|
|
|
Zuhang Wu, Yun Zhang, Lifeng Zhang, Xiaolong Hao, Hengchi Lei and Hepeng Zheng
In this study, we evaluated the performance of rain-retrieval algorithms for the Version 6 Global Precipitation Measurement Dual-frequency Precipitation Radar (GPM DPR) products, against disdrometer observations and improved their retrieval algorithms by...
ver más
|
|
|
|
|
|
|
Marcelo Botelho da Costa Moraes, Marcelo Seido Nagano (Author)
Pág. 373 - 379
|
|
|
|
|
|
|
Juan Murillo-Morera, Carlos Castro-Herrera, Javier Arroyo, Ruben Fuentes-Fernandez
Pág. 114 - 137
Today, it is common for software projects to collect measurement data through development processes. With these data, defect prediction software can try to estimate the defect proneness of a software module, with the objective of assisting and guiding so...
ver más
|
|
|
|
|
|
|
Jiacun Wang, Guipeng Xi, Xiwang Guo, Shujin Qin and Henry Han
The scheduling of disassembly lines is of great importance to achieve optimized productivity. In this paper, we address the Hybrid Disassembly Line Balancing Problem that combines linear disassembly lines and U-shaped disassembly lines, considering multi...
ver más
|
|
|
|
|
|
|
Thomas Kopalidis, Vassilios Solachidis, Nicholas Vretos and Petros Daras
Recent technological developments have enabled computers to identify and categorize facial expressions to determine a person?s emotional state in an image or a video. This process, called ?Facial Expression Recognition (FER)?, has become one of the most ...
ver más
|
|
|
|
|
|
|
Maryan Rizinski, Andrej Jankov, Vignesh Sankaradas, Eugene Pinsky, Igor Mishkovski and Dimitar Trajanov
The task of company classification is traditionally performed using established standards, such as the Global Industry Classification Standard (GICS). However, these approaches heavily rely on laborious manual efforts by domain experts, resulting in slow...
ver más
|
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Meng Ma, Zhirong Zhong, Zhi Zhai and Ruobin Sun
There are hundreds of various sensors used for online Prognosis and Health Management (PHM) of LREs. Inspired by the fact that a limited number of key sensors are selected for inflight control purposes in LRE, it is practical to optimal placement of redu...
ver más
|
|
|
|
|
|
|
Lucio Pinello, Omar Hassan, Marco Giglio and Claudio Sbarufatti
An increase in aircraft availability and readiness is one of the most desired characteristics of aircraft fleets. Unforeseen failures cause additional expenses and are particularly critical when thinking about combat jets and Unmanned Aerial Vehicles (UA...
ver más
|
|
|
|
|
|
|
Michal Welcer, Nezar Sahbon and Albert Zajdel
Modern aviation technology development heavily relies on computer simulations. SIL (Software-In-The-Loop) simulations are essential for evaluating autopilots and control algorithms for multi-rotors, including drones and other UAVs (Unmanned Aerial Vehicl...
ver más
|
|
|
|