312 Questions 188 Answers 0 Followers
Questions related from Eduard Babulak
Given the dynamic developments and innovation in computing, IT and Information Systems Industry, it appears that there is a shortage of well qualified professionals who will push the edge of...
12 December 2019 6,793 5 View
Big data analytics (BDA) is a major paradigm shift in business analytics. Big data refers primarily to datasets which are characterized by what some authors term the “three Vs” or volume, variety,...
10 October 2019 2,823 4 View
Mathematical model on logistics and supply chain (LSC) plays an important role in the decision-making tool to obtain optimal strategy. An LSC comprises of the upper parts which consist of raw...
10 October 2019 1,063 1 View
Albert Schweitzer said “success is not the key to happiness. Happiness is the key to success. If you love what you are doing, you will be successful”. Most organizations believe that the...
07 July 2019 3,046 1 View
Smart manufacturing, sometimes referred to as Industry 4.0, heralds a new age of responsive supply networks and tailored products and services made possible by advanced technologies such as the...
06 June 2019 1,747 2 View
The edge detection takes a wide interest in the field of digital image processing and computer vision, which is one of the basic stages in the process of patterns recognition and image...
05 May 2019 7,273 3 View
Text classification (TC) is a popular technique in the data mining and it used to get valuable information from the vast amount of data. The process of classifying or grouping documents into...
05 May 2019 1,617 3 View
Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN...
03 March 2019 9,367 1 View
Long Term Evolution (LTE) is the 4th generation broadband technology for mobile. LTE has been developed by 3GPP in release 8 technical specifications (R8). The LTE facilitates QoS to be...
03 March 2019 8,424 2 View
Given the current dynamic developments in Computing, Internet and ICT industry, the Cyber Security has become essential part of curriculum in higher education worldwide. However, there are number...
02 February 2019 6,493 15 View
WiMAX (Worldwide Interoperability for Microwave Access) based on IEEE 802.16 standards is a wireless metropolitan area network (WMAN) which supports point to multi-point broadband wireless...
01 January 2019 7,121 0 View
Conducting research in the field of Cyber Security generate large volume of data that require large volume of computation and data analytics.
01 January 2019 689 1 View
The National Institute of Standards and Technology (NIST) defines the fundamental of cloud computing as a concept for delivering a shared pool of configurable computing resources, which can be...
01 January 2019 488 3 View
Digital maps are basic elements of a geographic information system (GIS). In dialog mode, the map’s function is to provide access to an accumulated non-cartographic database reference that...
01 January 2019 2,129 3 View
The image processing playing an important role in dentistry also. Today, the impact of dental imaging (DI) in dentistry is essential in detecting dental abnormalities. It helps medical staff to...
12 December 2018 5,067 2 View
Satellite Images provides a detailed aspect of the earth surface, through many wavelengths (spectral) and spatial data. High-resolution (HR) image contains more pixels than a low-resolution image...
12 December 2018 9,846 1 View
Number of diagnostics methods of malaria utilize biochemical testing (parasitic lactate dehydrogenase LDH), Fluorometrix method (Fluorochrome Hoechst 33458-AND of Plasmodium falciparum), or...
12 December 2018 5,885 0 View
There are many methods that can be used to compute the geographic similarity between regions represented through areas in a two dimensional space. Rough set theory in mathematics is a method to...
11 November 2018 6,171 0 View
The efficiency of solar cells can be increased by reducing the reflection of solar light from Lighted surface. Surface composition is an effective method.To enhance the absorption of light through...
11 November 2018 281 0 View
The noise phenomena could reduce the signal quality and the elimination of these phenomena becomes more necessary to suppress and enhance receiver signal quality in many applications. The noise...
11 November 2018 9,688 1 View
The signature verification commonly utilize the Hidden Markov Models. What are the essential elements in identifying critical features uniquely defining a signature. Papers: Madasu Vamsi K,...
10 October 2018 6,614 1 View
Scenarios are designed in support of decision-making to gain a clear comprehension of the potential impact of the decisions taken. Scenario-based simulations are essential to prepare...
10 October 2018 2,883 0 View
Blind equalization algorithms such as Constant Modulus Algorithm (CMA) are used to compensate for signal distortion attributed to Intersymbol Interference (ISI) without resorting to training...
10 October 2018 7,166 0 View
The low power is important in electronics industry especially in Very Large Scale Integration (VLSI) field. The multiplier utilize multiplication process with 70nm Complementary Metal Oxide...
10 October 2018 1,548 2 View
Digital Watermarking is the process of providing authenticity by hiding data into images or audio or documents. Audio watermarking is one form of implementation of watermarking techniques that are...
10 October 2018 9,658 0 View
Cockroach swarm optimization algorithm (CSO) was inspired by the emergent social behavior of cockroaches which include chase-swarming, dispersing, hunger and ruthlessness etc. Swarm intelligence...
10 October 2018 3,372 0 View
Algorithms and programming is a fundamental courses in computer science and engineering.
10 October 2018 4,946 0 View
The application of ultrasonic sensors has increased dynamically over recent years. They are commonly used in chemical, petroleum, fertilizer, food, dyes, light industry and scientific research in...
10 October 2018 4,966 0 View
The cloud has become an essential component of our activities, serving our storage needs in most cases], but also allowing us to perform computations outside our limited computing...
10 October 2018 4,436 0 View
Effective methods to conduct a post natural disaster flooding detectors employs number of computational and image processing techniques. Papers: Koustav Rudra, Siddhartha Banerjee, Niloy...
10 October 2018 9,708 0 View
System stability conditions are affected by operating patterns and load patterns. Because interference can cause stability to become a major problem on the generator side, stability appears in...
10 October 2018 6,566 1 View
The issue of agriculture is an important topic in particular in developing countries, this is because it will be influential in improving the quality of human resources and is also a means to...
10 October 2018 1,101 3 View
Traditional data hiding techniques generally utilize irreversible distortion in the cover media which cannot be recovered after secret data extraction. Data hiding techniques can be applied to...
09 September 2018 8,576 0 View
Adaptive prediction is the application in which a model for the future (forward) or previous (backward) value of the filter input sequence is estimated using forward or backward predictors...
09 September 2018 6,573 0 View
The early diagnosis of malignant tumors, however, can be quite difficult as it can be difficult for doctors to distinguish benign from malignant tumors. Despite the difficulty of diagnosing...
09 September 2018 4,111 0 View
Wardriving is the act of searching for Wi-Fi wireless networks by a person usually in a moving vehicle, using a laptop or smartphone. Typical source of wireless network data is Wireless Geographic...
09 September 2018 6,212 2 View
The initial purpose of Internet was to connect and share information all across the globe freely to any one at any time and anywhere.
09 September 2018 4,874 3 View
In the digital age, computers and smartphones become ubiquitous instruments. Many researcher attempt to develop game which can be played on either computers and smartphones. Papers: Chen, Hong...
09 September 2018 4,080 1 View
The problem of electroencephalography (EEG) source localization using beamforming techniques is reported in number of studies. Some suggest a reduced-rank extension of the multi-source activity...
09 September 2018 1,478 0 View
Given the ever increasing number of different Journals and Conference events, one may notice that there are authors whose citation are solicited by colleagues as a favor for citations in return....
09 September 2018 5,419 1 View
Digital transformation has ensured that cybersecurity is one of the biggest issues currently facing CIOs. In the future, cybersecurity is only going to become more of a priority as the business...
09 September 2018 3,971 1 View
The Latin squares are combinatorial constructions that support communication through their use in frequency hopping designs, error correcting codes and encryption algorithms. They are quite...
08 August 2018 6,706 1 View
The Cyber-Physical Systems (CPS) and Internet-of-Things (IoT) have become essential technology in our daily life. The cyber-physical systems and internet-of-things are in principle connection...
08 August 2018 9,287 2 View
Fuzzy systems and data mining are now an essential part of information technology and data management, with applications affecting every imaginable aspect of our daily lives. Source: Book -...
08 August 2018 4,686 3 View
Cyber Security Education and Training has become essential to make sure that new generation of engineers, scientists, practioners and experts in the field of cybersecurity get best training...
08 August 2018 3,781 1 View
The Wireless Sensor Network (WSN) consists of many sensor nodes equipped with communication system enabling them to mutually communicate via base-station (BS). Sensors perform sensing across a...
08 August 2018 5,164 3 View
Heart rate monitoring and estimation is essential parameter in biomedical engineering and medicine. The heartbeat rate change would affect directly to the physiological/ pathological state (mood,...
08 August 2018 3,975 3 View
Recent experiments showed application of statistical methods to detect shift in in-home activities routine. These methods considered each type of house activity at initial time normally...
08 August 2018 9,151 2 View
The treatment of pectus carinatum (PC) has classically been operative, though compressive orthotic braces have been used with good success in recent years. Compressive orthotic bracing is a...
08 August 2018 6,774 1 View
Millimeter-wave communication system is expected to overcome the global bandwidth shortage because it has a larger bandwidth allocation, which can be translated to provide data transfer rates...
08 August 2018 2,157 3 View
By doing away with a central authority in internet of things (IoT) networks, blockchain technology can reduce the risk of IoT devices being compromised by a single point of security failure. At...
08 August 2018 5,757 3 View
Given the current advances in Green IoT and Sensor Technologies, the practical applications in farming and agriculture are more common.
08 August 2018 1,474 3 View
The artificial neuron (also called the processing element, node) memes the characteristics of the biological neuron, which processes a local memory and carries localized information. An...
07 July 2018 7,329 0 View
In deep learning, activation function enables a deep neural model to learn, understand and perform complicated task by introduce non-linearity properties into the network. Activation functions...
07 July 2018 5,061 3 View
Use of electroencephalogram in the field of Brain computer interface (BCI) has acquired relevance with varied application in medicine, psychology and neuroscience, psychiatric studies to...
07 July 2018 706 1 View
These false positives may confuse the users when analyzing the output of automated system in lung nodules detection. The false positives in lung nodules detection normally exist because blood...
07 July 2018 6,214 0 View
The cancer detection requires integrated precise feature extraction assessed by trained artificial neural network(ANN), in conjunction with the k nearest neighbor method to detect and properly...
07 July 2018 7,903 2 View
Ant colony optimization (ACO) was first proposed by Dorigo et al. as a multi-agent approach applied to the classical traveling sales man problem (TSP) [Dorigo M., Maniezzo V. and Colorni A....
07 July 2018 7,400 1 View
The WSNs are implemented across diverse geographical areas to sense and process real time data. The sensor nodes communicate and transmit the collected data over an insecure channels and are...
07 July 2018 5,571 2 View
Assessing a student’s learning progress is subject to individual learning methodology and student's particular learning aptitudes, as well as, the learning environment, which may be personally in...
07 July 2018 2,810 1 View
The combined theory of developing unbreakable codes includes complex mathematical and computational methods in conjunction with AI.
07 July 2018 9,510 7 View
The implementation of Software and Hardware Cyber Security Mechanisms ads to computational complexity which ultimately impact the Quality of Service Provision Computer Networks Infrastructures/
07 July 2018 5,739 0 View
Given current dynamic advancements in new materials, biotechnology, computing and IoT fields, we may be not far from medically available intrusive IoT & Smart Implant Infrastructures, that may...
07 July 2018 9,372 2 View
Mobile internet protocol (MIP) is a client based mobility management protocol, and it is used to provide continuous internet service for the user.
06 June 2018 9,567 1 View
Given Facebook Case, it seems that Privacy has become the subject of discussion at many different levels. However, the major Government Security Agencies regardless in which country, are concern...
06 June 2018 7,988 8 View
The image quality assessment is categorized into full reference (FR), reduced reference (RR), and No-reference (NR). In FR method, the reference image needs to available to be compared to...
06 June 2018 8,953 1 View
The Social Media have become essential and important in the world today. Yet, the Facebook Case brought forward issues related to User's Privacy. Given the sophistication level of Cyber Threads...
06 June 2018 7,740 1 View
With the recent advances in radar technology, along with complex operational environments and development in electronic countermeasure (ECM) technologies, a radar engineer needs to design newer...
06 June 2018 2,160 0 View
Technology since Industrial Revolution have made significant contributions to Humanity and at the same time to Environment.
06 June 2018 1,207 2 View
The Transportation Smart Capabilities will employ advanced functionalities driven by AI and Computation, with capabilities to minimize traffic congestion and to increase Human Safety. The weakest...
06 June 2018 3,310 2 View
The current dynamic advancements in AI, Computation and Connectivity, creates a platform for Smart Computing. However, how smart truly it is may be subject to debate from technological, business...
06 June 2018 6,242 1 View
Visually impaired is a person who suffers from blind which can be caused by accident or congenital. The visually impaired is divided into two condition, totally blind and low vision. Researchers...
06 June 2018 2,007 0 View
Digital transformation is the profound transformation of business and organizational activities, processes, competencies and models to fully leverage the changes and opportunities of a mix of...
06 June 2018 2,035 3 View
Computer Networks Technologies are evolving dynamically incorporating more complex hardware and software to make sure that ever increasing demand for services is provided in real time 24/7.
06 June 2018 324 0 View
Old people without any prior exposure to computing, may find the Cutting Edge Smart Computational Devices quite challenging to use effectively. Having experience working with elderly people, it...
06 June 2018 7,653 0 View
Technology development are often gradual in step while enhancing the previous versions with specific features and functionalities It seems that concept of Smart is often used to represent the...
06 June 2018 2,639 2 View
Message Queuing Telemetry Transport (MQTP) or Pub-Sub Protocol enables resource constrained devices to send or publish information, known as the payload.
06 June 2018 4,116 3 View
Mountains Rescue Teams are often challenged by the weather phenomena, terrain, geography and most of all by time constraints to make sure that lost or injured person may be found and brought to...
06 June 2018 7,759 1 View
Having incorporated IoT infrastructure in transportation vehicles would provide support for control and communication between vehicle and driver's smartphone during vehicle malfunction. The...
06 June 2018 3,349 3 View
The IoT affects has huge impact on our daily life. The main objectives of IoT paradigm is to transfer people's "passive-surrounding" to "active surrounding", adopted from the ITU-T IoT Reference...
06 June 2018 4,159 2 View
The MIMO employed extensively in the current wireless network which illustrates the high throughput and bandwidth effectiveness. In the OFDMA and MIMO techniques, the significant function...
06 June 2018 1,360 3 View
The higher education is important for social and economic impacts in society. The general mission of higher education institution is to produce student graduation who will be a professional...
05 May 2018 4,071 3 View
Imagine having a car that will not start if a drive may be under influence of drugs or alcohol, as well as a being accidents and collision free .
05 May 2018 636 3 View
In number of cases in collaboration via Internet the Cryptanalysts were able to break the most complex encrypted codes. Similar in case of Block Chain, there are honest ethical Miners that follow...
05 May 2018 1,052 0 View
The environment pollution and climate change has enormous impact on local agriculture, healthy food production, bio system and human health.
05 May 2018 8,995 2 View
Transition from High School to University level studies in Math, Sciences and Engineering, is often quite challenging for many students, due to Calculus and Linear Algebra Abstract Concepts and...
05 May 2018 5,077 4 View
Vanadium dioxide is metal-insulator transition (MIT) operating at temperature near 68°C with a unique sharp resistivity change reaching ratios in the order of 105 over 0.1 °C.
05 May 2018 9,577 0 View
The 2nd World War was most damaging to Human race as all Wars are. Naively perhaps, but one may hope that global community of scholars, businessmen and politicians may find the methodology to...
05 May 2018 9,753 5 View
In the near future we may see the Light Invisible Wearable Cloth Embedded Smart Computational Devices available commercially. This will transform the way we this of computing today dramatically.
05 May 2018 10,015 0 View
Cancer starts to occur with the disorderly change of healthy cells, which forms a mass known as a tumor. A tumor is of two types, Benign and Malignant. Malignant meaning that the tumor can grow...
05 May 2018 6,339 3 View
A reliable power network in a liquefied natural gas (LNG) plant is vital in ensuring continuous production of LNG without interruption. The transformers are one of the most important electrical...
05 May 2018 1,625 2 View
The goal of fog computing is to create a complement to the cloud computing by moving the physical resources to the edge of the network to provide computing and storage services and to get rid of...
05 May 2018 10,035 4 View
The Internet of Vehicle (IoV) as integrated part of Vehicle Ad hoc Network (VANET) connecting many heterogeneous vehicle sensors. Cloud computing is used to process and store the big data of IoV....
05 May 2018 6,177 5 View
There is number of new programming languages developed for multi-core multiprocessor computer hardware and parallel processing. Given already existing excellent resources such as: 1) Code Academy:...
05 May 2018 4,211 1 View
In principal the IoT basic components are energy dependent and subject to possible malfunction in case of loss of energy. There are number of proposals to create the IoT Energy Greed that would...
05 May 2018 675 2 View
The Software Defined Network SDN was designed to solve the challenges of the traditional networks by separating the architecture into two planes: data and control. Integrating the SDN concept with...
05 May 2018 4,927 1 View
The Green IoT offers excellent platform to support Industrial Automation using Humanoid Robotics in Cyber Physical Systems and Critical Infrastructures.
05 May 2018 5,359 2 View
The quantum computing provides enormous computational power, that may be used to model global climate change, pollution distribution worldwide, disease bacteria and similar non-linear dynamic systems.
04 April 2018 2,228 0 View
The Lorentz-based Magnetometers are becoming essential part of Inertial Measurement Unit (IMU), which are used for navigation, alignment, and height detection, and so on. In modern applications,...
04 April 2018 5,651 0 View
Biostatistics is the application of statistics to a wide range of topics in biology.
04 April 2018 8,222 1 View
The futuristic Robotics is in its fast paste evolution, parallel with the AI, Bio Informatics and Mecatronics. getting closer to Human like Machine with its capabilities to reason and emotional...
04 April 2018 3,800 2 View
Bioinformatics is both an umbrella term for the body of biological studies that use computer programming as part of their methodology, as well as a reference to specific analysis "pipelines" that...
04 April 2018 6,126 3 View
The University World Ranking is for most academic institution worldwide a matter of prestige, recognintion and highest academic and research standards.
04 April 2018 1,972 0 View
The genius and or bright minds may be born in most unexpected places. With access to education and proper training they may become masters of the most challenging subjects and become future genius...
04 April 2018 9,813 6 View
Financial Institution operates often in remote ares that may be unsafe and require reliable security infrastructures.
04 April 2018 5,661 3 View
The Internet Architecture is changing dynamically with growing concerns for Cybersecurity, Privacy, QoS and its Reliability.
03 March 2018 6,374 2 View
1) Cybernetics is a theory of control systems based on communication (transfer of information) between systems and environment and within the system, and control (feedback) of the system's...
03 March 2018 5,426 1 View
In Transport and Critical Cyber Infrastructures the image quality assessment and image high quality reconstruction with lowest computational cost are essential for Smart Security.
03 March 2018 4,627 2 View
The Riemann problem remains to be most important problem in Mathematics with endless applications that could have great impact the Science of Crypto-Analysis and Cryptography.
03 March 2018 8,861 1 View
The Data Mining is commonly usded technique to analyze large amount of data and to determine the relation among different and large datasets.
03 March 2018 3,922 4 View
The common classification information of information is represented in three categories: white with completely certain information, grey with insufficient information, and black with totally...
03 March 2018 3,029 2 View
The PartSIM Simulator is available free online: https://www.partsim.com/simulator
03 March 2018 724 0 View
Security Analytics provide visibility tools to see the network traffic patterns, devices connectivity in support of identifying the maliciuos activities and triggering the alarm flag to solve it.
03 March 2018 3,200 0 View
Given the Internet initial mission to connect and share resources globally, the Cyber Security Measures on global scale should to some extend reflect the measures set by each individual nation,...
03 March 2018 5,740 4 View
Given fast dynamic development of the market economy today, the amount of construction cost data being produced in the bill-of-quantities-based valuation process increases dynamically.
03 March 2018 4,266 1 View
The software porogramming skills are essential for the future Computing and IT Industry.
03 March 2018 9,404 1 View
Smart Wireless sensor network(WSN) are integral part the IoT network of sensor networks.
03 March 2018 5,824 3 View
The current trends in E-U-Commerce drive large business to study their clients profiles and aptitudes, to secure large sales and acceptance of offered services. Traditional questionnaires or...
03 March 2018 1,823 3 View
Human factor in cybersecurity is very complex, duynamic and manifest nonlinear patters that may be assessd statistatically via data mining using AI & Deep Learning.
03 March 2018 3,585 1 View
Given the current dynamic developments the future Robotic Work Force is not fantasy but technology round the corner capable of replacing Human Labor, while capable of decision making controlled by...
03 March 2018 3,922 3 View
In support of applied reasearch the industry and business collaboration is often source of opportunities side-by-side with academic excellence.
03 March 2018 2,872 11 View
Traditionally, well established and strong academic and research teams from UK and past Western Europe, the past Easter European countries find quite challenging to team up with the UK and past...
03 March 2018 4,899 1 View
Both, EU and UK worked intensively for many years to establish close collaborative links in academia and research.
03 March 2018 9,434 17 View
Universities all over the world are looking for ways to improve their research and academic performance ranking, as well as to build recognition at national and international level.
03 March 2018 7,779 6 View
Data Centers and Cloud Computing are today essential to most of the business and industry worldwide. Given it complexity and heterogeneous nature the issue of trust and privacy remain to be a...
03 March 2018 2,495 4 View
Minimum level of Peak Signal to Noise Ratio (PSNR) is essential for highest quality video reconstruction.
03 March 2018 7,528 2 View
Application of computing in support of heart disease diagnosisi and treatment is well developed.
03 March 2018 4,933 0 View
Both, successful PhD completion, followed by the postdoctoral research are excellent foundation for research and academic careers.
03 March 2018 1,765 7 View
The AI offers promise of machine intelligenge able to inteact with the Mind of Humans. Yet. AI, is fundamentally artificial and Human Mind is alive.
03 March 2018 699 1 View
The Convolutional Neural Networks (CNN) is a deep learning method enhances the Network Intrusion Detection System (NIDS) capability to detect the class of normal and abnormal data.
03 March 2018 1,783 2 View
Smart Computational devices and Ubiquitous Connectivity require high bandwidth, which drives Telecommunications Industry to innovate.
03 March 2018 1,931 1 View
Shadow IT is a integrated part of Global 2000 company infrastructure today. The cloud presents a tremendous opportunity to make your users more agile and collaborative, giving your company a...
03 March 2018 6,475 2 View
To implement truly Smart Transportation in large cities is very complex and challenging due to exisiting infrastructures and often lack of resource necessary to rebuild and add-on.
03 March 2018 5,181 3 View
The IoT Enabled ECG Signal Quality Assessment is becoming integral part in the Medical field.
03 March 2018 2,453 2 View
While dealing with the images composed of pixels, the gray level transformation is a significant part of image enhancement techniques. What is the computational cost of its implementation in Matlab?
02 February 2018 2,989 2 View
Swarm intelligence (SI) techniques are population based algorithms that are inspired by the social behavior of animal.
02 February 2018 6,763 2 View
The Unified Modeling Language (UML) is well adopted for modeling different applications with great complexity.
02 February 2018 2,535 3 View
The EEG is fundamentally recording of brain electrical activities, collected along the surface of head by scalp and medical sensors.
02 February 2018 4,657 0 View
To model Bluetooth Devices Connectivity Using 802.15 PAN IRDA Infrared Millimeter Waves Range from 2.4 GHZ to 6 GHZ, is complex simulation? What are the best modeling tools available today?
02 February 2018 451 1 View
The IoT is at the beginning of new ear of applications that will provide a base connectivity and computational platform for the Smart World today and tomorrow.
02 February 2018 7,643 5 View
The security communication infrastructure in Industry 4.0 is very complex connecting different CPS with the IoTs.
02 February 2018 265 4 View
The IoT systems are fundamentally micro-electronic devices, operating at very high frequency, high speed with minimum transmission noise, applied in wireless communication, real-time analysis,...
02 February 2018 2,019 0 View
The General-purpose Petri net Simulator (GPenSIM) is quit effective.
02 February 2018 1,995 0 View
The field of image processing is very effective and high performance quantitative method in science and engineering, in particular the Image recognition in the area of computer vision.
02 February 2018 848 6 View
A capsule is collection of multiple neurons in a hidden layer of a neural network, which uses intensity vector and pose matrix to identify feature and orientation of an object in an image...
02 February 2018 7,179 1 View
Medical research in brain tumor treatment use K-nearest neighbor, probabilistic neural network, EEG, Q-factor wavelet transform & principal component analysis. What particular application use...
02 February 2018 8,529 1 View
Attracting talented and capable graduate research students is a challenge for many graduate schools worldwide.
02 February 2018 880 5 View
Samsung R&D developed effective methods and tools for the simulation of semiconductor heterostructure device.
02 February 2018 3,899 1 View
The common application of Synthetic Aperture Radar Image Processing is the Automatic Target Recognition. How does it compare to the Quality of Optical Image Processing?
02 February 2018 9,878 1 View
Any successful business requires a highest Management Quality Culture and practices?
02 February 2018 1,234 3 View
The Cloud computing is well adopted technology and has become an integral part of Computing world. Cloud Systems Security is complex and remain to be a great challenge to secure huge amount of...
02 February 2018 5,632 3 View
The world of IoT and Cloud Computing is becoming foundation platform for data communication, processing and storage.
02 February 2018 9,528 0 View
https://en.wikipedia.org/wiki/Habilitation The habilitation is thus a qualification at a higher level than the German doctoral degree awarded during Promotion. ... Once the habilitation thesis...
02 February 2018 3,149 3 View
The protocol function in asynchronous manner, while not requiring synchronous packets transmission between interconnected nodes. What are its performance metrics?
02 February 2018 9,282 2 View
The air, water, rail and road transportation are essential for successful and sustainable growth for every nation.
02 February 2018 3,883 3 View
Clustered Linear Separator Analytic (CLSA) is an enhanced version of Super Vector machine (SVM) and Linear Discriminant Analysis (LDA), conducting binary and multi-class classification.
02 February 2018 7,160 1 View
Smart Transportation, IoT and Vehicular Sensors Networks create a platform for smart vehicle collaboration systems, as well as, facilitate vehicles to collect and share data.
02 February 2018 1,842 2 View
Wireless sensor networks are integrated part of the Internet of Things, utilizing sensors powered by batteries. The higher computation volume requires more energy. The energy provision is...
02 February 2018 3,322 3 View
Robotics and autonomous vehicles can play an important role in today’s world contingency planning and provision of various services during natural disasters and other emergency events.
02 February 2018 1,459 2 View
Botnets are some of the most serious threats to Internet security?
02 February 2018 6,267 3 View
Electric Vehicles are generally classified as Hybrid, Plug-in Hybrid Electric and Battery Electric vehicles.
02 February 2018 2,779 1 View
There are number of well studied mathematical and computational techniques used in the crypto analysis of public-key crypto systems? Which are the most effective?
01 January 2018 7,414 2 View
The vision for future Humanoid Smart Nano Robotics Devices capable of interacting with humans in ubiquitous and pervasive manner is most challenging and somewhat exciting at the same time. What...
01 January 2018 2,398 2 View
The applied mathematics is essential tool in computer science and engineering. What is the best methodology to teach applied mathematics in computer science and engineering?
01 January 2018 8,892 17 View
The Anaglyphs are used effectively to help students to visualize functions of multi-variables in Calculus and Linear Algebra. What are the other effective tools for visualization in Applied...
01 January 2018 9,894 4 View
The field of Computing has rich history of genius, innovation and cutting-edge technologies. What are the greatest scholastic works in the field of Computer Science and Engineering today and what...
01 January 2018 4,068 3 View
What progress was made in the field of Humanoid Robotics and what are the future research directions in bridging the AI & Robotics?
01 January 2018 636 5 View
Excellent academics are often considered to be an excellent educators and teachers, while excellent researchers are considered to be people generating new innovative research ideas and seek...
01 January 2018 6,256 27 View
In Europe, Informatics is often considered similar to Computer Science in America. Applied Informatics, often utilize fundamental concept of Computer Engineering and Science. What is the...
01 January 2018 5,556 2 View
Most common argument for non-innovative and non-generating of cutting edge research is money. This may seem to some as an easy excuse or as mission impossible. However, there are many ways of...
01 January 2018 9,511 4 View
Trust calculation and assignment of a trust score for the nodes in IoT Networks is complex and requires a proper methodology? How to calculate the trust score for nodes utilizing valuation by the...
01 January 2018 5,604 2 View
History presented us with many outstanding scholars, while in more recent times there are many researchers and academics. What are the assessment metrics and definition today of a scholar, an...
01 January 2018 2,327 2 View
In light of fast progress in Exploration of the Universe, what are the future research direction in Space Inter Galactic Computing?
01 January 2018 4,208 0 View
In light of recent tragedies caused by nature and weather which are both quite unpredictable nature and weather phenomena, how could Computing help Humanity to predict and to some degree prevent...
01 January 2018 3,732 5 View
Is technology, business or industry brand name of successful technology establishments today, more important that innovation, genius and exploration?
01 January 2018 7,325 3 View
There are many career choices for new PhD graduates. Which career is the best for today's PhD graduates in the field of Computer Science and Engineering?
01 January 2018 4,254 2 View
Computer Science & Engineering Curriculum has been continually evolving and adapting to new cutting-edge technologies and Ubiquitous Access to Internet.
01 January 2018 8,989 2 View
Will future Ubiquitous access to Internet rich and sustain 7/4, 100% availability worldwide?
01 January 2018 2,334 3 View
The fiftieth TOP500 list of the fastest supercomputers in the world has China overtaking the US in the total number of ranked systems by a margin of 202 to 143. It is the largest number of...
01 January 2018 3,937 2 View
During my work in Korea, my Korean colleagues often mention that the Hangugo language structure is somehow related to computer hardware-software systems organization. Apparently, the Hangugo...
01 January 2018 6,633 1 View
What are the future research directions and challenges in Green IoT and Critical Cyber Infrastructures?
01 January 2018 5,720 3 View
What are the current and future challenges in the field of Software Defined Networks in the process of their integration with Global Mobile and Wireless Networks?
12 December 2017 7,055 3 View
It appears that the Engineering, Computing and IT degrees today are somewhat perceived and considered more difficult, and even less attractive because of the rigorous studies of Mathematics,...
11 November 2017 6,925 3 View
Most of the great ideas in philosophy, math, science and engineering were done with simple pen and pencil. Great thinkers such as, Pythagoras of Samos Leonardo di ser Piero da Vinci, Newton,...
11 November 2017 8,039 3 View
The proper Cyber and Information Security provision is very complex and depends in principle on Hardware, Software, people and environment. Which of these constitute a weakest link and how to...
11 November 2017 1,325 6 View
There is a tradition saying that Mathematics is best medicine for human brain and it is recommended that every decision maker study mathematics .
11 November 2017 8,204 3 View
Currently ranked as the fastest supercomputer in the world, the Sunway TaihuLight supercomputer measures in at 125 petaFLOPS (theoretical peak)—five times as fast as the supercomputer in second...
11 November 2017 1,402 2 View
There are many very talented young researchers who have passion and drive to explore unknown frontiers of research, innovation and development of next generation of cutting edge computationally...
11 November 2017 491 2 View
Given current advancement in use of computing technologies in support of enhancing or restoring human capabilities, the Neuroscientists are calling for standardized ethical norms. What are these...
11 November 2017 9,759 1 View
The Airplane Anti-collision Systems should provide reliable real-time information to trigger alarm in case of unexpected obstacles close to the plane location. The flight most critical periods are...
11 November 2017 8,428 1 View
Given the physical properties of semiconductors, there are limits VLSI miniaturization. However, this may be a new beginning of discovering theories beyond the current VLSI miniaturization.
11 November 2017 1,521 1 View
Looking for the killer application that will make the net a business success? Will you be happy with it if you get it : http://www.meyergrp.com/exec_mgmt_4.html
11 November 2017 3,144 0 View
Humanity did, is and forever will question and seek answers to its "Raison D'etre" & "Cogito Ergo Sum", while expressing its dimensions in Philosophy, Arts, Creativity and Innovation. The...
11 November 2017 1,155 5 View
Both, the academic applied research and the industry applied research have been evolving side by side for many years. However, there still are number of differences with regards to their outcome...
11 November 2017 9,610 3 View
The bio-technologies today are becoming important part of the industry and science research development and innovation. In case of brain tumor or injuries, apart from surgical intervention, the...
11 November 2017 9,695 13 View
Given the dynamic development and progress in super-computing and bio-technologies, there is a hope that humanity will find thew way to solve critical issues related to world's pollution in...
11 November 2017 5,020 0 View
The ABAT Accreditation and ACM Computer Science Curriculum is systematically evolving and adapting to make sure that current and future Computer Science Graduates are well trained and qualified to...
11 November 2017 4,451 3 View
Modeling and analysis of the dynamic transient behavior of the pressurizer of pressurized nuclear water reactor is quite complex and computationally costly. The statistical estimation of reliable...
11 November 2017 1,171 0 View
The possible malfunction of Local Are Network as any academic institution, industry, business, government does have a negative impact on the organization. Considering a malfunction or complete...
11 November 2017 7,291 3 View
Given the the current state-of-the-art it appears that Cyber Security did not meet the industry and business expectations to secure the asset.The 2017's biggest cyber-incidents so far serve as a...
11 November 2017 9,846 2 View
Having a Robot at home may be considered today as having a machine that has no features to interact with pepole intellectually not emotionally. Given the current and future research and...
11 November 2017 1,070 2 View
The theory of quantum physics is a subject to lot discussions and observation. Some may see it as quite futuristic and yet practical, and some may see it as partially developed and still in need...
11 November 2017 4,482 15 View
Supercomputer architectures with thousands of processors working in parallel mode, are processing large amount of data at the same time. Given the supercomputers complexity and mesh nature of...
11 November 2017 536 1 View
Lot of research discussions and findings suggest that Human Factor in Cyber Security is a weakest link. Is there an effective research methodology and application of effective computational...
11 November 2017 2,294 3 View
Quiet often some very successful researchers in their own field of studies and disciplines may have developed very focused and productive research, as well as excellent research teams. However,...
11 November 2017 560 8 View
How to implement a branching time logic systems in software verification?
10 October 2017 7,748 0 View
How implement the proper choice of Operand or Operation in secure software?
10 October 2017 6,321 0 View
What are the Software Performance Metrics for Humanoid Robotics?
10 October 2017 3,533 0 View
How to assess satellite image detection utilizing composite principal nested spheres?
10 October 2017 1,291 0 View
How to model random set technique of image watermarking in Matlab?
10 October 2017 8,754 1 View
What are the performance metrics of Deep Neural Network in Biomedical image classification?
10 October 2017 2,218 5 View
How to implement biomedical image analysis with gated recurrent neural networks in Matlab?
10 October 2017 4,332 0 View
How to implement a Local Statistics Filter for Denoising of SAR Images?
10 October 2017 1,090 2 View
How to model Quantum inspired meta-heuristics for bi-level image thresholding?
10 October 2017 3,130 0 View
Given the geography, application and communication parameters, the accuracy of finding the end members in a hyper-spectral image for large satellite datasets is critical.
10 October 2017 9,063 0 View
How to model public key ciphers via NP-hard problem in Mathematica?
10 October 2017 2,762 0 View
What are the mathematics tools essential to create next unbreakable code?
10 October 2017 8,637 1 View
How to implement a Smart DNA BLAST (Basic Local Alignment Search Tool)?
10 October 2017 668 3 View
Would a Personal Digital Identification with DNA contribute to world without borders?
10 October 2017 8,902 2 View
What are the best statistical tools for critical performance data analysis of 5th generation wireless networks?
10 October 2017 3,799 0 View
What is a legal definition of Cyber War in free Internet?
10 October 2017 243 1 View
Will the Future Internet be secure enough and with free access for all?
10 October 2017 3,778 1 View
Will Future Smart Cyberspace directly interface with Human Brain?
10 October 2017 2,367 2 View
Could Computer Music help with the post-dramatic stress recovery?
10 October 2017 1,687 0 View
What are the security metrics for the Robotics Internet (Internet for connecting robots)?
10 October 2017 6,630 1 View
What are the data mining methodologies in computer security?
10 October 2017 9,858 1 View
What are future research directions in the field of Data Warehousing and Data Mining?
10 October 2017 5,343 4 View
How to simulate User-Adopted Interactions in Wireless Security?
10 October 2017 1,547 0 View
How to simulate a Real Time Insignificant Shadow Extraction from Nonlinear Dynamic Systems?
10 October 2017 6,572 0 View
How to simulate detection of collaborating sub-cluster with HABSIM?
10 October 2017 7,889 0 View
How to simulate Nonorthogonal Pulse Shapes for Multicarrier Communications with Xirrus Wi-Fi?
10 October 2017 2,751 0 View
To what extend my Human Brain Imagination Capabilities be simulated by the Future Supercomputer's AI Generated Virtual Reality?
10 October 2017 3,530 0 View
How to assess the Adaptive Learning Culture in Industrial Training?
10 October 2017 2,063 0 View
10 October 2017 2,833 0 View
How to implement gated recurrent neural networks on sequence modeling in Matlab?
10 October 2017 7,199 2 View
Are values of Ethics relevant in the Corporate World?
10 October 2017 8,212 17 View
How to implement k-Fault Tolerant Topology Control in Wireless Sensor Network?
10 October 2017 387 0 View
How validate the Decker’s survey instrument?
10 October 2017 8,190 0 View
How does the Research Gate promote its H index value (i.e., scholarly rigor and reputation), compare to other H index awarding institutions such as SCOPUS or Web of Science?
10 October 2017 9,638 3 View
What are the best methodologies in learning a foreign language?
10 October 2017 6,455 10 View
Often the teaching methodologies and technology may seems to be perfect, but this does not reflect in students having best learning experience nor achieving the best learning outcomes and...
10 October 2017 5,757 3 View
What are the assessment metrics of student's learning outcomes at prestigious high ranking academic institutions vs. other academic institutions?
10 October 2017 8,072 0 View
How to introduce a pro-active learning in academic institutions with long practice of non-active spoon-feeding learning style?
10 October 2017 5,070 2 View
How to compare student's learning experience in research vs teaching university?
10 October 2017 7,551 3 View
Will future Humanoid Robots be able to reason and embrace Humanity?
10 October 2017 5,137 5 View
What are the performance assessment metrics of Koch and Ullman Models in Image Processing?
10 October 2017 9,719 1 View
What are the computational cost metrics for machine learning algorithms for language speech recognition in smart phones?
10 October 2017 6,677 2 View
What are common Machine learning methodologies in analyze mobile privacy?
10 October 2017 7,686 0 View
What are the most effective visual teaching tools in teaching Initial-Value and Boundary-Value Problems?
10 October 2017 3,876 5 View
What visual tools are used to teach Linear Fractional Interpolation?
10 October 2017 9,996 0 View
What are the best teaching visual tools for Cryptographic algorithms?
10 October 2017 4,356 3 View
How does MATHCAD compare to MAPPLE in teaching Calculus and Linear Algebra?
10 October 2017 712 0 View
How does MATHCAD compare to MAPLE in teaching Calculus and Linear Algebra?
10 October 2017 759 1 View
Hot to create an Intellectual Debate and promote research scholarship at academic institutions where teaching and recruitment priority?
10 October 2017 3,169 5 View
How to promote a Faculty Mentor - Mentee program to improve research and teaching quality?
10 October 2017 612 4 View
What methodologies are most effective in teaching a Stoke Theorem?
10 October 2017 10,051 2 View
How useful are ancient languages for future AI?
10 October 2017 8,239 3 View
To what degree is the AI based Computer Linguistics comparable to Human Linguistics?
10 October 2017 10,090 3 View
What is the computational cost of implementing the AI decision making capabilities in Smart Phone?
10 October 2017 595 2 View
What are the future research direction in implementing computer security with artificial intelligence tools?
10 October 2017 7,101 0 View
What is the missing link between the AI and Humanoid Smart Computing Devices?
10 October 2017 9,345 6 View
How to cultivate a scholastic culture while building collaborative bridges with academic worldwide?
10 October 2017 2,290 0 View
Evidence shows that there is a missing link between Elementary and High School, and Universities, which is essential to educate future best minds in science, engineering, physics and math.
10 October 2017 8,520 6 View
How to implement the Alamouti Space Time Coded Design for OFDMA Systems?
10 October 2017 1,939 1 View
How to detect privacy policy violation in Android application code?
10 October 2017 5,430 1 View
What is the Professional Code of Conduct for Ethical Hackers?
10 October 2017 9,374 0 View
How to implement the Reed-Muller codes in Maple?
10 October 2017 6,731 2 View
How to implement optical orthogonal codes with unequal auto and cross-correlation constraints in Matlab?
10 October 2017 9,676 0 View
What is computational cost of Multi-code Key Encryption in Optical Code Division Multiple Access Physical Layer?
10 October 2017 2,518 0 View
How to Benchmark a Computational Cost of Code Convolution Algorithms?
10 October 2017 6,339 2 View
How to visualize a Structural Similarity (SSIM) Index?
10 October 2017 3,154 0 View
How the computation cost of modeling Pure Pixel Identification Algorithm compares to modeling the Pure Pixel Index Algorithm in Matlab?
10 October 2017 9,682 1 View
How to compare predictability versus adaptability in academic research?
10 October 2017 2,487 2 View
How to implement a Bush-type Hadamard matrix in Matlab?
10 October 2017 2,446 0 View
What are the Security KPI for access control matrix model?
10 October 2017 8,186 0 View
What is a computational cost of of Singular Matrix Key on Hill Cipher?
10 October 2017 6,722 0 View
How does economics influence security and privacy?
10 October 2017 8,447 0 View
How to visualize a Complex Hybrid Color Space in Image Segmentation?
10 October 2017 4,403 5 View
How to create an adaptive and innovative culture in Academia?
10 October 2017 5,642 0 View
What are the assessment metrics of Agile Innovation?
10 October 2017 9,276 0 View
The are the assessment metrics for Constraints Drive Innovation?
10 October 2017 2,190 0 View
How to model a Peer-to-Peer Network Traffic Classification in OPNET?
10 October 2017 2,252 0 View
Apart from English, what foreign languages are recommended to future graduate students?
10 October 2017 8,947 3 View
How to compare the graduate courses quality taught in English language in non-English speaking countries vs English speaking countries?
10 October 2017 9,365 1 View
This video illustrates it well: Declining by Degrees: Higher Education at Risk: https://www.youtube.com/watch?v=BcxDVYo2wH8
10 October 2017 9,401 10 View
Will the Digital Transformation change the way we do business today?
10 October 2017 3,093 3 View
Are Ethical Principles well understood and applied in business and industry today?
10 October 2017 5,905 2 View
What are the assessment metrics of business efficiency versus business responsiveness?
10 October 2017 6,008 0 View
How to secure a Transportation Cloud Computing with minimum computational and communication cost?
10 October 2017 5,340 1 View
How to apply Most and Least Differentiating Priority Vectors in Decision making?
10 October 2017 4,568 0 View
What are the new research directions in the field of Computing?
10 October 2017 4,942 0 View
Each student seek, excellent teachers, role models, who can inspire and motivate them to master the subject in each classroom.This can make any academic institution anywhere in the world very...
10 October 2017 4,434 4 View
What are the best teaching methodologies and lab tools.
09 September 2017 7,543 0 View
How to attract students nation and worlwide?
09 September 2017 4,918 6 View
What methodologies are most suitable to build a secure Internet tomorrow?
09 September 2017 6,778 5 View
What IoT technology and what iPhone and Android tools.
09 September 2017 415 2 View
What are the future research subjects in the field of Computing?
04 April 2017 6,466 6 View
How to establish a security metrics in Software Defined Networks and Cloud Computing?
05 May 2016 1,744 4 View
How to mitigate cyber attacks in Industrial Networks?
08 August 2015 2,922 0 View
How to implement Security functions in spring MVC framework and Hibernate?
08 August 2015 2,389 5 View
Can we measure a cloud reliability?
04 April 2015 5,943 7 View
What software tools are applicable to Future Humanoid Robotics?
01 January 1970 7,494 0 View
What are the current challenges in the field of Software Robotics Engineering?
01 January 1970 3,597 2 View
How to implement high precision capturing of detailed facial features of people walking or running at public places?
01 January 1970 3,640 0 View
Security versus ubiquity.
01 January 1970 8,201 8 View
Research, Innovation, Development, Curricullum, Teaching Methodologies, Training Tools and Labs
01 January 1970 6,892 0 View
How to measure security and trust in anonymous communication?
01 January 1970 3,382 3 View
What are the best teaching practices in Computer Science PhD programs?
01 January 1970 9,243 0 View
What is best teaching methodology for Technology Based Distance Learning?
01 January 1970 3,963 2 View
What are the best educational practices in engineering education promoting philosophy and humanity ?
01 January 1970 6,364 11 View
Mobile Security
01 January 1970 3,240 4 View
What is the Business informatics paradigm next to Computer Science, Engineering, MIS and IT?
01 January 1970 7,008 0 View