Search
Now showing items 11-20 of 26
Application of Petri nets towards improved utilization of machines in job shop manufacturing environments
(
Emerald Group Publishing Ltd.
, 2017 , Article)
Purpose - The purpose of this paper is to demonstrate the use of Petri nets in a job shop setup for the improvement in the utilization of machines. Design/methodology/approach - The study discusses concepts such as reachable ...
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Monitoring training load and fatigue in soccer players with physiological markers
(
Elsevier Inc.
, 2017 , Article Review)
The quantification and monitoring of training load (TL) has been the topic of many scientific works in the last fifteen years. TL monitoring helps coaches to individually prescribe, follow-up, analyse, adjust and programme ...
Query performance prediction for microblog search
(
Elsevier Ltd
, 2017 , Article)
Query performance prediction (QPP) is the task of estimating the effectiveness of a retrieval system given a search query in the absence of any feedback from the searcher. The task has been proven to be very challenging, ...
Performance and security improvements for Tor: A survey
(
Association for Computing Machinery
, 2016 , Article)
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ...
A Characterization Study of Arabic Twitter Data with a Benchmarking for State-of-the-Art Opinion Mining Models
(
Association for Computational Linguistics (ACL)
, 2017 , Conference Paper)
Opinion mining in Arabic is a challenging task given the rich morphology of the language. The task becomes more challenging when it is applied to Twitter data, which contains additional sources of noise, such as the use ...
Software project management: Theory of constraints, risk management, and performance evaluation
(
Mundo Press
, 2014 , Article)
Constraints and risks are two critical factors that affect software project performance; more attention needs to be paid to constraints and risks in order to improve performance. In this paper, investigation will take place ...
Modern techniques and technologies applied to training and performance monitoring
(
Human Kinetics
, 2016 , Article)
Athlete preparation and performance continues to increase in complexity and costs. Modern coaches are shifting from reliance on personal memory, experience, and opinion to evidence from collected training load data. Training ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Pass-fail decisions for borderline performers after a summative objective structured clinical examination
(
American Association of Colleges of Pharmacy
, 2019 , Article)
Objective. To determine what expert assessors value when making pass-fail decisions regarding pharmacy students based on summative data from objective structured clinical examinations (OSCE), and to determine the reliability ...