|
|
|
M.H.J.P. Gunarathna, Kazuhito Sakai, Tamotsu Nakandakari, Kazuro Momii and M.K.N. Kumari
Poor data availability on soil hydraulic properties in tropical regions hampers many studies, including crop and environmental modeling. The high cost and effort of measurement and the increasing demand for such data have driven researchers to search for...
ver más
|
|
|
|
|
|
|
Daiki Ogawa and Rui Fukumoto
The growing shortage of human resources for managing landscape in the water environment has led to problems concerning the preservation of the landscape in Japan. For developing people have the awareness to preserve the landscape, it is important to unde...
ver más
|
|
|
|
|
|
|
Rahmawati Azizah Mt,Ria Octavia
Pág. 175 - 194
Abstract: This study aims to examine the influence of user belief on flow, willingness to buy on flow, and flow on impulse buying behavior. The subjects of this research include Students/College Students, Civil Servants, Private Employees, Lecturers/Teac...
ver más
|
|
|
|
|
|
|
Sean Pascoe
Data envelopment analysis (DEA) has been proposed as a means of assessing alternative management options when there are multiple criteria with multiple indicators each. While the method has been widely applied, the implications of how the method is appli...
ver más
|
|
|
|
|
|
|
Ken Jom Ho, Ender Özcan and Peer-Olaf Siebers
Solving multiple objective optimization problems can be computationally intensive even when experiments can be performed with the help of a simulation model. There are many methodologies that can achieve good tradeoffs between solution quality and resour...
ver más
|
|
|
|
|
|
|
Emma Fitzgerald and Michal Pióro
Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent s...
ver más
|
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Isaac Machorro-Cano, José Oscar Olmedo-Aguirre, Giner Alor-Hernández, Lisbeth Rodríguez-Mazahua, Laura Nely Sánchez-Morales and Nancy Pérez-Castro
Cloud-based platforms have gained popularity over the years because they can be used for multiple purposes, from synchronizing contact information to storing and managing user fitness data. These platforms are still in constant development and, so far, m...
ver más
|
|
|
|
|
|
|
Tamás Kegyes, Alex Kummer, Zoltán Süle and János Abonyi
We analyzed a special class of graph traversal problems, where the distances are stochastic, and the agent is restricted to take a limited range in one go. We showed that both constrained shortest Hamiltonian pathfinding problems and disassembly line bal...
ver más
|
|
|
|
|
|
|
Hugo Silva, Vítor Duque, Mário Macedo and Mateus Mendes
The International Classification of Diseases, 10th edition (ICD-10), has been widely used for the classification of patient diagnostic information. This classification is usually performed by dedicated physicians with specific coding training, and it is ...
ver más
|
|
|
|