Bone tumors, such as osteosarcomas, can occur anywhere in the bones, though they usually occur in the extremities of long bones near metaphyseal growth plates …
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
SS Shreem, H Turabieh, S Al Azwari, F Baothman - Soft Computing, 2022 - Springer
Students' performance prediction systems play a vital role in enhancing the educational performance inside universities, schools, and training centers. Big data can come from …
SC Mana, T Sasipraba - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Recommendation models are based on data mining and machine learning techniques to suggest product and services to users. Advancement in the machine learning field results in …
The validity of results in race walking is often questioned due to subjective decisions in the detection of faults. This study aims to compare machine-learning algorithms fed with data …
Emotion based brain computer system finds applications for impaired people to communicate with surroundings. In this paper, electroencephalogram (EEG) database of …
Improvements in computing capacity have allowed computers today to execute increasingly complex tasks. One of the main benefits of these improvements is the possibility of …
S Das, A Dutta, K Dixon… - Transportation …, 2018 - journals.sagepub.com
Motorcyclists are vulnerable highway users. Unlike passenger vehicle occupants, motorcycle riders do not have either protective structural surrounding or the advanced …
LY Abed, MM Hamad, AJ Aljaaf - AIP Conference Proceedings, 2023 - pubs.aip.org
Human nature tends to follow certain patterns in comparing the available options, the recommendation system is one of the secrets of the success of many companies, and this …