An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line...
Triveni Goswami Mathur will visit Winthrop at the invitation of Winthrop Professor of Mass Communication Padmini Patwardhan. Mathur will be talking to several mass communication classes on topics related to professionalism and...
We consider Theory of Mind (ToM), the ability to correctly predict the intentions of others. To an important degree, good ToM function requires abstraction from one's own particular circumstances. Here, we posit that such...
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
A magnetically, electrically or mechanically responsive material can undergo significant thermal changes near a ferroic phase transition when its order parameter is modified by the conjugate applied field. The resulting...
Functional magnetic resonance imaging and electro-/magneto-encephalography are some of the main neuroimaging technologies used by cognitive neuroscientists to study how the brain works. However, the methods for analysing the...
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
The rapidly growing technology has created new form of gaming platform for youth. The online gaming industry is revolutionised with the emergence of information technology and advanced graphical engines. The purpose of this...
Abstract: The authors describe and compare two complementary techniques that are habitually used to image ferromagnetic and ferroelectric materials with sub‐micron spatial resolutions (typically 50 nm, at best 10 nm). The first...
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading lines and transformers, resulting in voltage...
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
BACKGROUND: The purpose of this study was to assess the accuracy of ovulation detection by the DuoFertility(®) monitor compared with transvaginal ultrasound in infertile women with regular menstrual cycles. METHODS: Eight...
The education industry is also facing challenges related to achieving high organizational performance. In the view of enhancing organizational performance, most organizations are adopting knowledge management processes to...
BACKGROUND: Mobile apps present a potentially cost-effective tool for delivering behavior change interventions at scale, but no known studies have tested the efficacy of apps as a tool to specifically increase vegetable...
Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper...