Search
Search Results
-
AI-Powered Smartphone Context and High-Utility Itemset Mining for Enhanced App Testing and Personalization
Internet of Things (IoT) devices have become increasingly essential. User experience and functionality rely heavily on context events such as screen... -
Develo** Students’ Reflective Skills to Improve the Learning of Human-Computer Interaction
The field of Human-computer interaction (HCI) has emerged as a multidisciplinary field. Students are required to learn theoretical design concepts... -
Towards Adopting a Digital Twin Framework (ISO 23247) for Battery Systems
Increasing demands of sustainability and electrification are driving development for customer and regulatory satisfaction, and battery systems are on... -
Towards Visualizing the Status of Bug Reports
This paper presents preliminary results towards visualizing comprehensive and useful visualizations for the status and the history of bug reports... -
A Practical Survey of Data Carving from Non-Functional Android Phones Using Chip-Off Technique
Mobile devices have become ubiquitous in modern life and are increasingly used for communication, entertainment, and personal data storage. Due to... -
Quarantine Centrality: Principal Component Analysis of SIS Model Simulation Results to Quantify the Vulnerability of Nodes to Stay Infected in Complex Networks
We propose a novel simulations-based centrality metric to proactively identify and quarantine topologically vulnerable nodes that are more likely to... -
Network Embedding Exploration Tool (NEExT)
In this paper, we introduce NEExT(Network Embedding Exploration Tool) for embedding collections of graphs via user-defined node features. The... -
Efficient Computation of K-Edge Connected Components: An Empirical Analysis
Graphs play a pivotal role in representing complex relationships across various domains, such as social networks and bioinformatics. Key to many... -
A Secure Sharing Method for University Personnel Archive Data Based on Federated Learning
In response to the complex data trust evaluation process in the current process of secure sharing of university personnel archive data, which leads... -
High Quality Resources Sharing of College Students’ Career Guidance Course Teaching Based on Decision Tree Classification Algorithm
In order to improve the quality and efficiency of sharing high-quality teaching resources and achieve ideal results, a decision tree classification... -
Allocation Method of Teaching Resources of Talent Training Course Based on BP Neural Network
The traditional allocation method of teaching resources is unbalanced, which leads to the low utilization value of teaching resources in talent... -
A Machine Learning Based Security Detection Method for Privacy Data in Social Networks
In order to improve the social Internet privacy data security detection effect and improve the data security detection efficiency, this paper... -
A Method for Integrating Sports Information Resources Based on Fuzzy Clustering Algorithm
To improve the accuracy of sports information resource integration, a fuzzy clustering algorithm based method for sports information resource... -
Design of English Mobile Online Education Platform Based on GPRS/CDMA and Internet
In order to increase the number of real-time online people on the education platform and realize the comprehensive promotion of English mobile online... -
Research on Electrical Equipment Status Monitoring Method Based on Wireless Communication Technology
The current methods for monitoring the status of electrical equipment are prone to interference from the external environment, resulting in low... -
Design of Control System for Constant Speed Variable Pitch Loaded Multi Axis Unmanned Aerial Vehicle Based on Lidar Technology
In order to ensure the stability of drone flight and improve control performance, a constant speed, variable pitch, and heavy-duty multi-axis drone... -
Sports Athlete Error Action Recognition System Based on Wireless Communication Network
Incorrect actions not only affect the training effect, but also cause certain harm to the athlete’s body. A sports athlete incorrect action... -
Interactive Sharing Method of Digital Media Image Information Based on Differential Privacy Protection
Because digital media image information is vulnerable to external attacks during interactive sharing, resulting in poor interactive sharing effect, a... -
Research on Anti-interference Dynamic Allocation Algorithm of Channel Resources in Heterogeneous Cellular Networks for Social Communication
The current channel allocation method does not consider the user transmission power problem, which leads to the problems of high user power... -
Processing Method of Civil Radar Echo Signal Based on Kalman Filter Algorithm
With the popularization of civil radar application, it has great development potential in the situations of earthquake disasters and engineering...