Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
The integration of a P300-based brain–computer interface (BCI) into virtual reality (VR) environments is promising for the video games industry. However, it faces several limitations, mainly due to hardware constraints and limitations... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   14  
      EngineeringTechnologyComputer NetworksSoftware Testing
We propose a limited-memory quasi-Newton method using the bad Broyden update and apply it to the nonlinear equations that must be solved to determine the effective Fermi momentum in the weighted density approximation for the exchange... more
    • by 
    •   4  
      MathematicsComputer ScienceComputationComput
The platform economy denotes a subset of economic activities enabled by platforms such as Amazon, Alibaba, and Uber. Due to their tremendous success, more and more offerings concentrate around platforms increasing platforms’... more
    • by 
    •   3  
      Computer ScienceComputersComput
This paper describes the objectives of the SEQUOIA 2000 project and the software development that is being done to achieve these objectives. In addition, several lessons relevant to Geographic Information Systems (GIS) that have have been... more
    • by 
    • Comput
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has... more
    • by 
    •   3  
      Computer ScienceComputersComput
We describe the sentiment analysis experiments that were performed on the Lithuanian Internet comment dataset using traditional machine learning (Naïve Bayes Multinomial—NBM and Support Vector Machine—SVM) and deep learning (Long... more
    • by 
    •   3  
      Computer ScienceComputersComput
The aerospace and defense industry is facing an end-of-life production issue with legacy embedded uniprocessor systems. Most, if not all, embedded processor manufacturers have already moved towards system-on-a-chip multicore... more
    • by 
    •   3  
      Computer ScienceComputersComput
Virtual Reality (VR) users typically either sit or stand/walk when using VR; however, the impact of this is little researched, and there is a lack of any broad or systematic analysis of how this difference in physical posture might affect... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   4  
      Computer ScienceChemistryComputationComput
We live in a heavily technologized global society. It is therefore not surprising that efforts are being made to integrate current information technology into the treatment of diabetes mellitus. This paper is dedicated to improving the... more
    • by 
    •   3  
      Computer ScienceComputersComput
COVID-19 caused the largest economic recession in the history by placing more than one third of world’s population in lockdown. The prolonged restrictions on economic and business activities caused huge economic turmoil that significantly... more
    • by 
    •   3  
      Computer ScienceComputersComput
In this work, we summarize the recent progress made in constructing time-dependent density-functional theory (TDDFT) exchange-correlation (XC) kernels capable to describe excitonic effects in semiconductors and apply these kernels in two... more
    • by 
    •   4  
      MathematicsComputer ScienceComputationComput
The use of digital technology as the only communication and relationship channel in work, school and social contexts is bringing out dynamics that are sometimes in contrast with each other. The purpose of this article is to investigate... more
    • by 
    •   2  
      MedicineComput
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
The progress of embedded control systems in the last several years has made possible the realization of highly-effective controllers in many domains. It is essential for such systems to provide effective performance at an affordable cost.... more
    • by 
    •   3  
      Computer ScienceComputersComput
Accurate, fast, and automatic detection and classification of animal images is challenging, but it is much needed for many real-life applications. This paper presents a hybrid model of Mamdani Type-2 fuzzy rules and convolutional neural... more
    • by 
    •   3  
      Computer ScienceComputationComput
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Today, Knowledge Management (KM) is becoming a popular approach for improving organizational innovation, but whether encouraging knowledge sharing will lead to a better innovative working behaviour of employees is still a question. This... more
    • by 
    •   2  
      Computer ScienceComput
The ability for DFT: B3LYP calculations using the 6-31g and lanl2dz basis sets to predict the electrochemical properties of twenty (20) 3-aryl-quinoxaline-2-carbonitrile 1,4-di-N-oxide derivatives with varying degrees of cytotoxic... more
    • by 
    •   4  
      Computer ScienceChemistryComputationComput
Conjugated singlet ground state diradicals have received remarkable attention owing to their potential applications in optoelectronic devices. A distinctive character of these systems is the location of the double exciton state, a low... more
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Hand motion tracking plays an important role in virtual reality systems for immersion and interaction purposes. This paper discusses the problem of finger tracking and proposes the application of the extension of the Madgwick filter and a... more
    • by 
    •   3  
      Computer ScienceComputersComput
In this work, Finite Element Method (FEM) is applied to obtain the condition at the boundary of the interface between a channel and a porous medium. The boundary conditions that should be applied to the inhomogeneous interface zone... more
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput
Ransomware is a relatively new type of intrusion attack, and is made with the objective of extorting a ransom from its victim. There are several types of ransomware attacks, but the present paper focuses only upon the crypto-ransomware,... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   3  
      Computer ScienceComputationComput
    • by 
    •   3  
      Computer ScienceComputationComput
Cognitive disorders remain a major cause of disability in Multiple Sclerosis (MS). They lead to unemployment, the need for daily assistance, and a poor quality of life. The understanding of the origin, factors, processes, and consequences... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   5  
      EngineeringComputer ScienceComputersComput
Breast Cancer is one of the most common diseases among women which seriously affect health and threat to life. Presently, mammography is an uttermost important criterion for diagnosing breast cancer. In this work, image of breast cancer... more
    • by 
    •   3  
      Computer ScienceComputationComput
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   3  
      Computer ScienceComputersComput
The present work highlights the capacity of disparate lattice Boltzmann strategies in simulating natural convection and heat transfer phenomena during the unsteady period of the flow. Within the framework of Bhatnagar-Gross-Krook... more
    • by 
    •   4  
      Computer SciencePhysicsComputationComput
Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these... more
    • by 
    •   3  
      Computer ScienceComputersComput
In 1947, N. Herlofson proposed a modification to the 1884 Heinrich Hertz’s Emagram with the goal of getting more precise hand-made weather forecasts providing larger angles between isotherms and adiabats. Since then, the Herlofson’s... more
    • by 
    •   3  
      Computer ScienceComputersComput
Mission- and safety-critical circuits and systems employ redundancy in their designs to overcome any faults or failures of constituent circuits and systems during the normal operation. In this aspect, the N-modular redundancy (NMR) is... more
    • by 
    •   3  
      Computer ScienceComputersComput
    • by 
    •   9  
      Applied MathematicsNumerical AnalysisInverse ScatteringHigher Order Thinking
    • by 
    •   6  
      Noise estimationComputImpulse NoiseMedian Filter
Explicit expressions are obtained for sensitivity coefficients to separately estimate temperature-dependent thermophysical properties, such as specific heat and thermal conductivity, in two-dimensional inverse transient heat conduction... more
    • by 
    •   4  
      MathematicsComputer ScienceComputationComput
    • by 
    •   3  
      Computer ScienceComputationComput
    • by 
    • Comput
    • by 
    •   4  
      Computer ScienceChemistryComputationComput
IT investment is a crucial issue as it does not only influence the performance in Small-Medium Enterprises (SMEs) but it also helps executives to align business strategy with organizational performance. Admittedly, though, there is... more
    • by 
    •   4  
      BusinessComputer ScienceComputersComput
A computer vision system for automatic recognition and classification of five varieties of plant leaves under controlled laboratory imaging conditions, comprising: 1–Cydonia oblonga (quince), 2–Eucalyptus camaldulensis dehn (river red... more
    • by 
    •   3  
      Computer ScienceComputersComput
Using molecular dynamics, a comparative study was performed of two pairs of glassy polymers, low permeability polyetherimides (PEIs) and highly permeable Si-containing polytricyclononenes. All calculations were made with 32 independent... more
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput
Visible Light Communication (VLC) systems use light-emitting diode (LED) technology to provide high-capacity optical links. The advantages they offer, such as the high data rate and the low installation and operational cost, have... more
    • by 
    •   4  
      Computer ScienceMaterials ScienceComputationComput
    • by 
    •   10  
      Newton MethodComputJacobian MatrixNewton Iteration