Students should engage in creative works in schools. However, there is no sensor to measure on the spot whether they engage in creative works. This work assumes engagement in creative works shows up in their writing f...
详细信息
As software versions are developed iteratively, we are always faced with the necessity to migrate code that depends on one or more modules from an older version to a newer one. This article introduces ideas of automat...
详细信息
We evaluate data durability in erasure coding using a proposed method called peak shift method of drive failure risk. The proposed method creates data protection groups of drives with different drive failure risks suc...
详细信息
In this paper a novel deep learning model for detection of plant leaf disease and agricultural pests. The proposed integreated hybrid model development based on EfficientNetB0 deep learning architecture allows model d...
详细信息
This article focuses on developing a smart Heating, Ventilation, and Air Conditioning (HVAC) control system tailored for the oil, gas, and energy industry. We discuss methods for developing an automated sensor monitor...
详细信息
This paper presents details of studies conducted to investigate interpretable and explainable machine learning and AI models for cardiovascular disease detection based on the publicly available Cleveland dataset. The ...
详细信息
This study analyses differences in motivation with a focus on differences in the national character. The turnover rate of foreign workers in the Japanese IT industry is increasing. One possible reason for the increase...
详细信息
Information security effectiveness has become the focus of organizations whether they manage their own information, or rely on providers. The research literature suggests that organizational characteristics have a sig...
详细信息
Traditional news recommendation methods usually encode news text and user interests directly into vectors and then calculate the matching degree of the two. Such approaches may lose low-level matching signals and diff...
详细信息
when it comes to IT, cyber security is of the utmost importance. Information security has evolved into a major challenge in the modern world. The term 'cyber-crimes' immediately brings to mind the worrisome gr...
详细信息
暂无评论