Buscar
Mostrando ítems 71-80 de 213
Security Threats to Business Information Systems Using NFC Read/Write Mode
(Computers, materials and continua, 2021)
Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either ...
Advanced Sensors Technology in Education
(Sensors, 2019)
The topic presented will show how different kinds of sensors can help to improve our skills in learning environments. When we open the mind and let it take the control to be creative, we can think how a martial art would ...
PyDSLRep: A domain-specific language for robotic simulation in V-Rep
(PLoS ONE, 2020-07)
Calculating forward and inverse kinematics for robotic agents is one of the most time-intensive tasks when controlling the robot movement in any environment. This calculation is then encoded to control the motors and ...
IJIMAI Editor's Note - Vol. 5 Issue 3 - 10th Anniversary
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2018)
The International Journal of Interactive Multimedia and Artificial Intelligence - IJIMAI (ISSN 1989 - 1660) provides an interdisciplinary forum in which scientists and professionals can share their research results and ...
An artificial neural network approach for predicting hypertension using NHANES data
(Scientific Reports, 2020-12-01)
This paper focus on a neural network classification model to estimate the association among gender, race, BMI, age, smoking, kidney disease and diabetes in hypertensive patients. It also shows that artificial neural network ...
Blockchain based integrated security measure for reliable service delegation in 6G communication environment
(Computer Communications, 2020-09-01)
Sixth generation (6G) communication environment is unfolded in the recent years in order to provide high throughput less latency services for the mobile users. This environment encloses a variety of heterogeneous resources ...
A route selection approach for variable data transmission in wireless sensor networks
(Cluster Computing, 2020-09)
The nodes in wireless sensor networks (WSNs) are responsible for communicating data which is primarily of three types viz. video, audio and text. In literature, a large number of energy aware and shortest path based route ...
Using clustering methods to deal with high number of alternatives on Group Decision Making
(7th International Conference on Information Technology and Quantitative Management (ITQM), 2019)
Novel Group Decision Making methods and Web 2.0 have augmented the quantity of data that experts have to discuss about. Nevertheless, experts are only capable of dealing with a reduced set of information. In this paper, a ...
Computational method for monitoring pauses exercises in office workers through a vision model
(Journal of ambient intelligence and humanized computing, 2021)
A sedentary routine at work can cause various muscular, skeletal or visual diseases, however these can be prevented with what is known as active pauses. This article is intended to illustrate how software can help reduce ...
Blockchain for supply chain performance and logistics management
(Applied stochastic models in business and industry, 2021)
The trend of digitalization uses modern relationship models across global supply chain (SC) management. The main objective of this article is to identify SC current problems with the help of the knowledge sharing aspect ...