In daily activities, human beings cannot be separated from the services offered by a particular organization, such as the use of public transportation, education, food, health and much more related to daily life. Ther...
详细信息
In this paper we describe a web tutorial with the assistance of which engineering students, engineering master's student, PhD student, teachers, and researchers can write and register their first patent out of the...
详细信息
In a Micro Hydro Power Plant, one of the components used is a turbine. This study uses a Pelton turbine;the Pelton turbine is a component that utilizes the nozzle angle, the design parameters that affect the Pelton tu...
详细信息
With fast development of big data, the data quantities and information types on the webpage are increasing tremendously. Consequently, it is becoming more difficult for users to obtain the valuable and interesting dat...
详细信息
An architecture design of the intelligent agent for speech recognition and translation is presented in this paper. The design involves the agent architecture and the method of the agent is used. The architecture desig...
详细信息
作者:
Brumen, Boštjan
Faculty of Electrical Engineering and Computer science Smetanova 17 MariborSi-2000 Slovenia
Respect for privacy is not a modern phenomenon as it has been around for centuries. Recent advances in technologies led to the rise of awareness of the importance of privacy, and to the development of principles for p...
详细信息
Enterprise architecture takes a step in the path of digital transformation by providing a comprehensive system with an integrated view of the organization. In traditional methods, architects manually prepare enterpris...
详细信息
Although many techniques have been proposed to deal with location privacy problem, which is one of popular research issues in location based services, some limitations still remain and hence they cannot be applied to ...
详细信息
Model checking techniques have been applied widely for verifying hardware designs and protocols since they can check if the system operates as desired or not without actually running the system. Recently, the usage of...
详细信息
The rising occurrence of malicious URLs on the internet is a major concern for users and their devices. To combat this problem, there is a need to develop effective methods to protect against these threats. The use of...
详细信息
暂无评论