A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

  Subjects -> SCIENCES: COMPREHENSIVE WORKS (Total: 374 journals)
The end of the list has been reached or no journals were found for your choice.
Similar Journals
Journal Cover
International Journal of Recent Contributions from Engineering, Science & IT
Number of Followers: 0  

  This is an Open Access Journal Open Access journal
ISSN (Online) 2197-8581
Published by U of Kassel Homepage  [3 journals]
  • Virtual Reality & Electronic Games for Assessment in ADHD

    • Authors: Aikaterini Doulou, Athanasios Drigas
      Pages: 4 - 15
      Abstract: In the last few years, several computerized tasks have been developed to increase the objectivity of the diagnosis of attention-deficit hyperactivity disorder (ADHD). Usually, its diagnosis is based on the judgment of health professionals using a clinical history that often consists of assessment scales completed by caregivers and/or teachers. Many experts have criticized this way of diagnosing ADHD, as it tends to be subjective by both doctors and caregivers. Many researchers argue that using original digital diagnostic tools in the form of games for children with ADHD may provide much clearer diagnostic clues. A game can be enjoyed much more by children, as it stimulates creativity, sets specific goals to be completed, provides a feedback mechanism that fosters motivation, and offers measurable results. The present work investigates the use and effectiveness of electronic games, either in virtual reality environments or not, for the detection of the symptoms of ADHD.
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.29735
      Issue No: Vol. 10, No. 02 (2022)
  • Internet of Things (IoT): A Study of Security Issues and Challenges

    • Authors: Zahidah Mohamad Said, Mohamad Fadli Zolkipli
      Pages: 16 - 31
      Abstract: The Internet of Things is one of the most popular networking concepts. The Internet of Things architecture promises to connect anybody, anywhere, with anything. Unlike the traditional Internet, the Internet of Things uses heterogeneous wired and wireless networks to connect a huge number of machines, resource-constrained devices, and sensors. Even though the Internet of Things might become one of the most popular networking concepts that provide many benefits to its users, it is also open to many security issues and challenges. Based on the study, shows that Perception, Network and Application layers are the most open to security issues. Next, the security challenges inside and across the Internet of Things are also highlighted in this study.
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.29301
      Issue No: Vol. 10, No. 02 (2022)
  • Design and Implementation a System for Monitoring the COVID19 Patients
           Based on the Internet of Thing Applications

    • Authors: Nabaa Ali Jasim, Haider TH. Salim ALRikabi
      Pages: 32 - 42
      Abstract: The Corona Virus (COVID-19) was spread in about 215 countries in 2019. The number of people affected by the epidemic has increased dramatically. Iraq is one of the countries affected by the Coronavirus. Hundreds of Iraqi doctors have died because they contact directly with patients. One of the most serious challenges is the high rate of conduction through contact with people infected with this virus. The impact of the coronavirus can be reduced by using one of the advanced technology methods. The internet of things (IoT) is one of these applications. This paper shows that the role of smart surveillance in reducing the risks of covid-19. To avoid face-to-face interaction, physical contact, and maintain social distancing, the smart monitor is designed in this paper. It is used to monitor the health parameters that are affected when infected with covid-19, such as heart rate, oxygen level, blood pressure, and body temperature in real-time and remotely. This will reduce the workload, workload on the medical staff, and reduce the infection with the covid-19.
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.27547
      Issue No: Vol. 10, No. 02 (2022)
  • Fast Extreme Learning Machine for Berber Handwritten Latin Script

    • Authors: Mokrane Kemiche, Sadou Malika, Bousba Nassima
      Pages: 43 - 52
      Abstract: This article deals with the problem of Berber handwritten character recognition using Extreme Learning Machine. This paradigm has gained significant attention in pattern recognition field thanks to its efficient learning speed and its high accuracy. In this paper, we have used a fast Extreme Learning Machine to recognize efficiently the Latin Berber characters. So, the proposed ELM has been trained over a Berber-MNIST dataset containing images of Amazigh alphabets. This algorithm learns much faster than traditional popular learning algorithms thanks to the use of JAX library which contains several functions to reduce the execution time of our solution.
      The simulation results show that the handwritten recognition system based on our developed extreme learning machine decreases computational cost and reduces the time required for the whole recognition process. Furthermore, the developed ELM achieves a high performance in terms of recognition accuracy.
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.30663
      Issue No: Vol. 10, No. 02 (2022)
  • The Challenges and Issues in Implementing Personal Data Protection

    • Authors: Theshvin Raj Ananthan, Mohamad Fadli Zolkipli
      Pages: 53 - 61
      Abstract: This paper is to discuss the challenges and issues in implementing personal data protection. As the cases related to the personal data breaches is increasing day-by-day among us, so any organizations, system, applications, software or technology components that deal with huge amount of personal data such as contact details, email addresses, addresses and others are in a higher risk sector as the data are valuable. This study highlights the challenges and issues such as the usage of IoT devices, social media, implementation of fourth industrial revolution and also the lack of awareness among users in the process of the implementation of personal data protection. However, all this challenges and issues can be resolved if the users follow the correct method or procedures. Finally, this finding also elaborates some methods that could help users protect their personal data.
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.29373
      Issue No: Vol. 10, No. 02 (2022)
  • Choosing the Right Programming Language in Making a Website Backend Using
           the Waterfall Method

    • Authors: Teguh Rijanandi, Faisal Dharma Adhinata
      Pages: 62 - 69
      Abstract: Often we are wrong in choosing a good programming language to create a website backend to process the data we have so that the impact is that our website is not able to handle so many requests with a lot of data so users feel uncomfortable because our application takes a very long time to process. processing each user's request. So in this journal, we will try to discuss the selection of the right programming language in making application backends according to the function of the programming language. In this journal, we will compare the programming languages ​​PHP, Python, Java and C# for the manufacture of an application backend that must be able to process very large population data
      PubDate: 2022-06-22
      DOI: 10.3991/ijes.v10i02.30845
      Issue No: Vol. 10, No. 02 (2022)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-