57   Artículos

 
en línea
Alexander Lange, Ronghua Xu, Max Kaeding, Steffen Marx and Joern Ostermann    
Regular inspections of important civil infrastructures are mandatory to ensure structural safety and reliability. Until today, these inspections are primarily conducted manually, which has several deficiencies. In context of prestressed concrete structur... ver más
Revista: Acoustics    Formato: Electrónico

 
en línea
Somayeh Shahrabadi, Telmo Adão, Emanuel Peres, Raul Morais, Luís G. Magalhães and Victor Alves    
The proliferation of classification-capable artificial intelligence (AI) across a wide range of domains (e.g., agriculture, construction, etc.) has been allowed to optimize and complement several tasks, typically operationalized by humans. The computatio... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Wenjun Li, Xueying Yang, Chao Xu and Yongjie Yang    
In the directed co-graph edge-deletion problem, we are given a directed graph and an integer k, and the question is whether we can delete, at most, k edges so that the resulting graph is a directed co-graph. In this paper, we make two minor contributions... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian    
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud    
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Thanatat Pasupa and Sadami Suzuki    
We present a novel mathematical programming model to address a team-oriented worker assignment problem, called the team formation and worker assignment problem (TFWAP). The model establishes a multi-skilled team with high group cohesion to meet cell oper... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Martin Gjoreski, Vladimir Kuzmanovski and Marko Bohanec    
Multi-attribute decision analysis is an approach to decision support in which decision alternatives are evaluated by multi-criteria models. An advanced feature of decision support models is the possibility to search for new alternatives that satisfy cert... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Marcus R. Garvie and John Burkardt    
The general problem of tiling finite regions of the plane with polyominoes is ???? NP -complete, and so the associated computational geometry problem rapidly becomes intractable for large instances. Thus, the need to reduce algorithm complexity for tilin... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »