Results (140)
Search Parameters:
Keyword: DigitalAnalyzing the Adoption of E-payment Services in Smart Cities using Demographic Analytics: The Case of Dubai
This paper is an extension of previous research that has been done on factors affecting digital payment adoption in the UAE. This study focuses on analyzing which relevant demographic factors affect new e-payment technologies, mainly in the smart city Dubai, with more complexities and dynamics of variables that affect users’ behavior toward adopting new technologies.…
Read MoreDeterminants that Influence Consumers’ Intention to Purchase Smart Watches in the UAE: A Case of University Students
It has been observed that the smartwatches have emerged quickly on the digital era with the ability to significantly influence daily life and improve users’ wellbeing, decisions, and behaviour. Nonetheless they are in their stages of adoption, smartwatches are marked the most widespread type of wearable technologies. Considering this, present work has been carried out…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreDeep Deterministic Policy Gradients for Optimizing Simulated PoA Blockchain Networks Based on Healthcare Data Characteristics
Blockchain technology has proven to be the best solution for digital data storage today, which is decentralized and interconnected via cryptography. Many consensus algorithms can be options for implementation. One of them is the PoA consensus algorithm, which is proven to provide high performance and fault tolerance. Blockchain has been implemented in many sectors, including…
Read MoreDistance Teaching-Learning Experience in Early Childhood Education Teachers During the Coronavirus Pandemic
The purpose of the study was to describe the experiences of teachers in the distance teaching-learning process in early childhood education during the covid-19 pandemic. The methodology used was qualitative descriptive. Interviews were conducted with thirteen teachers from four state educational institutions at the infant level in Lima city through the virtual platform. As a…
Read MoreThe Designing of Institute’s Educational Mascots for Brand Identity
The purpose of this study is to show how to design the character used as the symbol or Mascot of the educational institution and how to apply the design results into advertising and Brand identity design such as printing art, poster, digital media, toy, and souvenir. In this study, the ideas of mascot design have…
Read MoreMobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test
This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…
Read MoreDesign and Implementation of DFT Technique to Verify LBIST at RTL Level
According to IEC 61805 and ISO 26262 standards requirement inclusion of LBIST (Logic Built in Self-Test) became mandatory to achieve safety critical application such as automotive field. In such systems, once device is switched ON LBIST (Logic Built in Self-Test) is activated and testing of digital logic is performed. After safety subsystem says that the…
Read MoreBlockchain Application in Higher Education Diploma Management and Results Analysis
Academic certifications are achievements desired by people, because they have a direct impact, positively, on their social lives. Such an important document, still widely issued in paper format, may be subject to forgery or impossibility of verification due to the unavailability of the issuing entity. This work consists of identifying, analyzing and testing some of…
Read MoreComparison of Support Vector Machine-Based Equalizer and Code-Aided Expectation Maximization on Fiber Optic Nonlinearity Compensation Using a Proposed BER Normalized by Power and Distance Index
Advances in optimizing optical fiber communications have been on the rise these recent years due to the increasing demand for larger data bandwidths and overall better efficiency. Coherent optics have focused on many kinds of research due to its ability to transport greater amounts of information, have better flexibility in network implementations, and support different…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreThe Role of Promotion in Mobile Wallet Adoption – A Research in Vietnam
Mobile wallet is an application that allows users to make online payments using their mobile phones. In the context of an outbreak of COVID-19 epidemic in Vietnam and the world, mobile wallets are considered having many opportunities to change people’s cash spending habits. The current study assesses the factors impact on the intention to use…
Read MoreIT GRC Smart Adviser: Process Driven Architecture Applying an Integrated Framework
This article is a continuation of the work presented in the Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). In this version we focus on matching IT and business processes from different management levels by using IT-Governance (ITG) Risk and Compliance frameworks in a smart way. In fact, every information system…
Read MoreAutomated Extraction of Heavyweight and Lightweight Models of Urban Features from LiDAR Point Clouds by Specialized Web-Software
3D city modeling may be considered as one of the key applications, that are provided by the Automated Feature Extraction (AFE) techniques from LiDAR data. The authors attempt to prove that with growing availability of LiDAR surveying methods the resulted 3D city models become the most significant modeled features for any urban environment. Our paper…
Read MoreC-Band FMCW Radar Design and Implementation for Breathing Rate Estimation
In this paper, a portable Frequency Modulated Continuous Wave (FMCW) radar system was designed and implemented for human movements and breathing detection. The radar operates with a frequency band ranges from 4.7 to 4.9GHz. The radar sub-systems were designed and simulated using up to date computer-aided-design tools before implementation. The Voltage Controlled Oscillators (VCO), high…
Read MoreReview of Pedagogical Principles of Cyber Security Exercises
Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…
Read MoreDesign and Implementation of Reconfigurable Neuro-Inspired Computing Model on a FPGA
In this paper we design a large scale reconfigurable digital bio-inspired computing model. We consider the reconfigurable and event driven parameters in the developed field-programmable neuromorphic computing system. The various Intellectual Property (IP) cores are developed for the modules such as Block RAM, Differential Clock, Floating Point, and First In First Out (FIFO) for the…
Read MoreFast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus
Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…
Read MoreA Framework of E-Procurement Technology for Sustainable Procurement in ISO 14001 Certified Firms in Malaysia
With the current emerging development pattern in Malaysia, E-Government has been unveiled by the Malaysian Government to be one of the multimedia super corridor flagship applications to implement digital technology to improve government operations. E-procurement was originally utilized by businesses to minimize turnaround times and prices, but recently it was often used as a platform…
Read MoreDistributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review
Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…
Read MoreSpot Toyota: Design and Development of a Mobile Application for Toyota’s Promotion Actions to the Young Audience
This project aims to demonstrate the importance that digital media can have to the development of loyalty programs, namely in creating empathy and proximity relationships between brands and their target audience: young people. This study consisted of the creation of a digital platform for Toyota Portugal, named Spot Toyota, to communicate actions promoted by the…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MoreBalance as One of the Attributes in the Customer Segmentation Analysis Method: Systematic Literature Review
The banking industry is very competitive. To utilize the information, they have in order to be a competitive advantage winner is reasonably very crucial for the company. At present, the company does not only focus on the company’s strategy that prioritizes products (e.g. product or service oriented), however also necessitates to focus on the company’s…
Read MorePersonality Measurement Design for Ontology Based Platform using Social Media Text
Human behavior quantification is an essential part of psychological science. One of the cases is measuring human personality. Social media provide rich text, which can be beneficial as a data source to get valuable insight. Previous researches show that social media offered favorable circumstances for psychological researchers by tracking, analyzing, and predicting human character. In…
Read MoreDynamic Objects Parameter Estimation Program for ARM Processors Based Adaptive Controllers
Modern microcontrollers are capable to realize not only traditional PID-regulators but also adaptive ones. Object of control parameters estimation is the biggest part of adaptive control from the point of view of time consumption. The ways to reduce this time for digital control systems based on ARM-CORTEX 32-bit and 64-bit processors are shown in the…
Read More
