Search

Results: 130
Application of Representation Learning-Based Chronological Modeling for Network Intrusion Detection
An autoencoder has the potential to overcome the limitations of current intrusion detection methods by recognizing benign user activity rather than differentiating between benign and malicious activity. However, the line...
Department of Mass Communication will host Fulbright Visiting Scholar from India
Winthrop University
Jan 01, 0001
Triveni Goswami Mathur will visit Winthrop at the invitation of Winthrop Professor of Mass Communication Padmini Patwardhan. Mathur will be talking to several mass communication classes on topics related to professionalism and...
Published by: Winthrop University
Transferring cognitive talent across domains to reduce the disposition effect in investment.
We consider Theory of Mind (ToM), the ability to correctly predict the intentions of others. To an important degree, good ToM function requires abstraction from one's own particular circumstances. Here, we posit that such...
The search for active learning
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
Caloric materials near ferroic phase transitions
X Moya, S Kar-Narayan, ND Mathur
Sep 13, 2017
A magnetically, electrically or mechanically responsive material can undergo significant thermal changes near a ferroic phase transition when its order parameter is modified by the conjugate applied field. The resulting...
Recent advances in functional neuroimaging analysis for cognitive neuroscience.
Functional magnetic resonance imaging and electro-/magneto-encephalography are some of the main neuroimaging technologies used by cognitive neuroscientists to study how the brain works. However, the methods for analysing the...
The search for active learning
This article suggests that the concept of ‘active learning’ has different meanings. These meanings are created in the dynamic and variable relationships between the uses of learning technologies and approaches to pedagogy....
Youth and Multiplayer Mobile Games Adoption
The rapidly growing technology has created new form of gaming platform for youth. The online gaming industry is revolutionised with the emergence of information technology and advanced graphical engines. The purpose of this...
XPEEM and MFM Imaging of Ferroic Materials
Abstract: The authors describe and compare two complementary techniques that are habitually used to image ferromagnetic and ferroelectric materials with sub‐micron spatial resolutions (typically 50 nm, at best 10 nm). The first...
Thermal hall effect
Xavier Moya, Neil D Mathur
Apr 05, 2019
Heat travelling down a thermal gradient has been found to undergo a significant deflection by a magnetic field in a multiferroic insulator.
Application of Machine Learning Algorithm in Managing Deviant Consumer Behaviors and Enhancing Public Service.
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading lines and transformers, resulting in voltage...
Short-Term Wind Power Prediction Using Hybrid Auto Regressive Integrated Moving Average Model and Dynamic Particle Swarm Optimization
With the upsurge in restructuring of the power markets, wind power has become one of the key factors in power generation in the smart grids and gained momentum in the recent years. The accurate wind power forecasting is highly...
Advanced Object Detection in Bio-Medical X-Ray Images for Anomaly Detection and Recognition
The human vision system is mimicked in the format of videos and images in the area of computer vision. As humans can process their memories, likewise video and images can be processed and perceptive with the help of computer...
Quantify the Behaviour Intention of Individuals to Control SC Performance by Exploring Cloud Storage Services
The Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) is explored as a theoretical background to build extended UTAUT2 model with relevant variables for examining the cloud storage services technology acceptance at...
A pilot study comparing the DuoFertility(®) monitor with ultrasound in infertile women.
BACKGROUND: The purpose of this study was to assess the accuracy of ovulation detection by the DuoFertility(®) monitor compared with transvaginal ultrasound in infertile women with regular menstrual cycles. METHODS: Eight...
Teacher Evaluation of Institutional Performance
The education industry is also facing challenges related to achieving high organizational performance. In the view of enhancing organizational performance, most organizations are adopting knowledge management processes to...
Mobile Technology for Vegetable Consumption
BACKGROUND: Mobile apps present a potentially cost-effective tool for delivering behavior change interventions at scale, but no known studies have tested the efficacy of apps as a tool to specifically increase vegetable...
Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs
Trust-based mechanisms are widely used in wireless networks of different kinds for providing security against attack. Trust mechanism provides security from various attacks using both detective and preventive manner. This paper...

|<

<

1

2

3

4

5

>

>|