Search
Search Results
-
A Quantitative Analysis Method of Itemized Requirement Traceability for Aircraft Development
In order to adapt to the refined management of requirements traceability in the application mode of itemized requirements management, the paper... -
Dedicated Encoding-Streams Based Spatio-Temporal Framework for Dynamic Person-Independent Facial Expression Recognition
The facial expression recognition (FER) task is widely considered in the modern human-machine platforms (human support robots) and the self-service... -
Perspectives and Conclusion
In this book, we started by describing the components of financial opinions as well as opinion sources in the financial domain. Then, we surveyed... -
A Variant with the Variable-Sharing Property of Brady’s 4-Valued Implicative Expansion BN4 of Anderson and Belnap’s Logic FDE
A logic L has the “variable-sharing property” (VSP) if in all L-theorems of conditional form antecedent and consequent share at least a propositional... -
Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms
Expert systems possess human-like expertise for data analyzing as well as for decision-making. These systems are suitable in a situation, where a...
-
A Method of Detecting Sensitive Information of Enterprise Asset Training Education Based on Machine Learning
Enterprises inevitably involve sensitive information when organizing asset training and education activities. To ensure information security, a... -
Mobile App for Automation of Observational Instrument for Continuous Emotional Evaluation
Emotions are psychophysiological expressions that are shown before a stimulus or situation, and their research in user experience environments has... -
Security Risk Estimation and Management in Autonomous Driving Vehicles
Autonomous vehicles (AV) are intelligent information systems that perceive, collect, generate and disseminate information to improve knowledge to act... -
Competences for Digital Transformation in Companies – An Analysis of Job Advertisements in Germany
Digital transformation (DT) offers major improvement of a business by significantly changing its characteristics through the combination of... -
Image and Perception of Royal Heritage and Eco-space of the Medium Towns in India: Reflection from Burdwan Royal Heritage Site
With the rampant and rapid growth of urbanization of the develo** countries like India, especially from the last decade of the twentieth century,... -
Source-Code-to-Object-Code Traceability Analysis for Airborne Software: A Case for Tool Support
Industrial practise frequently warrants small, not so common verification activities, where dedicated tool support can significantly ease the... -
Making System Calls
So far, we have been learning the basics of assembly language itself—how to move, store, add, subtract, compare, branch, etc. Now that we have the... -
Research on the Decision-Making Process of Civil Servant Resisting Open Data Based on Perceived Risks
Based on the cognition of stakeholders, this paper reveals the decision-making process of civil servants resisting open data based on perceived... -
Taxonomy of competence models based on an integrative literature review
An individual competence is one of the main human resources, which enables a person to operate in everyday life. A competence profile, formally...
-
AHP-MOORA Approach for Industrial Robot Selection in Car Paint: An Industrial Case Study
Industrial robots are crucial elements of advanced manufacturing technologies because they allow manufacturing companies to generate high-quality... -
Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security
Combining countermeasures against side-channel attacks represents a promising approach to defend against powerful attackers. Existing works on this... -
Attacklets to Test Anomaly Detectors for Critical Infrastructure
Critical Infrastructure (CI), such as electric power generation and water treatment plants, are susceptible to attacks that lead the underlying... -
Research on Information Fusion Method of English Teaching Reform Based on Reinforcement Learning
The information of English teaching reform has such attributes as different time and space, heterogeneous form, etc., which brings difficulties to... -
[m]allotROPism: a metamorphic engine for malicious software variation development
For decades, code transformations have been a vital open problem in the field of system security, especially for cases like malware mutation engines...