Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
Modular construction has the advantage of producing structures quickly and efficiently, while not requiring the resources to build a structure to be co-located with the constructi...
Osama M. Mohsen, Paul J. Knytl, Basel Abdulaal, Ja...
Tunnel construction are essentially infrastructure projects that includes many interfered and sophisticated tasks. This paper presents a decision support tool, Tunnel_Sim, for pla...
Although regarded as one of the most successful algorithm to identify predictive features, Relief is quite vulnerable to outliers and noisy features. The recently proposed I-Relief...
- In the design process of a reconfigurable accelerator employing in an embedded system, multitude parameters may result in remarkable complexity and a large design space. Design s...