|
|
|
Louis Shekhtman and Erez Waisbard
A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trac...
ver más
|
|
|
|
|
|
|
Yadi Zhao, Lei Yan, Jian Wu and Ximing Song
To address the low level of intelligence and low utilization of logs in current rotary cutting equipment, this paper proposes a digital twin-based system for optimizing the rotary cutting of logs using a five-dimensional model of digital twins. The syste...
ver más
|
|
|
|
|
|
|
Almetwally M. Mostafa, Alaa Altheneyan, Abeer Alnuaim and Aseel Alhadlaq
A computer system generates logs to record all relevant operational data about the system and all operations performed in such systems. System log examination is crucial in the identification of network- and system-level assaults. In comparison to establ...
ver más
|
|
|
|
|
|
|
Amit Walinjkar
With the advances in the microfabrication of analogue front-end devices, and embedded and signal processing technology, it has now become possible to devise miniaturized health monitoring kits for non-invasive real time monitoring at any location. The cu...
ver más
|
|
|
|
|
|
|
Stephan Hoffmann, Dirk Jaeger, Marcus Lingenfelder and Siegmar Schoenherr
This case study analyzed the performance of a start-up cable yarding crew in southern China through operational monitoring by consecutive time studies, long-term log book recordings and efficiency evaluation by stochastic frontier analysis (SFA). The cre...
ver más
|
|
|
|
|
|
|
Giva Andriana Mutiara, Nanna Suryana Herman and Othman Mohd
Nowadays, the need for wireless sensing applications is increasing. Along with the increased illegal cutting of logs in the forest, however, it requires the integration application to tackle the illegal logging and forest preservation. The wireless senso...
ver más
|
|
|
|
|
|
|
Mohd Anuaruddin Bin Ahmadon and Shingo Yamaguchi
In this paper, we proposed a verification method for the message passing behavior of IoT systems by checking the accumulative event relation of process models. In an IoT system, it is hard to verify the behavior of message passing by only looking at the ...
ver más
|
|
|
|
|
|
|
Noriko Uosaki,Hiroaki Ogata,Mengmeng Li,Bin Hou,Kousuke Mouri
Pág. pp. 44 - 53
This paper describes implementation guidelines for ubiquitous seamless mobile learning featuring the learning-log system named SCROLL (System for Capturing and Reminding of Learning Log). This system helps users to share and remind ubiquitous learning ex...
ver más
|
|
|
|
|
|
|
Lin Zhang, Yanbin Gao and Lianwu Guan
For seabed mapping, the prevalence of autonomous underwater vehicles (AUVs) employing side-scan sonar (SSS) necessitates robust navigation solutions. However, the positioning errors of traditional strapdown inertial navigation system (SINS) and Doppler v...
ver más
|
|
|
|
|
|
|
Margarita Zyrianova, Timothy Collett and Ray Boswell
One of the most studied permafrost-associated gas hydrate accumulations in Arctic Alaska is the Eileen Gas Hydrate Trend. This study provides a detailed re-examination of the Eileen Gas Hydrate Trend with a focus on the gas hydrate accumulation in the we...
ver más
|
|
|
|
|
|
|
Youngmin Kim, Donghwan Kim, Sunho Park, Yonghwa Kim, Jisoo Hong, Sunghee Hong, Jinsoo Jeong, Byounghyo Lee and Hyeonchan Oh
Digital music is one of the most important commodities on the market due to music royalty distribution in Korea. As the music market has been transformed into a digital music market by means such as downloading and streaming, the distribution of music ro...
ver más
|
|
|
|
|
|
|
Syed I. Hussain, Carol J. Ptacek, David W. Blowes, YingYing Liu, Brent C. Wootton, Gordon Balch and James Higgins
The occurrence of pharmaceutically active compounds (PhACs), nutrients, and an artificial sweetener acesulfame in wastewater, and subsequent removal in an engineered system comprising aerobic wetland, anaerobic wetland, and steel slag cells, were investi...
ver más
|
|
|
|
|
|
|
Juan Carlos López-Pimentel, Luis Alberto Morales-Rosales and Ignacio Algredo-Badillo
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task; it i...
ver más
|
|
|
|
|
|
|
Ryo Sasaki and Kayoko Yamamoto
In tourist areas, it is necessary to prepare a method that supports tourists? activities by providing information concerning disaster support facilities during normal times, in addition to sightseeing spots and tourism-related facilities, because there i...
ver más
|
|
|
|
|
|
|
Konstantina Fotiadou, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Dimitrios Skias, Sofia Tsekeridou and Theodore Zahariadis
Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Learni...
ver más
|
|
|
|
|
|
|
Paola Favati, Grazia Lotti, Ornella Menchi and Francesco Romani
Frequency analysis is often used to investigate the structure of systems representing multi-scale real-world phenomena. In many different environments, functional relationships characterized by a power law have been recognized, but, in many cases this si...
ver más
|
|
|
|
|
|
|
Yudai Kato and Kayoko Yamamoto
The present study aimed to design, develop, operate and evaluate a sightseeing spot recommendation system that can efficiently and usefully support tourists while considering their visiting frequencies. This system was developed by integrating social net...
ver más
|
|
|
|
|
|
|
?.?. Cherepniov
Pág. 13 - 16
Modulo multiplication, where the modulus is an n-digit number, with n approximately equal to 29, is currently the main operation in the discrete logarithm algorithm. If we consider this process as multiplication of big numbers followed by taking modulo (...
ver más
|
|
|
|
|
|
|
Sindhumol S
Pág. pp. 128 - 145
A cost-effective smart team management system using iOS devices as iBeacon for better task monitoring and presence detection is proposed in this work. It is designed to maximum utilize the proximity information offered by iOS devices through iBeacon inte...
ver más
|
|
|
|
|
|
|
Ioan Badarinza,Adrian Sterca,Florian Mircea Boian
Pág. 26 - 33
In this paper we use the user's recent web browsing history in order to provide better query suggestions in an information retrieval system. We have built a Chrome browser plugin that collects each web page visited by a user and submits it to our query s...
ver más
|
|
|
|