A review to find elicitation methods for business process automation software

T Menezes - Software, 2023 - mdpi.com
Several organizations have invested in business process automation software to improve
their processes. Unstandardized processes with high variance and unstructured data …

Fingerprint vulnerability: A survey

S Hosseini - 2018 4th international conference on web …, 2018 - ieeexplore.ieee.org
With an increasing number of internet users utilizing smartphones and similar devices,
fingerprint scanners are becoming increasingly important as a security feature. From a …

All-encompassing review of biometric information protection in fingerprints based steganography

MM Hashim, AK Mohsin, MSM Rahim - Proceedings of the 2019 3rd …, 2019 - dl.acm.org
In ascertaining the authenticity of a person's identity, the techniques that utilises Biometric
Technology and its vital aspects and attributes are essential in endorsing this endeavour …

A box analogy technique (BoAT) for agile-based modelling of business processes

CE Da Silva, L Medeiros, Y Justino… - 2022 IEEE 30th …, 2022 - ieeexplore.ieee.org
This paper reports on our experience on develo** the Box Analogy Technique (BoAT) an
agile-based approach to extract business process models as part of the requirements …

Elicitation Approaches and Techniques for Automating Business Processes

T Menezes - Authorea Preprints, 2023 - techrxiv.org
Several organizations have invested in business process automation software to improve
their processes. Unstandardized processes with high variance and unstructured data …

[PDF][PDF] A Review to Find Elicitation Methods for Business Process Automation Software. Software 2023, 2, 177–196

T Menezes - 2023 - academia.edu
Several organizations have invested in business process automation software to improve
their processes. Unstandardized processes with high variance and unstructured data …

Community-based replica management in distributed systems

M Nosrati, M Fazlali - International Journal of Web Information …, 2018 - emerald.com
Purpose One of the techniques for improving the performance of distributed systems is data
replication, wherein new replicas are created to provide more accessibility, fault tolerance …

A Review for Analytics Requirements Processes: From Malaysia Public Sector Perspectives

Z Daud, S Ya'acob, NAA Bakar… - Open International Journal …, 2022 - oiji.utm.my
Abstract Big Data Analytics (BDA) projects in Malaysia's public sector become challenging
because it involves complex processes of diverse data sets among agencies, ministries and …

[PDF][PDF] i*(iStar) Security Hierarchy for Cloud Computing

FS Faizan, S Latif, AM Zaidi - ICSEA 2019, 2019 - academia.edu
The world is advancing with the Cloud Computing technology. The aim of Cloud Computing
is to provide improved usage of distributed resources like networks, servers, storage …

Using Spreadsheets in Production Planning in a Pharmaceutical Company

SH Said - 2018 - search.proquest.com
Living in the technological era, a successful company nowadays is the company that
integrates Information Technology (IT) with its business. Otherwise, it might face a huge risk …