mendeley

    Smart cities IOT & Digital network connectivity devices: Optimization on business in Africa

    DOI Logo 10.17352/tcsit.000042

    Published On: September 25, 2021 | Pages: 064 - 071

    Author(s): Yakubu Ajiji Makeri*, Victor Chang Xi’an Jiaotong, Ibrahim Abaker Targio Hashem, Afam Uzorka and Giuseppe T Cirella
    Today the world is becoming connected. The number of devices that are connected are increasing day by day. Many studies reveal that about 50 billion devices would be connected by 2020 indicating that Internet of things have a very big role to play in the future to come Considering the perplexing engineering of Smart City conditions, it ought not to be failed to rememb ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View
    mendeley

    A novel framework combining BCI and IOT for the detection of activity of the brain

    DOI Logo 10.17352/tcsit.000041

    Published On: September 18, 2021 | Pages: 060 - 063

    Author(s): B Karthiga* and M Rekha
    Virtual brain research is accelerating thedevelopment of inexpensive real-time Brain Computer Interface (BCI). Hardware improvements that increase the capability of Virtual brain analyse and Brain Computer wearable sensors have made possible several new software frameworks for developers to use and create applications combining BCI and IoT. In this paper, we complete ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View
    mendeley

    Detection and classification of phishing websites

    DOI Logo 10.17352/tcsit.000040

    Published On: August 11, 2021 | Pages: 053 - 059

    Author(s): Manoj P*, Bhuvan Kumar Y, Rakshitha D and Megha G
    ‘Phishing sites’ are some type of the internet security issues that mainly targets the human vulnerabilities compared to software vulnerabilities. Phishing sites are malicious websites that imitate as legitimate websites or web pages and aim to steal user’s personal credentials like user id, password, and financial information. Spotting these phishing websites is typi ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View
    mendeley

    Study of using hybrid deep neural networks in character extraction from images containing text

    DOI Logo 10.17352/tcsit.000039

    Published On: August 04, 2021 | Pages: 045 - 052

    Author(s): P Preethi, HR Mamatha and Hrishikesh Viswanath*
    Character segmentation from epigraphical images helps the optical character recognizer (OCR) in training and recognition of old regional scripts. The scripts or characters present in the images are illegible and may have complex and noisy background texture. In this paper, we present an automated way of segmenting and extracting characters on digitized inscriptions. T ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View
    mendeley

    How artificial intelligence will effect jobs all around the world

    DOI Logo 10.17352/tcsit.000038

    Published On: July 21, 2021 | Pages: 042 - 044

    Author(s): Mohd Kasib Siddiqui*
    The world is moving towards the era of Artificial Intelligence, most commonly known as automation, at a very great speed. Although, automation may be useful for humans but “How Artificial Intelligence will effect jobs all around the world?” is the real question here. People are already losing their employment because of automation and this is affecting their livelihoo ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    The making and development of Baxter the Empowered Chatbot impered with Machine Intelligence

    DOI Logo 10.17352/tcsit.000037

    Published On: June 12, 2021 | Pages: 036 - 041

    Author(s): Srimathi Jagadesan, P Girish* and Anugraha Ramesh kurane
    Artificial Intelligence and machine learning in machines is a very challenging discussion. It involves the creation of machines which can stimulate intelligence and adapt to the needs of the human kind. This paper discusses some of the current trends and practices in A.I. and subsequently offers alternative theory for improvement of some of today’s prominent postulate ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View
    mendeley

    Research on blockchain in the integrated application of medical services

    DOI Logo 10.17352/tcsit.000036

    Published On: May 12, 2021 | Pages: 034 - 035

    Author(s): Chin-Ling Chen*
    «The technology that is most likely to change the corporate world in the next ten years is not social networks, big data, cloud computing, robots; not even artificial intelligence, but blockchain.» «Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World», ranked among the top 50 management thinkers in the world and author o ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    Analysis of spectrum allocation of secondary users based on linear cooperative spectrum sensing techniques in cognitive radio networks

    DOI Logo 10.17352/tcsit.000035

    Published On: April 14, 2021 | Pages: 025 - 033

    Author(s): Zachary Bosire Omariba*
    This study is based on using the optimization problem of linear cooperative spectrum sensing (CSS) techniques for the analysis and correlation of spectrum allocation to secondary users (SUs) without interfering with the operations of the primary users. To achieve this the system must discover when the licensed users are not using their assigned spectrum so that the sp ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    A survey of machine learning applications in digital forensics

    DOI Logo 10.17352/tcsit.000034

    Published On: April 08, 2021 | Pages: 020 - 024

    Author(s): Hilmand Khan*, Sarmad Hanif and Bakht Muhammad
    We address the role of machine learning in digital forensics in this paper, in order to have a better understanding of where machine learning stand in today’s cyber security domain when it comes to collecting digital evidence. We started by talking about Digital Forensics and its past. Then, to illustrate the fields of digital forensics where machine learning methods ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    A virtual imprint of the artificial neural networks

    DOI Logo 10.17352/tcsit.000033

    Published On: March 22, 2021 | Pages: 017 - 019

    Author(s): Gaurav Kumar*
    Artificial neural systems ordinarily alluded because the neural systems are the information or signal process scientific demonstrate that is supported the natural nerve cell. A neural network is also complicated structure that comprise a bunch of interconnected neurons which provides an extremely energizing choices for complex drawback understanding and different appl ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    Fast algorithms for particle searching and positioning by cell registration and area comparison

    DOI Logo 10.17352/tcsit.000032

    Published On: March 05, 2021 | Pages: 007 - 016

    Author(s): Yoshifumi Ogami*
    In the direct simulation Monte Carlo method and multi-phase flow calculations, structured and unstructured grid systems for complex geometries necessitate the time-consuming process of searching a large number of cells to position target particles. This paper proposes effective computational methods for particle searching and positioning that are applicable to structu ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View    
    mendeley

    Central configurations of the circular restricted 4-body problem with three equal primaries in the collinear central configuration of the-3 body problem

    DOI Logo 10.17352/tcsit.000031

    Published On: January 04, 2021 | Pages: 001 - 006

    Author(s): Jaume Llibre*
    In this paper we classify the central configurations of the circular restricted 4-body problem with three primaries with equal masses at the collinear configuration of the 3-body problem and an infinitisimal mass. ... CrossMark Publons Harvard Library HOLLIS Search IT Semantic Scholar Get Citation Base Search Scilit OAI-PMH ResearchGate Academic Microsoft GrowKudos Universite de Paris UW Libraries SJSU King Library SJSU King Library NUS Library McGill DET KGL BIBLiOTEK JCU Discovery Universidad De Lima WorldCat VU on WorldCat
    Abstract View Full Article View

     

    Global Views

    Case Reports

    Peertechz Tweets

    Pinterest on TCSIT