In the field of aquaponics, where fish and plants coexist in a symbiotic environment, closely monitoring nitrate levels in the water is crucial due to their profound impact on aquatic and plant well-being. Traditional...
详细信息
Gas sensing plays a crucial role in numerous applications, such as environmental monitoring, industrial safety, and healthcare. Semiconductor oxide nanostructured sensors have emerged as promising candidates due to th...
详细信息
Modern and complex dynamical modeling requires effective and precise state estimation techniques to make the system modes available for control actions without expensive measurement tools. By proposing a reliable Kalm...
详细信息
This paper presents the concept of business unit to model business processes. A business unit’s main strength is that it represents resources like personnel and time that business processes consume at run-time. Due t...
详细信息
Credit scoring is a critical function in the banking industry, helping to assess borrowers' creditworthiness and mitigate lending risks. Traditional credit scoring systems based on centralized storage have limitat...
详细信息
Goal-oriented requirements engineering (GORE) for systems of systems (SoS) includes combining individual operational systems local goals to achieve higher-level goals. GORE offers a structured approach to managing com...
详细信息
The ever-increasing focus on preventative healthcare and remote patient monitoring has driven the need for innovative solutions. Traditionally, measuring vital signs in both clinical and home settings has relied on a ...
详细信息
This article presents a comparison considering a more conservative modeling approach (classical) and a more realistic modeling approach (enhanced) for the transient analysis of the overvoltages resulting from lightnin...
详细信息
A major problem in a crowd evacuation is rescuing frightened and trapped people. This paper presents a decision-making process based on a combination of individual and social collaborative reasoning to evacuate people...
详细信息
Speech processing applications, such as speaker verification and voice authentication systems, face the challenge of spoof attacks, where adversaries attempt to deceive the system using fake speech signals. This resea...
详细信息
暂无评论