In this digitalization era, insurance companies have to face many new challenges, namely a very competitive market that has resulted in decreased margins and revenues and increased expectations from customers for insu...
详细信息
Electrical energy is one of the most important human needs. Almost all human work requires electrical energy. Lack of electricity may hinder human activities. Therefore, it is important to maintain the availability of...
详细信息
The measurement of information security risk in a public sector organization is of utmost importance. This measurement serves the purpose of taking appropriate actions in response to potential risks or damaging incide...
详细信息
Insurance claim is a fascinating issue to study. A potential loss for the insurance company is major coming from this issue. Thus, many studies performed already to answer such an issue. This study takes aim to develo...
详细信息
The dynamic environment of Business Coalition (BC) requires a flexible access control approach to deal with user management and policy writing. However, the traditional approach applied to BC assigns to access control...
详细信息
In the current era, Artificial Intelligence (AI) and computer Vision take the main role and participating to the people daily activities. Face Expression became as interesting topic to be explore. Face expression reco...
详细信息
The search for optimal solutions in science and Technology is one of the greatest challenges, because performance optimization, especially in complex systems, is often ruled with antagonistic variables such as budget ...
详细信息
The increasing amount of data that need to be processed in a company are affecting the performances of the database system. Relational Database Management System (RDBMS) is a commonly used database system, but also kn...
详细信息
The insurance industry faces a significant challenge concerning insurance claims, particularly due to the prevalence of fraudulent insurance claims. To address this issue, one potential solution is the implementation ...
详细信息
Internet of things (IoT) and Fog computing applications deal with sensitive data and need security tools to be protected against attackers. CoAP (Constrained Application Protocol), combined with DTLS (Datagram Transpo...
详细信息
暂无评论