The large branches of Machine Learning represent an immense support for the detection of malicious websites, they can predict whether a URL is malicious or benign, leaving aside the cyber attacks that can generate for network users who are unaware of…
Traditional temperature monitoring system for blood delivery requires a USB cable to extract data after delivery has been completed. Without real-time temperature data during delivery, the quality of the products cannot be monitored efficiently. In…
Mobile phones that accept input by a user’s finger motion are becoming increasingly common. However, they still have challenging problems to research, such as the ergonomic and safety aspects. As an outcome, more research required its capabilities…
Theguard tour systemhelps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment.According to the existing system, the patrolling at each checkpoint is being executed by using…
This paper presents an intelligent autonomous document mobile delivery robot using a deep learning approach. The robot is built as a prototype for document delivery service for use in offices in which it can adaptively move across different surfaces,…
During pendulum analysis, the approximation for small angles is usually performed as a simple harmonic motion. However, for large angles, this approximation is not convenient so exact solutions are proposed by differ-ent methods. This paper presents…
The continuity and the success of organizations appear increasingly associated with the incorporation of social media. The success depends of the structural and procedural changes that the organization has to make. Today, social media are the new…
Students academic performance could be affected by excessive use of the smartphone. This study focuses on analyzing the level of cell phone addiction in engineering university students. It also seeks to determine if there is a difference by gender in…
Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other…
This work presents a methodology for the evaluation of the vessels operability in the basin of the Black Sea. The approach proposed is based on the results provided by a wave prediction system that was implemented and validated in the Black Sea. This…