Results 31 to 40 of about 228,587 (259)

Design and Implementation Web Site for UOT Using Mobile Devices [PDF]

open access: yesEngineering and Technology Journal, 2011
A mobile phone allows its user to make and receive telephone calls to and from the public telephone network which includes other mobiles and fixed-line phones across the world.
Zahraa Abid AL-Huseen   +3 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Entanglement of macroscopic test masses and the Standard Quantum Limit in laser interferometry [PDF]

open access: yes, 2007
We show that the generation of entanglement of two heavily macroscopic mirrors with masses of up to several kilograms are feasible with state of the art techniques of high-precision laser interferometry.
Helge Müller-Ebhardt   +9 more
core   +2 more sources

INDEXES SELECTION FOR BLOCKS OF RELATED SQL QUERIES [PDF]

open access: yesApplied Computer Science, 2012
This paper discusses the problem of minimizing the response time for a given database workload by a proper choice of indexes. The main objective of our contribution is to illustrate the database queries as a group and search for good indexes for the ...
Radosław BOROŃSKI
doaj  

Rough set-based rule generation and Apriori-based rule generation from table data sets II: SQL-based environment for rule generation and decision support

open access: yesCAAI Transactions on Intelligence Technology, 2019
This study follows the previous study entitled ‘Rough set-based rule generation and Apriori-based rule generation from table data sets: A survey and a combination’, and this is the second study on ‘Rough set-based rule generation and Apriori-based rule ...
Hiroshi Sakai, Zhiwen Jian
doaj   +1 more source

Improving broadband displacement detection with quantum correlations [PDF]

open access: yes, 2017
Interferometers enable ultrasensitive measurement in a wide array of applications from gravitational wave searches to force microscopes. The role of quantum mechanics in the metrological limits of interferometers has a rich history, and a large number of
Cicak, K.   +7 more
core   +4 more sources

Easy-to-Use Cloud Computing for Teaching Data Science

open access: yesJournal of Statistics and Data Science Education, 2021
One of the biggest hurdles of teaching data science and programming techniques to beginners is simply getting started with the technology. With multiple versions of the same coding language available (e.g., Python 2 and Python 3), various additional ...
Brian Kim, Graham Henke
doaj   +1 more source

Consistently computing the K -> pi long distance weak transition

open access: yes, 2002
First we extract the long-distance (LD) weak matrix element from certain data and give compatible theoretical estimates. We also link this LD scale to the single-quark-line (SQL) transition scale and then test the latter SQL scale against the decuplet ...
Boglione J. M.   +10 more
core   +3 more sources

Conversion of conventional gravitational-wave interferometers into QND interferometers by modifying their input and/or output optics [PDF]

open access: yes, 2000
The LIGO-II gravitational-wave interferometers (ca. 2006--2008) are designed to have sensitivities at about the standard quantum limit (SQL) near 100 Hz. This paper describes and analyzes possible designs for subsequent, LIGO-III interferometers that can
A. Dorsel   +47 more
core   +3 more sources

Bridging the Semantic Gap with SQL Query Logs in Natural Language Interfaces to Databases

open access: yes, 2019
A critical challenge in constructing a natural language interface to database (NLIDB) is bridging the semantic gap between a natural language query (NLQ) and the underlying data. Two specific ways this challenge exhibits itself is through keyword mapping
Baik, Christopher   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy