Results 51 to 60 of about 1,098,399 (202)
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj +1 more source
A Dynamic Adverse Selection Multiagent Model with Off-Menu Actions [PDF]
In dynamic mechanism design literature, one critical aspect has been typically ignored-the agents' periodic participation, which they can adapt and plan strategically. We propose a framework for dynamic principal-multiagent problems, augmenting the classic model by incorporating agents' periodic coupled decisions on participation and regular action ...
arxiv
Automated secure systems development methodology [PDF]
D.Com. (Informatics)The complexity of modern computer-based information systems is such that, for all but the simplest of examples, they cannot be produced without a considerable amount of prior planning and preparation. The actual difficulties of trying
Booysen, Hester Aletta Susanna
core +1 more source
Heuristic Methods for Security Protocols
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security ...
Nizamani, Qurat ul Ain, Tuosto, Emilio
core +2 more sources
Liver‐specific knockout of N6‐methyladenosine (m6A) methyltransferase METTL3 significantly accelerated hepatic tumor initiation under various oncogenic challenges, contrary to the previously reported oncogenic role of METTL3 in liver cancer cell lines or xenograft models. Mechanistically, METTL3 deficiency reduced m6A deposition on Manf transcripts and
Bo Cui+15 more
wiley +1 more source
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN
Computer-empowered detection of possible faults for Heating, Ventilation and Air-Conditioning (HVAC) subsystems, e.g., chillers, is one of the most important applications in Artificial Intelligence (AI) integrated Internet of Things (IoT).
Ke Yan, Xiaokang Zhou
doaj
Clinical software development for the Web: lessons learned from the BOADICEA project
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P+2 more
doaj +1 more source
Trust models in ubiquitous computing
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect.
Krukow, Karl+2 more
core +1 more source
Sistem Pengenalan Plat Nomor Mobil Dengan Metode Principal Components Analysis [PDF]
The paper describes a vehicle plate recognition system based on computer vision technique. The vehicle image/video was taken from a digital camera and then the vehicle plate automatically identified, segmented and recognized by the system.
Gunadi, K. (Kartika)+2 more
core
Hardware-Enforced Integrity and Provenance for Distributed Code Deployments [PDF]
Deployed microservices must adhere to a multitude of application-level security requirements and regulatory constraints imposed by mutually distrusting application principals--software developers, cloud providers, and even data owners. Although these principals wish to enforce their individual security requirements, they do not currently have a common ...
arxiv