Buscar
Mostrando ítems 1-6 de 6
Security Threats to Business Information Systems Using NFC Read/Write Mode
(Computers, materials and continua, 2021)
Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either ...
Computational method for monitoring pauses exercises in office workers through a vision model
(Journal of ambient intelligence and humanized computing, 2021)
A sedentary routine at work can cause various muscular, skeletal or visual diseases, however these can be prevented with what is known as active pauses. This article is intended to illustrate how software can help reduce ...
A new SEAIRD pandemic prediction model with clinical and epidemiological data analysis on COVID-19 outbreak
(Applied intelligence, 2021)
Measuring the spread of disease during a pandemic is critically important for accurately and promptly applying various lockdown strategies, so to prevent the collapse of the medical system. The latest pandemic of COVID-19 ...
Modelling dynamics of coronavirus disease 2019 spread for pandemic forecasting based on Simulink
(Physical biology, 2021)
In this paper, we demonstrate the application of MATLAB to develop a pandemic prediction system based on Simulink. The susceptible-exposed-asymptomatic but infectious-symptomatic and infectious (severe infected population ...
The Application of Artificial Intelligence in Project Management Research: A Review
(International Journal of Interactive Multimedia and Artificial Intelligence, 2021)
The field of artificial intelligence is currently experiencing relentless growth, with innumerable models emerging in the research and development phases across various fields, including science, finance, and engineering. ...
Multilayer Framework for Botnet Detection Using Machine Learning Algorithms
(IEEE Access, 2021)
A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can perform massive cyber-attacks such as DDOS, SPAM, click-fraud, information, and identity stealing. The botnet also can avoid being ...