Showing Results for
- Academic Journals (618)
Search Results
- 618
Academic Journals
- 618
-
From:Government Computer News (Vol. 18, Issue 25)The National Security Agency has approved the first commercial products for its Remote Access Security Program. Government users have NSA's OK to transmit data at the secret level with the RASP Secure Access suite from...
-
From:Entrepreneurship: Theory and Practice (Vol. 37, Issue 5) Peer-ReviewedResearch in the pre-paradigmatic, applied scientific field of entrepreneurship is characterized mainly as exploratory. This article advocates for a considerable shift toward a more effective applied research agenda. An...
-
From:Government Computer News (Vol. 14, Issue 21)Multiprotocol remote-access LAN server vendors are using internal PC Card modem slots to enable the design of more compact units while virtually eliminating modem cabling and the need to configure external modems. Such...
-
From:International Journal of Reconfigurable ComputingPeer-ReviewedThis paper presents a novel XOR-FREE algorithm to implement the convolutional encoder using reconfigurable hardware. The approach completely removes the XOR processing of a chosen nonsystematic, feedforward generator...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedA Wireless Sensor Network (WSN), characterized as being self-organizing and multihop, consists of a large number of low-power and low-cost nodes. The cooperation among nodes is the foundation for WSNs to achieve the...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedThis work describes an experimental study on the possibilities of harvesting energy from tree trunks in order to power sensor nodes for environmental monitoring, particularly in wild forests. As the trunk of a living...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedCurrently, many services benefit greatly from the availability of accurate tracking. Tracking in wireless sensor networks remains a challenging issue. Most tracking methods often require a large number of anchors and do...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedAn ISO/IEC/IEEE21451 smart sensor network for distributed measurement of pavement structural temperature (PST) is proposed in this paper. The proposed network architecture is a star network based on GPRS communication,...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedThe activity model based on 3D acceleration and gyroscope is created in this paper, and the difference between the activities of daily living (ADLs) and falls is analyzed at first. Meanwhile, the kNN algorithm and...
-
From:International Journal of Distributed Sensor Networks (Vol. 2016) Peer-ReviewedData streams, which can be considered as one of the primary sources of what is called big data, arrive continuously with high speed. The biggest challenge in data streams mining is to deal with concept drifts, during...
-
From:Advances in Artificial Intelligence (Vol. 2017) Peer-ReviewedA precise estimation of isotherm model parameters and selection of isotherms from the measured data are essential for the fate and transport of toxic contaminants in the environment. Nonlinear least-square techniques...
-
From:Mathematical Problems in Engineering (Vol. 2017) Peer-ReviewedIn conventional stochastic computation, all the input streams are Bernoulli sequences (BSs), which may result in large random error. To reduce random error and improve computational accuracy, some other sequences have...
-
From:Mathematical Problems in Engineering (Vol. 2017) Peer-ReviewedThis study proposes an algorithm to solve inverse reliability problems with a single unknown parameter. The proposed algorithm is based on an existing algorithm, the inverse first-order reliability method...
-
From:Mathematical Problems in Engineering (Vol. 2017) Peer-ReviewedThis paper focuses on the stabilization problem of continuous-time random switching systems via exploiting a fault-tolerant controller, where the dwell time of each subsystem consists of a fixed part and random part. It...
-
From:Computing and Information Systems (Vol. 23, Issue 2) Peer-ReviewedPurpose: The purpose of this research is to design power efficient and secured WSNs. Design/Methodology/Approach: A Chinese Remainder Theorem (CRT) was used to design a secured and energy efficient network as...
-
From:International Journal of Computer Games Technology (Vol. 2018) Peer-ReviewedWe propose a new pathfinding technique called xTrek that combines conventional pathfinding and influence fields; that is, we are introducing a new influence-sensitive pathfinder or influence-aware pathfinder. The...
-
From:PeerJ Computer Science (Vol. 5) Peer-ReviewedAuthor(s): Mahdi Abbasi (1), Razieh Tahouri (2), Milad Rafiee (1) Introduction The considerable evolution in the speed of internet communications makes the gap between communication speed and processing speed ever...
-
From:Annals of Operations Research (Vol. 298, Issue 1-2) Peer-ReviewedThe transportation problem is a fundamental problem in operations research, where items need to be transported from supply nodes (each with a given supply) to demand nodes (each with a given demand) in the cheapest...
-
From:PeerJ Computer Science (Vol. 6) Peer-Reviewed
Latent based temporal optimization approach for improving the performance of collaborative filtering
Recommendation systems suggest peculiar products to customers based on their past ratings, preferences, and interests. These systems typically utilize collaborative filtering (CF) to analyze customers' ratings for... -
From:PeerJ Computer Science (Vol. 1) Peer-ReviewedAgent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent. ABMs are very sensitive to implementation...