Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (25)
- California Polytechnic State University, San Luis Obispo (14)
- University of New Mexico (8)
- Association of Arab Universities (7)
- California State University, San Bernardino (6)
-
- University of Nebraska - Lincoln (6)
- Florida International University (3)
- University of North Florida (3)
- Chapman University (2)
- City University of New York (CUNY) (2)
- DePaul University (2)
- Georgia Southern University (2)
- Kennesaw State University (2)
- Louisiana State University (2)
- Old Dominion University (2)
- SelectedWorks (2)
- Technological University Dublin (2)
- Western University (2)
- Bard College (1)
- Harrisburg University of Science and Technology (1)
- Illinois Wesleyan University (1)
- Karbala International Journal of Modern Science (1)
- Marshall University (1)
- Murray State University (1)
- New Jersey Institute of Technology (1)
- Penn State Dickinson Law (1)
- Purdue University (1)
- Seattle University School of Law (1)
- Southern Adventist University (1)
- The University of Akron (1)
- Keyword
-
- Mobility (6)
- Blockchain (5)
- Context-Aware (5)
- Open Source Software (4)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (3)
-
- Disaster Management (3)
- Machine learning (3)
- Social media (3)
- Software (3)
- Thesis; University of North Florida; UNF; Dissertations (3)
- Academic Libraries (2)
- Android (2)
- Cloud computing (2)
- Collaboration (2)
- Computer engineering (2)
- Computer science (2)
- Crowd sourcing (2)
- Cybersecurity (2)
- Data Mining (2)
- Data mining (2)
- Data storage (2)
- Database (2)
- Deep Learning (2)
- Digital forensics (2)
- ETD (2)
- Emergency response (2)
- Internet (2)
- Law enforcement (2)
- Learning by Doing (2)
- Matrices (2)
- Publication Year
- Publication
-
- Branch Mathematics and Statistics Faculty and Staff Publications (8)
- Martin L Griss (8)
- Computer Engineering (7)
- Future Computing and Informatics Journal (7)
- Ray Bareiss (7)
-
- Electronic Theses, Projects, and Dissertations (6)
- Tony Wasserman (6)
- Library Philosophy and Practice (e-journal) (5)
- Computer Science and Software Engineering (3)
- FIU Electronic Theses and Dissertations (3)
- Master's Theses (3)
- UNF Graduate Theses and Dissertations (3)
- CDM Annual Reports (2)
- Electronic Theses and Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Articles (1)
- Biological Systems Engineering: Papers and Publications (1)
- Campus Research Day (1)
- Conference papers (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Dickinson Law Review (2017-Present) (1)
- Digital Initiatives Symposium (1)
- Dissertations and Theses (1)
- Distance Learning Faculty & Staff Books (1)
- Doctoral Dissertations (1)
- Emmanouil Alexander Zografakis EZ (1)
- Engineering Faculty Articles and Research (1)
- Eric Copp (1)
- Honors Scholar Theses (1)
- Journal of Applied Digital Evidence (1)
Articles 1 - 30 of 111
Full-Text Articles in Other Computer Engineering
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Predictive Ai Applications For Sar Cases In The Us Coast Guard, Joshua Nelson
Cybersecurity Undergraduate Research Showcase
This paper explores the potential integration of predictive analytics AI into the United States Coast Guard's (USCG) Search and Rescue Optimal Planning System (SAROPS) for deep sea and nearshore search and rescue (SAR) operations. It begins by elucidating the concept of predictive analytics AI and its relevance in military applications, particularly in enhancing SAR procedures. The current state of SAROPS and its challenges, including complexity and accuracy issues, are outlined. By integrating predictive analytics AI into SAROPS, the paper argues for streamlined operations, reduced training burdens, and improved accuracy in locating drowning personnel. Drawing on insights from military AI applications …
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Blockchain Design For A Secure Pharmaceutical Supply Chain, Zhe Xu
Masters Theses
In the realm of pharmaceuticals, particularly during the challenging times of the COVID-19 pandemic, the supply chain for drugs has faced significant strains. The increased demand for vaccines and therapeutics has revealed critical weaknesses in the current drug supply chain management systems. If not addressed, these challenges could lead to severe societal impacts, including the rise of counterfeit medications and diminishing trust in government authorities.
The study identified that more than the current strategies, such as the Drug Supply Chain Security Act (DSCSA) in the U.S., which focuses on unique authentication and traceability codes for prescription drugs, is needed to …
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan
Posters-at-the-Capitol
Title: Securing Edge Computing: A Hierarchical IoT Service Framework
Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.
Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University
Abstract:
Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.
Our secure by design approach prioritizes …
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif
Future Computing and Informatics Journal
This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Visual Question Answering: A Survey, Gehad Assem El-Naggar
Future Computing and Informatics Journal
Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros
Electronic Theses, Projects, and Dissertations
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …
Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr
Game Based Learning: Engaging Students And Measuring Their Progress, Jonathan Stover, Siegwart Mayr
Campus Research Day
Digital natives are constantly surrounded by technology. Therefore, traditional methods of teaching are becoming obsolete and increasingly creative solutions are required to keep students engaged. Among these solutions is a concept called game based learning. Game based learning is a unique educational experience that incorporates the engagement factors of video games with education. Even though it is still in an early stage of adoption, game based learning has been proven to be a surprisingly effective tool for providing students with a valuable educational experience. Even with this evidence in mind, current game based learning programs still hold the potential to …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V
Data Integration Based Human Activity Recognition Using Deep Learning Models, Basamma Umesh Patil, D V Ashoka, Ajay Prakash B. V
Karbala International Journal of Modern Science
Regular monitoring of physical activities such as walking, jogging, sitting, and standing will help reduce the risk of many diseases like cardiovascular complications, obesity, and diabetes. Recently, much research showed that the effective development of Human Activity Recognition (HAR) will help in monitoring the physical activities of people and aid in human healthcare. In this concern, deep learning models with a novel automated hyperparameter generator are proposed and implemented to predict human activities such as walking, jogging, walking upstairs, walking downstairs, sitting, and standing more precisely and robustly. Conventional HAR systems are unable to manage real-time changes in the surrounding …
Max Fit Event Management With Salesforce, Akshay Dagwar
Max Fit Event Management With Salesforce, Akshay Dagwar
Electronic Theses, Projects, and Dissertations
MAX FIT Gym is looking for an event management software program to help manage activities very efficiently, along with attendees and environmental statistics. The event management program is developed and deployed using the Salesforce platform. MAX FIT can efficiently create, edit, and remove events and send email alerts to clients. This task operated on opportunities captured under MAX FIT, including all clients, and prepared information in the Salesforce cloud. This also includes product inventory with various varieties of protein products, and business owners can also add more products to their inventory. In the event management program, the event addresses within …
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
A Comparative Study On Blockchain-Based Electronic Health Record Systems: Performance, Privacy, And Security Between Hyperledger Fabric And Ethereum Frameworks, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Xia Li
Master of Science in Software Engineering Theses
Traditional data collection, storage, and processing of Electronic Health Records (EHR) utilize centralized techniques that pose several risks of single point of failure and lean the systems to a number of internal and external data breaches that compromise their reliability and availability. Addressing the challenges of conventional database techniques and improving the overall aspects of EHR application, blockchain technology is being evaluated to find a possible solution. Blockchain refers to an emerging distributed technology and incorruptible database of records or digital events which execute, validate, and maintain by a ledger technology to provide an immutable architecture and prevent records manipulation …
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Towards Qos-Based Embedded Machine Learning, Tom Springer, Erik Linstead, Peiyi Zhao, Chelsea Parlett-Pelleriti
Engineering Faculty Articles and Research
Due to various breakthroughs and advancements in machine learning and computer architectures, machine learning models are beginning to proliferate through embedded platforms. Some of these machine learning models cover a range of applications including computer vision, speech recognition, healthcare efficiency, industrial IoT, robotics and many more. However, there is a critical limitation in implementing ML algorithms efficiently on embedded platforms: the computational and memory expense of many machine learning models can make them unsuitable in resource-constrained environments. Therefore, to efficiently implement these memory-intensive and computationally expensive algorithms in an embedded computing environment, innovative resource management techniques are required at the …
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami
Future Computing and Informatics Journal
This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …
Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones
Blockchain Storage – Drive Configurations And Performance Analysis, Jesse Garner, Aditya A. Syal, Ronald C. Jones
Other Student Works
This project will analyze the results of trials implementing various storage methods on Geth nodes to synchronize and maintain a full-archive state of the Ethereum blockchain. The purpose of these trials is to gain deeper insight to the process of lowering cost and increasing efficiency of blockchain storage using available technologies, analyzing results of various storage drives under similar conditions. It provides performance analysis and describes performance of each trial in relation to the others.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Digitization Of Academic Libraries Through Cloud Environment, Sivankalai S, Virumandi A, Sivasekaran K, Jeyanthi R, M Sharmila
Library Philosophy and Practice (e-journal)
Libraries may soon be able to establish and manage their own data centres. This paradigm would allow libraries to control the apps and data stores that include sensitive and private information about their users' personal and financial information. The provisioning and management of infrastructure for a Web-based digital library present several complicated difficulties for library administrators. In this article, we address the challenges that digital libraries confront, and the efforts being made to solve those challenges. Infrastructure virtualization and cloud Environment are incredibly enticing options, but they are being challenged by the expansion of the indexed document collection, the addition …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner
FIU Electronic Theses and Dissertations
Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
Library Philosophy and Practice (e-journal)
With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Review Of Data Mining Techniques For Detecting Churners In The Telecommunication Industry, Mahmoud Ewieda, Mohamed Ismail Roushdy, Essam Shaaban
Future Computing and Informatics Journal
The telecommunication sector has been developed rapidly and with large amounts of data obtained as a result of increasing in the number of subscribers, modern techniques, data-based applications, and services. As well as better awareness of customer requirements and excellent quality that meets their satisfaction. This satisfaction raises rivalry between firms to maintain the quality of their services and upgrade them. These data can be helpfully extracted for analysis and used for predicting churners. Researchers around the world have conducted important research to understand the uses of Data mining (DM) that can be used to predict customers' churn. This …
Framework For Collecting Data From Iot Device, Md Saiful Islam
Framework For Collecting Data From Iot Device, Md Saiful Islam
Symposium of Student Scholars
The Internet of Things (IoT) is the most significant and blooming technology in the 21st century. IoT has rapidly developed by covering hundreds of applications in the civil, health, military, and agriculture areas. IoT is based on the collection of sensor data through an embedded system, and this embedded system uploads the data on the internet. Devices and sensor technologies connected over a network can monitor and measure data in real-time. The main challenge is to collect data from IoT devices, transmit them to store in the Cloud, and later retrieve them at any time for visualization and data analysis. …
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Multilayer Perceptron With Auto Encoder Enabled Deep Learning Model For Recommender Systems, Subhashini Narayan
Future Computing and Informatics Journal
In this modern world of ever-increasing one-click purchases, movie bookings, music, health- care, fashion, the need for recommendations have increased the more. Google, Netflix, Spotify, Amazon and other tech giants use recommendations to customize and tailor their search engines to suit the user’s interests. Many of the existing systems are based on older algorithms which although have decent accuracies, require large training and testing datasets and with the emergence of deep learning, the accuracy of algorithms has further improved, and error rates have reduced due to the use of multiple layers. The need for large datasets has declined as well. …
A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami
A Literature Review For Contributing Mining Approaches For Business Process Reengineering, Noha Ahmed Bayomy Nab, Ayman E. Khedr Aek, Laila A. Abd-Elmegid Laa, Amira M. Idrees Ami
Future Computing and Informatics Journal
Due to the changing dynamics of the business environment, organizations need to redesign or reengineer their business processes in order to provide services with the lowest cost and shortest response time while increasing quality. Thence, Business Process Re-engineering (BPR) provides a roadmap to achieve operational goals that leads to enhance flexibility and productivity, cost reduction, and quality of service/product. In this paper, we propose a literature review for the different proposed models for Business Process Reengineering. The models specify where the breakdowns occur in BPR implementation, justifies why such breakdowns occur, and propose techniques to prevent their occurrence again. The …
Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni
Machine Learning-Based Recognition On Crowdsourced Food Images, Aditya Kulkarni
Honors Scholar Theses
With nearly a third of the world’s population suffering from food-induced chronic diseases such as obesity, the role of food in community health is required now more than ever. While current research underscores food proximity and density, there is a dearth in regard to its nutrition and quality. However, recent research in geospatial data collection and analysis as well as intelligent deep learning will help us study this further.
Employing the efficiency and interconnection of computer vision and geospatial technology, we want to study whether healthy food in the community is attainable. Specifically, with the help of deep learning in …
Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph
Mapping Renewal: How An Unexpected Interdisciplinary Collaboration Transformed A Digital Humanities Project, Elise Tanner, Geoffrey Joseph
Digital Initiatives Symposium
Funded by a National Endowment for Humanities (NEH) Humanities Collections and Reference Resources Foundations Grant, the UA Little Rock Center for Arkansas History and Culture’s “Mapping Renewal” pilot project focused on creating access to and providing spatial context to archival materials related to racial segregation and urban renewal in the city of Little Rock, Arkansas, from 1954-1989. An unplanned interdisciplinary collaboration with the UA Little Rock Arkansas Economic Development Institute (AEDI) has proven to be an invaluable partnership. One team member from each department will demonstrate the Mapping Renewal website and discuss how the collaborative process has changed and shaped …
Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma
Towards A Blockchain Assisted Patient Owned System For Electronic Health Records, Tomilayo Fatokun, Avishek Nag, Sachin Sharma
Articles
Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange between the different healthcare providers. The work proposes the shift from patient’s electronic health records being managed and controlled by the healthcare industry to a patient-centric application where patients are in control of their data. The aim of this research is to build an Electronic Healthcare Record (EHR) system that is layered on the Ethereum blockchain platform and smart contract in …
Annual Report 2020-2021, Depaul University College Of Computing And Digital Media
Annual Report 2020-2021, Depaul University College Of Computing And Digital Media
CDM Annual Reports
LETTER FROM THE DEAN
As I write this letter during the beginning of the 2021–22 academic year, we have started to welcome the majority of our students to campus— many for the very first time, and some for the first time in a year and a half. It has been wonderful to be together, in-person, again. Four quarters of learning and working remotely was challenging, to be sure, but I have been consistently amazed by the resilience, innovation, and hard work of our students, faculty, and staff, even in the most difficult of circumstances. This annual report, covering the 2020–21 …
Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel
Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel
Theses
The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention …
A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl
A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl
Library Philosophy and Practice (e-journal)
Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.