Search
Now showing items 21-30 of 527
Policy-Based Customization and Corrective Adaptation of Composite Web Services
(
Inderscience Publishers
, 2010 , Article)
Due to the typical long-running character of business processes, it is often desirable to be able to change a running process. Common scenarios include the occurrence of faults, the change of business requirements and ...
DiSWOP: A novel measure for cell-level protein network analysis in localized proteomics image data
(
Oxford Journals
, 2014 , Article)
Motivation: New bioimaging techniques have recently been proposed to visualize the colocation or interaction of several proteins within individual cells, displaying the heterogeneity of neighbouring cells within the same ...
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
(
Springer
, 2014 , Article)
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application ...
Towards agile approach for better user satisfaction
(
Mundo Press
, 2014 , Article)
User satisfaction is a cornerstone indicator of any successful software project. Software projects are classified as successful only if the users are satisfied with the delivered software project result. Reducing the gap ...
Ensemble Classifier for Epileptic Seizure Detection for Imperfect EEG Data
(
Hindawi
, 2015 , Article)
Brain status information is captured by physiological electroencephalogram (EEG) signals, which are extensively used to study
different brain activities.This study investigates the use of a new ensemble classifier to ...
Evaluation model for e-tourism product: A hidden Markov model-based algorithm
(
Inderscience
, 2014 , Article)
Nowadays, e-tourism is widely pronounced as a kind of web marketing for tourism businesses. Tourist agencies and tourism service providers are able to access their customers directly in a cost-effective way. In this context, ...
G-RAT | A novel graphical randomized authentication technique for consumer smart devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
Understanding probabilistic cognitive relaying communication with experimental implementation and performance analysis
(
MDPI AG
, 2019 , Article)
Efficiently use of the limited wireless spectrum can be achieved by cooperative cognitive relaying, where secondary users (SUs), who do not pay for the licensed spectrum and have better channel condition to the primary ...
A PLM components monitoring framework for SMEs based on a PLM maturity model and FAHP methodology
(
Mundo Press
, 2014 , Article)
Right PLM components selection and investments increase business advantages. This paper develops a PLM components monitoring framework to assess and guide PLM implementation in small and middle enterprises (SMEs). The ...
Automatic detection of regions in spinach canopies responding to soil moisture deficit using combined visible and thermal imagery
(
Public Library of Science
, 2014 , Article)
Thermal imaging has been used in the past for remote detection of regions of canopy showing symptoms of stress, including water deficit stress. Stress indices derived from thermal images have been used as an indicator of ...