|
|
|
Juan Antonio Ruíz-Ceniceros, José Alfonso Aguilar-Calderón, Carolina Tripp-Barba and Aníbal Zaldívar-Colado
Integrating third-party and legacy systems has become a critical necessity for companies, driven by the need to exchange information with various entities such as banks, suppliers, customers, and partners. Ensuring data integrity, keeping integrations up...
ver más
|
|
|
|
|
|
|
Weihua Li, Wansheng Yang, Gang Jin, Junbin Chen, Jipu Li, Ruyi Huang and Zhuyun Chen
Bearings, as the key mechanical components of rotary machinery, are widely used in modern aerospace equipment, such as helicopters and aero-engines. Intelligent fault diagnosis, as the main function of prognostic health management systems, plays a critic...
ver más
|
|
|
|
|
|
|
Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan and Bashar Igried
Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may injec...
ver más
|
|
|
|
|
|
|
Yong Fang, Shaoshuai Yang, Bin Zhao and Cheng Huang
With the propagation of cyberbullying in social networks as a trending subject, cyberbullying detection has become a social problem that researchers are concerned about. Developing intelligent models and systems helps detect cyberbullying automatically. ...
ver más
|
|
|
|
|
|
|
Xingyu Liu, Chao Yan, Han Zhou, Yuan Chang, Xiaojia Xiang and Dengqing Tang
Flocking navigation and obstacle avoidance in complex environments remain challenging for multiple unmanned aerial vehicle (multi-UAV) systems, especially when only one UAV (termed as information UAV) knows the predetermined path and the communication ra...
ver más
|
|
|
|
|
|
|
Chin-Shiuh Shieh, Wan-Wei Lin, Thanh-Tuan Nguyen, Chi-Hong Chen, Mong-Fong Horng and Denis Miu
DDoS (Distributed Denial of Service) attacks have become a pressing threat to the security and integrity of computer networks and information systems, which are indispensable infrastructures of modern times. The detection of DDoS attacks is a challenging...
ver más
|
|
|
|
|
|
|
Samuel D. Okegbile and Bodhaswar T. Maharaj
In this paper, we investigate users? performance under the hybrid spectrum access model in the massive cognitive radio network (CRN), where multiple primary users (PUs) and secondary users (SUs) transmit on the same channel simultaneously. SUs first dete...
ver más
|
|
|
|
|
|
|
Rafika Hajji, Reda Yaagoubi, Imane Meliana, Imane Laafou and Ahmed El Gholabzouri
With rapid population growth, there is an increasing demand for vertical use of space. The wide spread of complex and high-rise buildings, as well as the increasing number of infrastructure above or underground, requires new methods for efficient managem...
ver más
|
|
|
|
|
|
|
Jungmin Yoo
Augmented reality (AR) enables consumers to browse and try products virtually by providing additional information and functionality to mobile shopping. Retailers continue to develop AR technology to engage consumers and enhance their digital shopping exp...
ver más
|
|
|
|
|
|
|
Farzaneh Zafary
The aim of this research is the implementation of business intelligence, considering the role of information systems integration and enterprise resource planning on it. According to the objectives of this research, it is practical research, and the work ...
ver más
|
|
|
|