Search
Now showing items 2981-2990 of 3041
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Labor Induction failure prediction based on B-Mode Ultrasound Image Processing using Multiscale Local Binary Patterns
(IEEE, 2016)
Labor induction is defined as the artificial onset of labor for the purpose of vaginal birth. Cesarean section is one of the potential risks of labor induction as it occurs in about 20% of the inductions. A ripe cervix ...
Analysis of non-uniform circumferential segmentation of magnets to reduce eddy-current losses in SPMSM machines
(IEEE, 2012)
Eddy current losses generated in the rotor of the permanent magnet machines may lead to an excessive magnet heating. This can cause full demagnetization of the magnets so it is very important to analyze the losses on them ...
Identificación de factores que influyen en el compromiso de los empleados utilizando pensamiento sistemicoIdentification of the factors which influence employee commitment using system thinking
(Dyna, 2018)
In our increasingly globalised economy, managing continuous change and remaining competitive has become a central issue for organisations in the industrial sector. Building a sustainable competitive advantage through ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Study of alternatives and experimental validation for predictions of hole-edge fatigue crack growth in 42CrMo4 steel
(Elsevier, 2018)
The objective of this work is to establish pertinent criteria allowing an optimal alternative to be chosen for calculating the inputs needed to make Run/Repair/Replace decisions and to program inspection plans for cracked ...
Robustness of inventory replenishment and customer selection policies for the dynamic and stochastic inventory-routing problemRobustness of inventory replenishment policies and client selection methods for the stochastic and dynamic inventory-routing problem
(Elsevier, 2016)
When inventory management, distribution and routing decisions are determined simultaneously, implementing a vendor-managed inventory strategy, a difficult combinatorial optimization problem must be solved to determine which ...
A case study on the use of machine learning techniques for supporting technology watch
(Elsevier, 2018)
Technology Watch human agents have to read many documents in order to manually categorize and dispatch them to the correct expert, that will later add valued information to each document. In this two step process, the first ...
A modified genetic algorithm applied to the elevator dispatching problem
(Springer, 2016)
Reduction of passenger waiting time in a multiple elevator system is an important goal in the lift industry. Genetic algorithms (GAs) have been applied to the dispatching problem in vertical transportation. In this paper, ...
Connotative meaning of travel modes and activity-travel behavior
(Elsevier Ltd, 2018)
This paper aims to present results of a study regarding how the meaning of travel modes influences on the performance of activities and trips.
Connotative meaning of travel modes was measured using semantic differential ...