ubiquitous computing has not only enriched human comfort but also has a deep impact on changing standards of human daily life. Modern inventions can be even more automated by using the Internet of Things (IoT) and ... -
AI-Enabled Sensing and Decision-Making for IoT Systems
( Hindawi , 2021 , Article)The influential stage of Internet of Things (IoT) has reformed all fields of life in general but specifically with the emergence of artificial intelligence (AI) has drawn the attention of researchers into a new paradigm ... -
Cross corpus multi-lingual speech emotion recognition using ensemble learning
( Springer , 2021 , Article)Receiving an accurate emotional response from robots has been a challenging task for researchers for the past few years. With the advancements in technology, robots like service robots interact with users of different ... -
Making the Sourcing Decision of Software Maintenance and Information Technology
( IEEE , 2021 , Article)Outsourcing has been getting a significant growth for the last few years. Organizations tend to outsource Information Technology (IT), primarily to take advantage of the availability of qualified, trained and skilled ... -
Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management from Vendors' Perspective
( IEEE , 2021 , Article)Software project management inspires and urges the spirit of software developing team members which continues until project completion. Obviously, success of every project based on right selection of team members that ... -
Smart Object Detection and Home Appliances Control System in Smart Cities
( Tech Science Press , 2021 , Article)During the last decade the emergence of Internet of Things (IoT) based applications inspired the world by providing state of the art solutions to many common problems. From traffic management systems to urban cities planning ... -
Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review
( IEEE , 2021 , Article)Over the last few decades, the development in the field of navigation and routing devices has become a hindering task for the researchers to develop smart and intelligent guiding mechanism at indoor and outdoor locations ... -
Systematic Mapping Study on Security Approaches in Secure Software Engineering
( IEEE , 2021 , Article)In the modern digital era, software systems are extensively adapted and have become an integral component of human society. Such wide use of software systems consists of large and more critical data that inevitably needs ... -
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview
( Hindawi , 2021 , Article)Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different ... -
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition
( Hindawi , 2021 , Article)The interest in Facial Expression Recognition (FER) is increasing day by day due to its practical and potential applications, such as human physiological interaction diagnosis and mental disease detection. This area has ... -
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions
( Hindawi , 2021 , Article)Software component plays a significant role in the functionality of software systems. Component of software is the existing and reusable parts of a software system that is formerly debugged, confirmed, and practiced. The ... -
Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine
( Tech Science Press , 2021 , Article)During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto ...