Development of a Self-Organizing Multipurpose Mobile Robot is aimed at creating a versatile robotic system capable of autonomously navigating through environments, monitoring surroundings, and streaming real-time data. The project focused on…
This paper introduces a unique method using supervised learning techniques in a hybrid crime detection model to identify phishing attempts on social media sites. Effective detection systems are desperately needed given the rise in criminality on…
This study investigates trends in water consumption patterns among diverse utility users in Fort Portal City, Uganda, by analyzing data obtained from the National Water and Sewerage Corporation (NWSC) spanning the period from January 2009 to December…
Manufacture and distribution of fake clothing material which can be inferred to be criminal in nature has become a rapidly growing online shopping concern. It can be seen as a way of disguising false information as legitimate one. Indeed, many…
Segmenting brain tumors in medical images plays a crucial role in diagnosis and monitoring of medical conditions. However, the segmentation process is still performed manually, consuming time and exhibiting variability among assessors. This research…
This paper addresses the critical issue of non-optimal Access Point (AP) selection in wireless networks, which significantly impacts network efficiency and user satisfaction. In dynamic wireless environments, particularly those integrating Internet…
Among the many approaches to the study of color harmony tried so far, a relatively recent method is to leverage the large number of human-created and ranked color palettes, such as those hosted at colourlovers.com. Analysis of these large datasets…
Gait recognition is a valuable technology for remote and concealed identity authentication, widely applied in intelligent video monitoring. Existing gait recognition algorithms fall into two categories: appearance-based methods and model-based…
Secured personal notes application is a mobile application that allows a person to secure his personal and confidential information by storing it in the application after encrypting the data. This application involves complex encryption algorithms…
The smart healthcare concept is new and interdisciplinary knowledge in the modern world, and it has not been a long time since its emergence and is also important from a management point of view. The electronic contexts can have several benefits as…