Real-time crowd monitoring plays a pivotal role in effectively managing public spaces and ensuring safety. This study investigates the fusion of IoT devices and the YOLO object detection model to accurately count crow...
详细信息
A cutting-edge online marketplace that uses blockchain technology to transform how we purchase and sell goods and services is known as a blockchain- powered e-commerce platform. This platform uses a decentralized netw...
详细信息
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima...
详细信息
This research-to-practice full paper describes K-12 Diversity and Broadening Participation through the integration of Computational Thinking (CT) across the curriculum. CT is implicit within the current high school cu...
详细信息
Accelerating the economic advantages of ICT is one of the finest methods for any nation to boost its economy. Due to the unique topography, governing laws, and cultural traditions of each nation, these colossal challe...
详细信息
In the wake of rapidly increasing connectivity and social acceptance of IoT devices, understanding the privacy, secu-rity, and trust dimensions of IoT is instrumental in shaping how connected technologies are applied....
详细信息
Context: In the public health domain, there is no shortage of failed informationsystems projects. In addition to overblown budgets and elapsed deadlines (ad nauseam), technical issues exist. These include poor usabil...
详细信息
The proliferation of physical objects and intelligent systems, along with their inherent differences, such as levels of device mobility, generated data volume, required storage memory, and complexity in data processin...
详细信息
Fog computing is an innovative approach that brings cloud computing capabilities to the edge of the network, and it has great potential for enterprises looking to improve real-time data processing and lower latency. H...
详细信息
An important reason to protect provider and medical care patient information and data is digital terrorism. Patient health records and healthcare provider information are sensitive issues that can affect patients'...
详细信息
暂无评论