The design and analysis of security in distributed computing systems raises numerous questions on the tools available for modeling and verification. Particularly, it is difficult to ensure the correctness when using d...
详细信息
In this work, we are simulating Novel PIFA antenna with platinum substrate in comparison with FR4 dielectrics material at 6 GHz frequency The study has two groups with 20 samples and a pre-test or G power of 80%. The ...
详细信息
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-...
详细信息
The paper presents, two-novel current control converter topologies for 4-phase Switched Reluctance Motors (SRMs). The first converter is based on a reduced switch model, significantly decreasing the number of switchin...
详细信息
In order to improve the efficiency of financial statement fraud detection, a Support Vector Machine (SVM) model was adopted, combined with feature selection and dimensionality reduction techniques, to analyze the fina...
详细信息
software Defined Network modernizes network architecture by supporting scalability, significant flexibility, and programmability. Its functioning has been extended to several areas such as cloud computing, edge comput...
详细信息
The proceedings contain 42 papers. The topics discussed include: a learning analytics approach: using online weekly student engagement data to make predictions on student performance;single dimensional generalized kal...
ISBN:
(纸本)9781538679395
The proceedings contain 42 papers. The topics discussed include: a learning analytics approach: using online weekly student engagement data to make predictions on student performance;single dimensional generalized kalman filter;on PQ control of BESS in grid-connected mode and frequency control in islanded-mode for micro-grid application;effect of averaging techniques on PCA algorithm and its performance evaluation in face recognition applications;AZ-model of software requirements change management in global software development;effects of interference on device-to-device communication;and investigation of project administration related challenging factors of requirements change management in global software development: a systematic literature review.
The rapid surge of the electronic commerce (Ecomm) industry has ushered in intensified competition, with platforms vying for customer attention and loyalty. Many Ecomm sites have been employing various tactics to stan...
详细信息
The proceedings contain 81 papers. The topics discussed include: electro-tactile cues for a haptic multimedia finger motoric learning system;waste to energy focus on Indonesia;the validation of linear method in cascad...
ISBN:
(纸本)9781728151922
The proceedings contain 81 papers. The topics discussed include: electro-tactile cues for a haptic multimedia finger motoric learning system;waste to energy focus on Indonesia;the validation of linear method in cascade reservoir system for prediction of energy production;assessing trust variable impact on the information technology governance using business-IT alignment models: a model development study;design of testing results of reduction and migration of write off transaction data in POTS segment using integration testing on SAP application;and encryption application using verifiable secret sharing scheme.
The Cahn-Hilliard equation is a fourth-order parabolic partial differential equation that is challenging and time-intensive to solve using conventional methods. Although the equation is difficult to solve, it finds it...
详细信息
暂无评论