Accounting & Information Systems: المرسلات الحديثة
السجلات المعروضة 181 -- 200 من 513
-
Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions
( Hindawi , 2020 , Article)The aim of the Internet of things (IoT) is to bring every object (wearable sensors, healthcare sensors, cameras, home appliances, smart phones, etc.) online. These different objects generate huge data which consequently ... -
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
( Hindawi , 2020 , Article)Feature-based software birthmark is an essential property of software that can be used for the detection of software theft and many other purposes like to assess the security in end-to-end communication systems. Research ... -
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
( Hindawi , 2020 , Article)The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile ... -
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
( IEEE , 2020 , Article)Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, ... -
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network
( IEEE , 2020 , Article)Skin cancer is developed due to abnormal cell growth. These cells are grown rapidly and destroy the normal skin cells. However, it's curable at an initial stage to reduce the patient's mortality rate. In this article, the ... -
Parallelisation of a cache-based stream-relation join for a near-real-time data warehouse
( MDPI , 2020 , Article)Near real-time data warehousing is an important area of research, as business organisations want to analyse their businesses sales with minimal latency. Therefore, sales data generated by data sources need to reflect ... -
Possible linkage between internet addiction, socio-demographic, and behavioural constructs: a case study of Saudi Arabia and Bahrain-based employees
( Inderscience , 2020 , Article)Internet addiction (IA) is much sought after concept in the present-day human lives in which technology has emerged as a vital part. The ever-growing role of internet technology also accrues to a sizable amount of problems ... -
Blockchain-Based Automated System for Identification and Storage of Networks
( Hindawi , 2021 , Article)Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. ... -
Complexity of Deep Convolutional Neural Networks in Mobile Computing
( Hindawi , 2020 , Article)Neural networks employ massive interconnection of simple computing units called neurons to compute the problems that are highly nonlinear and could not be hard coded into a program. These neural networks are computation-intensive, ... -
A systematic review on cloud storage mechanisms concerning e-healthcare systems
( MDPI , 2020 , Article)As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information ... -
Recognition of different types of leukocytes using YOLoV2 and optimized bag-of-features
( IEEE , 2020 , Article)White blood cells (WBCs) protect human body against different types of infections including fungal, parasitic, viral, and bacterial. The detection of abnormal regions in WBCs is a difficult task. Therefore a method is ... -
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
( Hindawi , 2020 , Article)In this paper, we proposed LCX-MAC (local coordination X-MAC) as an extension of X-MAC. X-MAC is an asynchronous duty cycle medium access control (MAC) protocol. X-MAC used one important technique of short preamble which ... -
Attributes-Based Decision Making for Selection of Requirement Elicitation Techniques Using the Analytic Network Process
( Hindawi , 2020 , Article)Requirement engineering is the first phase of software engineering. In requirement engineering, the first phase is requirement elicitation (RE), which is the most critical and error-prone activity. In this phase, the ... -
Analyzing factors that influence offshore outsourcing decision of application maintenance
( IEEE , 2020 , Article)Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application ... -
Big data velocity management-from stream to warehouse via high performance memory optimized index join
( IEEE , 2020 , Article)Efficient resource optimization is critical to manage the velocity and volume of real-time streaming data in near-real-time data warehousing and business intelligence. This article presents a memory optimisation algorithm ... -
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions
( Hindawi , 2020 , Article)Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive ... -
Enterprise strategic shift of technology: cloud-based systems verses traditional distributed system
( Inderscience , 2020 , Article)Cloud computing can be perceived as an amalgamation of technology, facilitator, source and as an application that raised the curtain for a shift in the global data management system. There is a need for more research and ... -
An Integrated Design for Classification and Localization of Diabetic Foot Ulcer based on CNN and YOLOv2-DFU Models
( IEEE , 2020 , Article)Diabetes is a chronic disease, if not treated in time may lead to many complications including diabetic foot ulcers (DFU). DFU is a dangerous disease, it needs regular treatment otherwise it may lead towards foot amputation. ... -
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals
( Springer , 2021 , Article)Mobile ubiquitous computing has not only enriched human comfort but also has a deep impact on changing standards of human daily life. Modern inventions can be even more automated by using the Internet of Things (IoT) and ... -
AI-Enabled Sensing and Decision-Making for IoT Systems
( Hindawi , 2021 , Article)The influential stage of Internet of Things (IoT) has reformed all fields of life in general but specifically with the emergence of artificial intelligence (AI) has drawn the attention of researchers into a new paradigm ...