|
|
|
Md Ishtyaq Mahmud, Muntasir Mamun and Ahmed Abdelgawad
Creating machines that behave and work in a way similar to humans is the objective of artificial intelligence (AI). In addition to pattern recognition, planning, and problem-solving, computer activities with artificial intelligence include other activiti...
ver más
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
Petr Fedoseev, Dmitriy Pesterev, Artur Karimov and Denis Butusov
Composition is a powerful and simple approach for obtaining numerical integration methods of high accuracy order while preserving the geometric properties of a basic integrator. Adaptive step size control allows one to significantly increase the performa...
ver más
|
|
|
|
|
|
Hui Deng, Zhihong Zhang, Wenbin Yi and Weixue Xia
A ship advancing in restricted waters may cause a change in the surrounding velocity field, which in turn results in the hydrodynamic pressure field according to the variations in the ship speed. Accurate prediction of ship hydrodynamic pressure fields i...
ver más
|
|
|
|
|
|
Dong-Min Shin and Byung-Young Moon
Recently, the IMO (International Maritime Organization) has reviewed technical issues considering the second generation intact stability criteria in the design stage of ships. In this paper, the evaluation procedure for Lv1 (Level 1) and Lv2 (Level 2) wa...
ver más
|
|
|