Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Azah Anir Norman"'
Publikováno v:
IEEE Access, Vol 11, Pp 109319-109330 (2023)
The blockchain’s subversive potential challenges the traditional paradigm by centering around a complex equation that embodies the fundamental principle of trust. In this study, a model known as the Chain of Trust is proposed to uncover the embedde
Externí odkaz:
https://doaj.org/article/db4c03f259ad45cd95dc657287925087
Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges
Autor:
Azah Anir Norman, Athirah Husna Marzuki, Fatokun Faith, Suraya Hamid, Norjihan Abdul Ghani, Sri Devi Ravana, Noreen Izza Arshad
Publikováno v:
IEEE Access, Vol 11, Pp 40741-40760 (2023)
The COVID-19 pandemic is still a challenge in many countries, although life must proceed while ensuring the pandemic is managed critically. Due to the delay in producing permanent medical intervention, despite the availability of vaccines, there is s
Externí odkaz:
https://doaj.org/article/86364efb0b6c45398731ce08c89adaef
Publikováno v:
IEEE Access, Vol 11, Pp 15364-15374 (2023)
Trust is a concept that lies amidst the rhetoric of empowering users by using blockchain. Bitcoin’s eminence hyped as “trust-free,” poignantly made trust an indispensable central element associated with the complexities and uncertainties of onl
Externí odkaz:
https://doaj.org/article/89f9b23713bc4ebb95bc229909bf3814
Publikováno v:
IEEE Access, Vol 9, Pp 48501-48518 (2021)
Sarcasm is a complicated linguistic term commonly found in e-commerce and social media sites. Failure to identify sarcastic utterances in Natural Language Processing applications such as sentiment analysis and opinion mining will confuse classificati
Externí odkaz:
https://doaj.org/article/2649c4a7c5c94779b36eed5beca4afc5
Autor:
Noreen Izza Arshad, Ahmad Sobri Hashim, Mazeyanti Mohd Ariffin, Nurshazlyn Mohd Aszemi, Hui Min Low, Azah Anir Norman
Publikováno v:
IEEE Access, Vol 8, Pp 116279-116291 (2020)
This study examines the efficacy of robots as assistive technology (AT) learning tools for children with autism spectrum disorder (ASD). The study attempts to find answers to whether robots as assistive tools can (i) profoundly improve achievement in
Externí odkaz:
https://doaj.org/article/da3779630ebf43e7aeb423c0029f5538
Autor:
Aimi Nadrah Maseri, Azah Anir Norman, Christopher Ifeanyi Eke, Atif Ahmad, Nurul Nuha Abdul Molok
Publikováno v:
IEEE Access, Vol 8, Pp 92929-92944 (2020)
This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for m
Externí odkaz:
https://doaj.org/article/9a13755ca71a444d9d68c6e800d5a5f4
Publikováno v:
IEEE Access, Vol 7, Pp 144907-144924 (2019)
Advancements in information and communication technology, and online web users have given attention to the virtual representation of each user, which is crucial for effective service personalization. Meeting users need and preferences is an ongoing c
Externí odkaz:
https://doaj.org/article/20bd8d49bc374688b2d4aa30083107d5
Publikováno v:
PLoS ONE, Vol 16, Iss 6 (2021)
Sarcasm is the main reason behind the faulty classification of tweets. It brings a challenge in natural language processing (NLP) as it hampers the method of finding people’s actual sentiment. Various feature engineering techniques are being invest
Externí odkaz:
https://doaj.org/article/f8f17cd3c62c4112af7ae7530f806a1f
Publikováno v:
PLoS ONE, Vol 15, Iss 6, p e0234312 (2020)
As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are
Externí odkaz:
https://doaj.org/article/30feffaa003d487ab350e91e972bbc3b
Publikováno v:
Symmetry, Vol 12, Iss 12, p 2039 (2020)
Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the
Externí odkaz:
https://doaj.org/article/56321f6b25e14da4b26bad5358c9bb7a