Using a specific machine learning technique, this paper proposes a way to identify suspicious statements during debugging. The technique is based on principles similar to Tarantul...
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
A central issue in bilingual research concerns the extent to which linguistic representations in the two languages are processed independently of each other. This paper reports th...
This study describes a process for digitizing 3D documentation with 3d laser scanner tools. The process of capturing 3D data is mainly for as-built environment in reconstruction an...
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...