the importance of service level in companies is increasingly vital, whether post or pre-sales, the level should always aim to satisfy the customer. To maintain a good level of service it is necessary that, in each sec...
详细信息
softwareengineering, in general, and Global softwareengineering (GSE), in particular, face challenges such as handling communication and collaboration issues and inappropriate knowledge management. It is difficult t...
详细信息
3-wheeled mobile robots (3WMR) are used widely in various industries. they can operate in hazardous environments and complete tasks automatically without direct human intervention. In this paper, since the 3-Wheel Mob...
详细信息
the heterogeneous wireless mesh methodologies proffer a chance for increase in capacity of a network and achieve greater quality of service (QoS). Distinct standards, protocols, and access technologies are used in wir...
详细信息
Wireless technology has become one of the most important parts of our daily routine. Besides being used for communication, the wireless signal has been applied to various Wireless software Applications (WSAs). the sig...
详细信息
ISBN:
(纸本)9798350322637
Wireless technology has become one of the most important parts of our daily routine. Besides being used for communication, the wireless signal has been applied to various Wireless software Applications (WSAs). the signal fluctuation caused by the measurement system or the environmental dynamic can significantly influence WSAs' performance, making it challenging to evaluate WSAs in real-world scenarios. To overcome these challenges, we propose WirelsssDT, a wireless digital twin platform, using digital twin and real-time ray tracing technologies to emulate the wireless signals propagation and generate emulation data for real-time WSAs evaluation. In this demonstration, we evaluate a wireless indoor localisation mobile application with two typical prediction algorithms: 1) Kalman Filter-based Trilateration and 2) Deep Recurrent Neural Network, as a case study to demonstrate the capabilities of WirelessDT. the source code is available at https://***/ codelzz/WirelessDT, and the demonstration video is available at https://***/9Kl- 3jgMBUA.
Code cloning is a prevalent practice in software development, frequently exploited by adversaries to propagate malicious code, compromising user security and privacy. Recently proposed detection techniques often fail ...
详细信息
In today9;s world predicting stock prices remains a challenge due to markets being volatile as it is driven by multiple factors. In the past, investors and business men depended on traditional methods of prediction...
详细信息
the proceedings contain 55 papers. the special focus in this conference is on Computing and Informatics. the topics include: Sentiment Analysis of Arabic Dialects: A Review Study;charting Inclusive Digital Society Res...
ISBN:
(纸本)9789819995912
the proceedings contain 55 papers. the special focus in this conference is on Computing and Informatics. the topics include: Sentiment Analysis of Arabic Dialects: A Review Study;charting Inclusive Digital Society Research Trends: A Bibliometric Analysis of E-Participation through Social Media;systematic Literature Review and Bibliometric Analysis on Addressing the Vanishing Gradient Issue in Deep Neural Networks for Text Data;a Test Dataset of Offensive Malay Language by a Cyberbullying Detection Model on Instagram Using Support Vector Machine;tikTok Video Cluster Analysis based on Trending Topic;a Video Summarization Method for Movie Trailer-Genre Classification based on Emotion Analysis;e-Nose: Spoiled Food Detection Embedded Device Using Machine Learning for Food Safety Application;an Analysis of Objective Function Modification Approaches in Routing Protocols for Low Power and Lossy Networks: A Fuzzy Logic-based Perspective;an Empirical Study of Label Size Effect on Classification Model Accuracy Using a Derived Rule from the Holy Quran Verses;large Scale Web Crawling and Distributed Search Engines: Techniques, Challenges, Current Trends, and Future Prospects;anomalies in Mooring (thin) Lines: Causes, Risk Mitigations, and Real Time Consequences of Failure – A Comprehensive Review;data Analytics Modelling System for Short Courses at Seberang Jaya Community College;examining the software Developers’ Perception in Open-Source software of Blockchain Project Using Association Rules Mining;support Vector Machine for Satellite Images Classification Using Radial Basis Function Kernel Method;a Regression Test Case Prioritization Framework for software Sustainability;towards a Sustainable Digital Society: Supporting Producer Mobility in Named Data Networking through Immobile Anchor-based Mechanism.
this study examines the performance optimization of Silicon Dioxide (SiO2)-based and Hafnium Dioxide (HfO2)-based Biosensor Field Effect Transistors (BIOFETs) by analysing their voltage and drain current characteristi...
详细信息
High-quality code summaries are vital for improving code understanding, reuse, and maintenance efficiency. Withthe rise of deep learning, neural networks have become a hot topic in code summarization. Utilizing lexic...
详细信息
暂无评论