|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid
Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. However,...
ver más
|
|
|
|
|
|
|
Rajiv Paudel and Arika Ligmann-Zielinska
Agent-based model (ABM) development needs information on system components and interactions. Qualitative narratives contain contextually rich system information beneficial for ABM conceptualization. Traditional qualitative data extraction is manual, comp...
ver más
|
|
|
|
|
|
|
Yajing Wang, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang and Weifeng Rao
As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If the original design models or the STL (stereolithography) files ar...
ver más
|
|
|
|
|
|
|
Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil and Jigang Liu
This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended?in previous litera...
ver más
|
|
|
|
|
|
|
João Reis, Marlene Amorim, Nuno Melão, Yuval Cohen and Joana Costa
The preliminary credibility assessment screening system (PCASS) is a US-based program, which is currently being implemented by intelligence units of the North Atlantic Treaty Organization (NATO) to make the initial screening of individuals suspected of i...
ver más
|
|
|
|
|
|
|
Norah Alshareef, Xiaohong Yuan, Kaushik Roy and Mustafa Atay
In biometric systems, the process of identifying or verifying people using facial data must be highly accurate to ensure a high level of security and credibility. Many researchers investigated the fairness of face recognition systems and reported demogra...
ver más
|
|
|
|
|
|
|
Nisha Rawindaran, Ambikesh Jayal, Edmond Prakash and Chaminda Hewage
Cyber security has made an impact and has challenged Small and Medium Enterprises (SMEs) in their approaches towards how they protect and secure data. With an increase in more wired and wireless connections and devices on SME networks, unpredictable mali...
ver más
|
|
|
|
|
|
|
Khaled Aldiabat,Anwar Al-Gasaymeh,Ameer Sardar K.Rashid
Pág. pp. 37 - 49
Banks have changed from paper-based banking solutions provider to the latest of the technologies like mobile banking. Adoption of mobile-banking has received more attention in recent years, because there are more phones than computers in the market. But,...
ver más
|
|
|
|