Browse Items (3575 total)

With the rise of IOT devices and the systems connected to the internet, there was, accordingly, an ever-increasing number of network attacks (e.g. in DOS, DDOS attacks). A very significant research problem related to identifying Wireless Sensor…

In this paper, we present a new scheme to intelligently control the cycles and phases of traffic lights by exploiting the road traffic data collected by a wireless sensor network installed on the road. The traffic light controller determines the next…

In today’s postmodern era, there is phenomenal growth in the use of smartphones, GPS as well as Internet. This has given a rise to a revolution in the business world and the revolution is focused on conducting business on the move usually by mobile…

This innovative volume gathers some of the world’s best scholars to analysethe world’s collective international efforts to address globalised threatsthrough global security governance. Addressing global and planetary formsof insecurity that include…

The European integration process was initiated based on the model of the United States. The idea was to create a unit similar in some ways to the United States, while at the same time a unique, European entity. Anti-Americanism can be defined as the…

This article presents the main ANSA involved in the conflict in EasternUkraine. It focusses on an analysis of the specific phenomenon of theopolchentsy - Narodnoe opolchenie Donbassa. The aim of this paper is tointroduce and describe these actors and…

People with physical mobility disabilities experience limited ability to perform daily routine. Integration between home appliances and Internet of Thing (IoT) can be used to support these people. The technology allows tasks to be performed much more…

In recent years, the use of mobile applications and computer-based games as pedagogical tools has become more and more popular. Additionally, many mobile devices enhance the user experience by providing different sensors, e.g. to deliver…

The purpose of the research is to identify the risk of dropping out in tertiary students with an application. The components of the research goal aim (1) to develop the students’ achievement prediction model and (2) to construct a prototype…
Output Formats

atom, dcmes-xml, json, omeka-xml, podcast, rss2