Knowledge audit output helps organizations to make recommendation of KM strategy which later can be used for better managing the knowledge. This paper reviews literature on knowledge audit process with the aim to unde...
详细信息
Knowledge audit output helps organizations to make recommendation of KM strategy which later can be used for better managing the knowledge. This paper reviews literature on knowledge audit process with the aim to understand the process, the data gathering techniques employed and the roles of knowledge audit. It aims to report the research gaps and propose directions for future research in this domain. A comprehensive three-stage method for extracting, analyzing and reporting the literaturebased findings was applied in analyzing the literature survey. The literature survey is based on a search for the keywords "knowledge audit", "knowledge audit process", "knowledge audit output" and "knowledge audit roles", first on the ISI Web of Knowledge online database, followed by Association of information Systems basket of top journals and other reputable literatures. The paper concludes with an understanding on how knowledge audit is conducted, the data gathering techniques used and its contributions to the organization. However no literature was found on knowledge audit practices for inter-organization. Future research on how knowledge audit could be extended for interorganization is suggested at the end of the paper. However, this paper only covers literature that discussed in depth the knowledge audit process published in certain journals. Never the less, it is believed that the findings provide a valuable understanding of the current situation in this research field.
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,*** image security and privacy become a critical...
详细信息
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,*** image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public *** paper presents a new wind driven optimization algorithm based medical image encryption(WDOA-MIE)technique for blockchain enabled IoT *** WDOA-MIE model involves three major processes namely data collection,image encryption,optimal key generation,and data ***,the medical images were captured from the patient using IoT ***,the captured images are encrypted using signcryption *** addition,for improving the performance of the signcryption technique,the optimal key generation procedure was applied by WDOA *** goal of the WDOA-MIE algorithm is to derive a fitness function dependent upon peak signal to noise ratio(PSNR).Upon successful encryption of images,the IoT devices transmit to the closest server for storing it in the blockchain *** performance of the presented method was analyzed utilizing the benchmark medical image *** security and the performance analysis determine that the presented technique offers better security with maximum PSNR of 60.7036 dB.
This paper discusses the use of node2vec graph embeddings to improve the performance of wide and deep recommenders by substituting the embedding layer with graph embeddings to leverage its representational power witho...
详细信息
The success of organizations today relies heavily on their intellectual capital, as knowledge is a key resource for value creation. Sharing and transferring knowledge enhances its value, embedding it within an organiz...
详细信息
Much of the current research in the design of virtual environments is centred on laboratory prototypes and emphasis is placed on supporting cooperation within the virtual world itself. By way of contrast, this paper p...
详细信息
Cloud computing is an emerging developed technology and the next natural step in the evolution of on-demand informationtechnology services and products that uses concepts of virtualization, storage, processing power,...
详细信息
According to estimates, by mid-2030, there will be 8.6 billion people on the planet. The human population has been growing exponentially. There will be a rise in food production and consumption due to the massive popu...
详细信息
Visual question answering is a challenging task that necessitates for sophisticated reasoning over the visual elements to provide an accurate answer to a question. Majority of the state-of-the-art VQA models are only ...
详细信息
暂无评论