Accounting & Information Systems: Recent submissions
Now showing items 221-240 of 513
-
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network
( Association for Computing Machinery (ACM) , 2021 , Article)With the recent advancement of smartphone technology in the past few years, smartphone usage has increased on a tremendous scale due to its portability and ability to perform many daily life tasks. As a result, smartphones ... -
DLSA: Delay and Link Stability Aware Routing Protocol for Flying Ad-hoc Networks (FANETs)
( Springer , 2021 , Article)Flying Ad-hoc Network (FANET) is a new class of Mobile Ad-hoc Network in which the nodes move in three-dimensional (3-D) ways in the air simultaneously. These nodes are known as Unmanned Aerial Vehicles (UAVs) that are ... -
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
( Hindawi , 2021 , Article)Cloud computing adoption provides various advantages for companies. In particular, hybrid cloud shares the advantages of both the public and private cloud technologies because it combines the private in-house cloud with ... -
Innovations and Hotel Performance in the Aftermath Announcement of Qatar Hosting FIFA 2022 World Cup
( Cognizant Communication Corporation , 2022 , Article)This article explores innovation processes in tourism within the context of Qatar Hotel sector. A theoretical framework, drawing on the existing literature, is developed to analyze innovation- performance relationships. ... -
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
( IEEE , 2021 , Article)With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. It is of critical significance given the ... -
Wind farms selection using geospatial technologies and energy generation capacity in Gwadar
( Elsevier , 2021 , Article)Pakistan has been a victim of energy crisis since last few decades. This energy crisis has adversely affected country’s socio-economic development and continues to do so. The continuously increasing demand–supply gap has ... -
Possible effect on the perception and attitude of employees after adoption of new information technology and business strategies: a case study of Namibia
( Inderscience , 2021 , Article)Technology adoption and upgradation are the two required aspects for any organisation to create a niche in the marketplace. It is an undeniable fact that this venture could not be completed successfully without the active ... -
Effective video summarization approach based on visual attention
( Tech Science Press , 2022 , Article)Video summarization is applied to reduce redundancy and develop a concise representation of key frames in the video, more recently, video summaries have been used through visual attention modeling. In these schemes, the ... -
D2D-V2X-SDN: Taxonomy and Architecture towards 5G Mobile Communication System
( IEEE , 2021 , Article)In the era of information society and 5G networks, cars are extremely important mobile information carriers. In order to meet the needs of multi-scenario business requirements such as vehicle assisted driving and in-vehicle ... -
An Efficient Multifeature Model for Improving the Performance of Critical Energy Infrastructure
( Hindawi , 2021 , Article)Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the ... -
Home Automation and RFID-Based Internet of Things Security: Challenges and Issues
( Hindawi , 2021 , Article)Internet of Things (IoT) protection refers to the software field related to securing the Internet of Things and associated linked devices and systems. The IoT is a system of interconnected computers, sensors, actuators, ... -
Taking Drones to Next Level: The Performance Evaluation of MAA with BCO Routing Protocols for Flying Ad-hoc Networks (FANETs)
( ADCAIJ , 2021 , Article)Flying Ad-hoc Network (FANET) is a special member/class of Mobile Ad-hoc Network (MANET) in which the movable nodes are known as by the name of Unmanned Aerial Vehicles (UAVs) that are operated from a long remote distance ... -
Role of critical success factors in offshore quality requirement change management using SLR
( IEEE , 2021 , Article)In software engineering field, requirement change management is a challenging job. Ignoring incoming changes results in customer displeasure. It may also result in late product transportation. Managing requirement changes ... -
Offline Pashto Characters Dataset for OCR Systems
( Hindawi , 2021 , Article)In computer vision and artificial intelligence, text recognition and analysis based on images play a key role in the text retrieving process. Enabling a machine learning technique to recognize handwritten characters of a ... -
Decision Support System to Risk Stratification in the Acute Coronary Syndrome Using Fuzzy Logic
( Hindawi , 2021 , Article)Acute coronary syndrome (ACS) is a set of symptoms and signs which define a range of conditions related with the unexpected reduced blood flow to the heart. In ACS, the heart muscles cannot function properly due to the ... -
Automated Detection of Brain Tumor through Magnetic Resonance Images Using Convolutional Neural Network
( Hindawi , 2021 , Article)Brain tumor is a fatal disease, caused by the growth of abnormal cells in the brain tissues. Therefore, early and accurate detection of this disease can save patient's life. This paper proposes a novel framework for the ... -
Systematic Literature Review on Security Risks and its Practices in Secure Software Development
( IEEE , 2022 , Article)Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, ... -
Challenges and practices identification in complex outsourcing relationships: A systematic literature review
( PLOS , 2022 , Article)Complex IT outsourcing relationships aptitude several benefits such as increased cost likelihood and lowered costs, higher scalability and flexibility upon demand. However, by virtue of its complexity, the complex outsourcing ... -
Web 2.0 Technologies Adoption Barriers for External Contacts and Participation: A Case Study of Federal Establishment of Africa
( Inderscience , 2022 , Article)Ever since the evolution of web technology in the 1990's, the web traffic got subjected to many developments. Web 1.0 and 2.0 are some of the innovations that made the world as a global village and increased the communication ... -
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment
( Elsevier , 2022 , Article)Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach ...