71,556 Hits in 6.1 sec

Context-aware systems: A literature review and classification

Jong-yi Hong, Eui-ho Suh, Sung-Jin Kim
2009 Expert systems with applications  
This paper is based on a literature review of context-aware systems from 2000 to 2007 using a keyword index and article title search.  ...  Therefore, the goal of this paper is to review the works that were published in journals, suggest a new classification framework of context-aware systems, and explore each feature of classification framework  ...  To provide a conceptual framework for the integration and classification of articles. To derive suggestions for context-aware systems researchers based on the literature review.  ... 
doi:10.1016/j.eswa.2008.10.071 fatcat:ydw6hmboe5cnvk4ouh2qq6v2vu

Mashups: A Literature Review and Classification Framework

Brandon Beemer, Dawn Gregg
2009 Future Internet  
This study presents a broad review of mashup literature to help frame the subtopics in mashup research.  ...  Current mashup literature focuses on a wide array of issues, which can be partially explained by how new the topic is.  ...  A possible explanation for this is that web mashup literature lacks a thorough literature review to identify its boundaries, common issues, and subtopics.  ... 
doi:10.3390/fi1010059 fatcat:icowpcd3ofdbfdneekvointvaq

A Descriptive Literature Review and Classification of Cloud Computing Research

Haibo Yang, Mary Tate
2012 Communications of the Association for Information Systems  
We present a descriptive literature review and classification scheme for cloud computing research.  ...  This is followed by the results of our literature review and classification. Then we discuss the implications of this review, and finally offer some conclusions.  ...  Literature Review Methods on a Qualitative-Quantitative Continuum The narrative review is the traditional way of reviewing the literature and is skewed towards a qualitative interpretation of the literature  ... 
doi:10.17705/1cais.03102 fatcat:cyjvjfhy4bgrpc6lvw7npbnsym

Virtual Reality: A Literature Review and Metrics-based Classification

Peter Ankomah, Peter Vangorp
2018 Computer Graphics and Visual Computing  
This review and classification of VR metrics presents an alternative metrics-based view of VR experiments and research.  ...  The main aim is to review and classify VR research based on several metrics: presence and immersion, navigation and interaction, knowledge improvement, performance and usability.  ...  A review of literature identified metrics considered during an evaluation of a Virtual Environment (VE) as an alternative to an existing non-VR environment.  ... 
doi:10.2312/cgvc.20181222 dblp:conf/tpcg/AnkomahV18 fatcat:o5ecsmfmtjdsvj5ji7kmkwcq3m

Enterprise Resource Planning: A Systematic Literature Review and the 6P Classification

Arjun Puthuruthy
2021 Psychology (Savannah, Ga.)  
Based on this framework a systematic literature review is carried out to identify the trends in ERP related research and also lists out high quality journals in ERP area.  ...  This review assesses and ascertains the multi-disciplinary aspect of the subject ERP by grouping journals based on their subject area.  ...  There are a handful of a comprehensive and respected literature reviews by various authors starting from 2001.Most of these reviews cover the literature for a specific period.  ... 
doi:10.17762/pae.v58i2.2975 fatcat:47gtgqm3z5hsnkvyueqyru2g4q

Blockchain for genomics and healthcare: a literature review, current status, classification and open issues

Beyhan Adanur Dedeturk, Ahmet Soran, Burcu Bakir-Gungor
2021 PeerJ  
Blockchain is an immutable transaction ledger, which offers secure and distributed system without a central authority.  ...  In this review, firstly, we aim to highlight the challenges of EHR and genomic data sharing.  ...  After authentication, system users interact with the PAU to send their data to the system using a secure channel. Blockchain holds the data of the users.  ... 
doi:10.7717/peerj.12130 pmid:34703661 pmcid:PMC8487622 fatcat:cow6hvd4hvbvfgkdwn752xsxim

Blockchain Technology for Sustainable Supply Chain Management: A Systematic Literature Review and a Classification Framework

Vineet Paliwal, Shalini Chandra, Suneel Sharma
2020 Sustainability  
It proposes a reusable classification framework—emerging technology literature classification level (ETLCL) framework—based on Grounded Theory and the technology readiness level for conducting literature  ...  Through a systematic review of publications in reputed peer-reviewed journals, this paper investigates the role of blockchain technology in sustainable supply chain management.  ...  Acknowledgments: We would like to thank Arumugam Seetharaman and Koilakuntla Maddulety of the S P Jain School of Global Management for devoting time for presentations and giving suggestions.  ... 
doi:10.3390/su12187638 doaj:2673dbc816cc4a718238117236ebf2c1 fatcat:zbau3jr3tjeanpmxu6ijpbleku

Classifications of Sustainable Factors in Blockchain Adoption: A Literature Review and Bibliometric Analysis

Ammar AL-Ashmori, Shuib Bin Basri, P. D. D. Dominic, Luiz Fernando Capretz, Amgad Muneer, Abdullateef Oluwagbemiga Balogun, Abdul Rehman Gilal, Rao Faizan Ali
2022 Sustainability  
In addition, a systematic literature review (SLR) was conducted to identify gaps in Blockchain adoption research and the top reasons for adopting Blockchain with the intention of proposing a sustainable  ...  This study uses a Scientometric analysis and critical review to examine the evolution of Blockchain adoption research on the Web of Science Principal Collection.  ...  We employed a systematic protocol to generate a collection of studies with diverse steps of literature review.  ... 
doi:10.3390/su14095176 fatcat:xyuji6p3mbgoloedwbv2awazu4

The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature

E.W.T. Ngai, Yong Hu, Y.H. Wong, Yijun Chen, Xin Sun
2011 Decision Support Systems  
This paper presents a review ofand classification scheme forthe literature on the application of data mining techniques for the detection of financial fraud.  ...  Although financial fraud detection (FFD) is an emerging topic of great importance, a comprehensive literature review of the subject has yet to be carried out.  ...  DM-Based FF-Based Final Result of Classification Identification of Research Area Formulating Review Research Goal Analysis of Selected Papers Results and Conclusions Research Definition Research  ... 
doi:10.1016/j.dss.2010.08.006 fatcat:h3nautk4mncqfo4dvxt7i3t3k4

A literature review on one-class classification and its potential applications in big data

Naeem Seliya, Azadeh Abdollah Zadeh, Taghi M. Khoshgoftaar
2021 Journal of Big Data  
We present a detailed survey of OCC-related literature works published over the last decade, approximately.  ...  We closely examine and evaluate selected works on OCC such that a good cross section of approaches, methods, and application domains is represented in the survey.  ...  Acknowledgements We would like to thank the various reviewers in the Data Mining and Machine Learning Laboratory at Florida Atlantic University, Boca Raton, FL 33431.  ... 
doi:10.1186/s40537-021-00514-x fatcat:iaqfshjii5butmn64yrecd5yxq

Impacted mandibular third molars: Review of literature and a proposal of a combined clinical and radiological classification

P Santosh
2015 Annals of Medical and Health Sciences Research  
A total of 826 articles were screened, and 50 articles were included in the review which was obtained from 1980 to February 2015.  ...  Even though various classifications exist in the literature, none of those address the combined clinical and radiologic assessment of the impacted third molar.  ...  A total of 826 articles were screened, and 50 articles were included in the review.  ... 
doi:10.4103/2141-9248.160177 pmid:26229709 pmcid:PMC4512113 fatcat:eytuwwsgzbcfxgoj37hh2wquta

Graphical Password Authentication System

Pathik Nandi, Dr. Preeti Savant
2022 International Journal for Research in Applied Science and Engineering Technology  
And Shoulder-surfing is a one of the threats where a criminal can steal a password by direct observation or by recording the authentication session.  ...  Second, you must log in with a valid user ID and password. The password is a grouping of characters and numbers.  ...  In recall-based techniques is a process that user has to remember that was done during registration time. II. LITERATURE REVIEW "Graphical Password Authentication" by Shraddha M, Leena S.  ... 
doi:10.22214/ijraset.2022.41621 fatcat:6hmmjkspj5etvnwcsz4nga4v7y

Subject Review: Securing Iris Authentication System

Raniah Ali Mustafa, Haitham Salman Chyad
2022 Zenodo  
Two components are available from a biometric system: authentication and verification.  ...  In this study, we offer a thorough background analysis of a number of strategies, approaches, and techniques employed in the iris print authentication system using many different strategies and techniques  ...  Literature Survey Several methodologies and procedures associated with the iris print authentication system have been proposed in recent years. Some of these methods will be covered in this section.  ... 
doi:10.5281/zenodo.6971061 fatcat:6bjleijk6rfy7k6k5wtvdrfpca

Authentication for distributed systems

T.Y.C. Woo, S.S. Lam
1992 Computer  
A fundamental concern in building a secure distributed system is authentication of local and remote entities in the system. We survey authentication issues in distributed system design.  ...  We conclude with an overview of two existing authentication systems, namely, Kerberos and SPX.  ...  Acknowledgments We thank Clifford Neuman of the University of Washington and John Kohl of the Massachusetts Institute of Technology for reviewing the section on Kerberos, and Joseph Tardo and Kannan Alagappan  ... 
doi:10.1109/2.108052 fatcat:2xomalngb5bmjm3esjfnsategy

Multimodal Biometric Authentication Systems using Deep Learning

R. Aarthy
2021 International Journal for Research in Applied Science and Engineering Technology  
In this proposal, the system propose a novel and strong approach for periocular recognition and feature extraction.  ...  In this work, it's planned to implement a face and iris recognition system, wherever unvaried closest purpose formula (ICP) and deep neural network is employed to section the face, eye, and iris region  ...  But, irrelevant features are extracted at the time of classification and security is not sufficient. Hence, the system suggests an enhanced theory as a proposed system.  ... 
doi:10.22214/ijraset.2021.33479 fatcat:7qqfh5aj4vh7tikxxp3jjwexve
« Previous Showing results 1 — 15 out of 71,556 results