Showing Results for
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedIn the Information and Communication Technology age, connected objects generate massive amounts of data traffic, which enables data analysis to uncover previously hidden trends and detect unusual network-load. We...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedPlanes are the core geometric models present everywhere in the three-dimensional real world. There are many examples of manual constructions based on planar patches: facades, corridors, packages, boxes, etc. In these...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedIn an Inter-Organizational Business Process (IOBP), independent organizations (collaborators) exchange messages to perform business transactions. With process mining, the collaborators could know what they are actually...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedTsunamis are destructive natural disasters that can cause severe damage to property and the loss of many lives. To mitigate the damage and casualties, tsunami warning systems are implemented in coastal areas, especially...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedHearing deficiency is the world's most common sensation of impairment and impedes human communication and learning. Early and precise hearing diagnosis using electroencephalogram (EEG) is referred to as the optimum...
Choose how you want to be alerted when new results for your search become available.
Subscribe to Gale's RSS feed to get content delivered to your favorite RSS aggregator. Copy and paste the URL below into your reader:
Tell us where to send the alert and how often you want to receive it