Search

Results: 304
How the Power of Machine - Machine Learning, Data Science and NLP Can Be Used to Prevent Spoofing and Reduce Financial Risks
This paper discusses the potential of machine learning, data science, and natural language processing (NLP) in mitigating the incidence of spoofing and financial risks hinged on cyber threats. Another one is spoofing; it is the...
Light-switchable propulsion of active particles with reversible interactions
Abstract: Active systems such as microorganisms and self-propelled particles show a plethora of collective phenomena, including swarming, clustering, and phase separation. Control over the propulsion direction and switchability...
Published by:
On the Application of Quick Artificial Bee Colony Algorithm (qABC) for Attenuation of Test Suite in Real-Time Software Applications
Software testing plays a vital role during the software development process, as it ensures quality software deployment. Success of software testing depends on the design of effective test cases. To achieve the optimization of...
Hydrodynamic Response and Power Efficiency Analysis of Heaving Wave Energy Converter Integrated with Breakwater
The hydrodynamic and power capture performance of an asymmetric floating device called “Dolphin” wave energy converter (WEC) integrated with a fixed breakwater has been proposed. The operation of the floating WEC device is...
Published by:
Traffic Density Estimation for Traffic Management Applications Using Neural Networks
Traffic density is one of the elemental variables used in molding road traffic kinetics. Current density estimation techniques include loop detectors and sensors which are dependent on the crowd-sourcing of traffic data, which...
Hydrodynamic Response and Power Efficiency Analysis of Heaving Wave Energy Converter Integrated with Breakwater
The hydrodynamic and power capture performance of an asymmetric floating device called “Dolphin” wave energy converter (WEC) integrated with a fixed breakwater has been proposed. The operation of the floating WEC device is...
Published by:
A Framework for Managing Complexity in Information Systems
A particularly difficult, but important, challenge in the design and development of contemporary information systems is dealing with complexity. Although complexity has been richly discussed from various perspectives in the...
A counterintuitive stereochemical outcome from a chelation-controlled vinylmetal aldehyde addition leads to the configurational reassignment of phormidolide A.
As part of our ongoing studies towards the total synthesis of phormidolide A (1), we explored the chelation-controlled vinylmetal addition of iodide 2 to aldehyde 3 to install the reported 17S configuration. While the...
Published by:
Light-switchable propulsion of active particles with reversible interactions.
Active systems such as microorganisms and self-propelled particles show a plethora of collective phenomena, including swarming, clustering, and phase separation. Control over the propulsion direction and switchability of the...
Published by:
A phylogenetic analysis of the wild Tulipa species (Liliaceae) of Kosovo based on plastid and nuclear DNA sequence.
In Kosovo, the genus Tulipa is represented by eight taxa, most of which form a species complex surrounding Tulipa scardica. To investigate the phylogenetic relationship of these Tulipa species a Bayesian analysis was undertaken...
Published by:
A phylogenetic analysis of the wild Tulipa species (Liliaceae) of Kosovo based on plastid and nuclear DNA sequence.
In Kosovo, the genus Tulipa is represented by eight taxa, most of which form a species complex surrounding Tulipa scardica. To investigate the phylogenetic relationship of these Tulipa species a Bayesian analysis was undertaken...
Published by:
Single-site glycine-specific labeling of proteins.
Labeling of native proteins invites interest from diverse segments of science. However, there remains the significant unmet challenge in precise labeling at a single site of a protein. Here, we report the site-specific labeling...
Published by:
Disaster Relief Management Using Reinforcement Learning-Based Routing
Effective disaster management is required for the peoples who are trapped in the disaster scenario but unfortunately when disaster situation occurs the infrastructure support is no longer available to the rescue team. Ad hoc...
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features
Copy-move forgery (CMF) is an established process to copy an image segment and pastes it within the same image to hide or duplicate a portion of the image. Several CMF detection techniques are available; however, better...

|<

<

1

2

3

4

5

>

>|