Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This paper describes an approach introducing location intelligence using open-source software components as the solution for planning and construction of the airport infrastructure. As a case study, the spatial information system of the... more
    • by 
    •   6  
      Computer ScienceAirportsData IntegrationComputers
The use of digital technology as the only communication and relationship channel in work, school and social contexts is bringing out dynamics that are sometimes in contrast with each other. The purpose of this article is to investigate... more
    • by 
    •   3  
      MedicineComputersComput
The use of digital technology as the only communication and relationship channel in work, school and social contexts is bringing out dynamics that are sometimes in contrast with each other. The purpose of this article is to investigate... more
    • by 
    •   2  
      MedicineComput
    • by 
    •   3  
      Computer ScienceComputersComput
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware,... more
    • by 
    •   3  
      Computer ScienceComputersComput
Video streaming is one of the challenging issues in vehicular ad-hoc networks (VANETs) due to their highly dynamic topology and frequent connectivity disruptions. Recent developments in the routing protocol methods used in VANETs have... more
    • by 
    •   3  
      Computer ScienceComputersComput
Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and... more
    • by 
    •   11  
      Computer ScienceMachine LearningNetwork optimizationComputers
Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and... more
    • by 
    •   11  
      Computer ScienceMachine LearningNetwork optimizationComputers
Cognitive disorders remain a major cause of disability in Multiple Sclerosis (MS). They lead to unemployment, the need for daily assistance, and a poor quality of life. The understanding of the origin, factors, processes, and consequences... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by  and +1
    •   14  
      EngineeringTechnologyComputer NetworksSoftware Testing
In this paper, we construct novel numerical algorithms to solve the heat or diffusion equation. We start with 105 different leapfrog-hopscotch algorithm combinations and narrow this selection down to five during subsequent tests. We... more
    • by 
    •   9  
      Partial Differential EquationsComputer ScienceNumerical SimulationsHeat Transfer
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
This paper presents a new depth-integrated non-hydrostatic finite element model for simulating wave propagation, breaking and runup using a combination of discontinuous and continuous Galerkin methods. The formulation decomposes the... more
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
    • by 
    •   4  
      Computer ScienceBiologyComputationComput
Cellular beams are an attractive option for the steel construction industry due to their versatility in terms of strength, size, and weight. Further benefits are the integration of services thereby reducing ceiling-to-floor depth (thus,... more
    • by 
    •   3  
      Computer ScienceComputersComput
The integration of a P300-based brain–computer interface (BCI) into virtual reality (VR) environments is promising for the video games industry. However, it faces several limitations, mainly due to hardware constraints and limitations... more
    • by 
    •   3  
      Computer ScienceComputersComput
In this paper, a combination of graph-based design and simulation-based engineering (SBE) into a new concept called Executable Integrative Product-Production Model (EIPPM) is elaborated. Today, the first collaborative process in... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
    • by 
    • Comput
    • by 
    •   7  
      EngineeringComputer ScienceWind EngineeringLarge Eddy Simulation
    • by 
    •   3  
      Computer ScienceComputationComput
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Buruli ulcer caused by Mycobacterium ulcerans (M. ulcerans) is identified by a pain-free cyst or edema which develops into a massive skin ulcer if left untreated. There are reports of chemoresistance, toxicity, noncompliance, and poor... more
    • by 
    •   4  
      Computer ScienceChemistryComputationComput
Wind turbine gearboxes are known to be among the weakest components in the system and the possibility to study and understand the behavior of geared transmissions when subject to several types of faults might be useful to plan maintenance... more
    • by 
    •   2  
      Computer ScienceComput
A computer vision system for automatic recognition and classification of five varieties of plant leaves under controlled laboratory imaging conditions, comprising: 1–Cydonia oblonga (quince), 2–Eucalyptus camaldulensis dehn (river red... more
    • by 
    •   3  
      Computer ScienceComputersComput
A modified power-law (MPL) viscosity model of non-Newtonian fluid flow has been used for the multiple-relaxation-time (MRT) lattice Boltzmann methods (LBM) and then validated with the benchmark problems using the graphics process unit... more
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) was found to be a severe threat to global public health in late 2019. Nevertheless, no approved medicines have been found to inhibit the virus effectively. Anti-malarial and... more
    • by 
    •   3  
      ChemistryComputationComput
    • by 
    •   6  
      Noise estimationComputImpulse NoiseMedian Filter
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in... more
    • by 
    •   3  
      MedicineComputersComput
The platform economy denotes a subset of economic activities enabled by platforms such as Amazon, Alibaba, and Uber. Due to their tremendous success, more and more offerings concentrate around platforms increasing platforms’... more
    • by 
    •   3  
      Computer ScienceComputersComput
We describe the sentiment analysis experiments that were performed on the Lithuanian Internet comment dataset using traditional machine learning (Naïve Bayes Multinomial—NBM and Support Vector Machine—SVM) and deep learning (Long... more
    • by 
    •   3  
      Computer ScienceComputersComput
Spike-and-wave discharge (SWD) pattern detection in electroencephalography (EEG) signals is a key signal processing problem. It is particularly important for overcoming time-consuming, difficult, and error-prone manual analysis of... more
    • by 
    •   7  
      Computer ScienceComputersEEG Signal ProcessingComput
In this study, an effective local minima detection and definition algorithm is introduced for a mobile robot navigating through unknown static environments. Furthermore, five approaches are presented and compared with the popular approach... more
    • by 
    •   3  
      MedicineComputersComput
IT investment is a crucial issue as it does not only influence the performance in Small-Medium Enterprises (SMEs) but it also helps executives to align business strategy with organizational performance. Admittedly, though, there is... more
    • by 
    •   4  
      BusinessComputer ScienceComputersComput
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput
Conjugated singlet ground state diradicals have received remarkable attention owing to their potential applications in optoelectronic devices. A distinctive character of these systems is the location of the double exciton state, a low... more
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Using molecular dynamics, a comparative study was performed of two pairs of glassy polymers, low permeability polyetherimides (PEIs) and highly permeable Si-containing polytricyclononenes. All calculations were made with 32 independent... more
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput
Accurate, fast, and automatic detection and classification of animal images is challenging, but it is much needed for many real-life applications. This paper presents a hybrid model of Mamdani Type-2 fuzzy rules and convolutional neural... more
    • by 
    •   3  
      Computer ScienceComputationComput
IT investment is a crucial issue as it does not only influence the performance in Small-Medium Enterprises (SMEs) but it also helps executives to align business strategy with organizational performance. Admittedly, though, there is... more
    • by 
    •   4  
      BusinessComputer ScienceComputersComput
    • by 
    •   9  
      Applied MathematicsNumerical AnalysisInverse ScatteringHigher Order Thinking
Business Improvement Districts (BIDs) are a contemporary urban revitalization policy that has been set in motion through international policymaking circuits. They have been presented as a panacea to the economic and social challenges... more
    • by 
    •   7  
      Computer ScienceCorporate GovernancePoliticsComputation
The study of biofilm formation is undoubtedly important due to micro-organisms forming a protected mode from the host defense mechanism, which may result in alteration in the host gene transcription and growth rate. A mathematical model... more
    • by 
    •   3  
      Computer ScienceComputationComput
Identifying human face shape and eye attributes is the first and most vital process before applying for the right hairstyle and eyelashes extension. The aim of this research work includes the development of a decision support program to... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceComputationComput
    • by 
    •   8  
      Computer ScienceComputational BiologySystems BiologyBiology
In this study, we present a thorough investigation of a compressible kinetic model for non-ideal fluids [DOI:10.1103/PhysRevE.102.020103]. The model imposes the local thermodynamic pressure through appropriate rescaling of the... more
    • by 
    •   3  
      Computer SciencePhysicsComput
    • by 
    •   11  
      BioinformaticsComputer ScienceBiologyEvolution
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   8  
      Computer ScienceOptical NetworksComputationComput
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput