Design and Implementation Web Site for UOT Using Mobile Devices [PDF]
A mobile phone allows its user to make and receive telephone calls to and from the public telephone network which includes other mobiles and fixed-line phones across the world.
Zahraa Abid AL-Huseen+3 more
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana+2 more
core +1 more source
Entanglement of macroscopic test masses and the Standard Quantum Limit in laser interferometry [PDF]
We show that the generation of entanglement of two heavily macroscopic mirrors with masses of up to several kilograms are feasible with state of the art techniques of high-precision laser interferometry.
Helge Müller-Ebhardt+9 more
core +2 more sources
INDEXES SELECTION FOR BLOCKS OF RELATED SQL QUERIES [PDF]
This paper discusses the problem of minimizing the response time for a given database workload by a proper choice of indexes. The main objective of our contribution is to illustrate the database queries as a group and search for good indexes for the ...
Radosław BOROŃSKI
doaj
This study follows the previous study entitled ‘Rough set-based rule generation and Apriori-based rule generation from table data sets: A survey and a combination’, and this is the second study on ‘Rough set-based rule generation and Apriori-based rule ...
Hiroshi Sakai, Zhiwen Jian
doaj +1 more source
Improving broadband displacement detection with quantum correlations [PDF]
Interferometers enable ultrasensitive measurement in a wide array of applications from gravitational wave searches to force microscopes. The role of quantum mechanics in the metrological limits of interferometers has a rich history, and a large number of
Cicak, K.+7 more
core +4 more sources
Easy-to-Use Cloud Computing for Teaching Data Science
One of the biggest hurdles of teaching data science and programming techniques to beginners is simply getting started with the technology. With multiple versions of the same coding language available (e.g., Python 2 and Python 3), various additional ...
Brian Kim, Graham Henke
doaj +1 more source
Consistently computing the K -> pi long distance weak transition
First we extract the long-distance (LD) weak matrix element from certain data and give compatible theoretical estimates. We also link this LD scale to the single-quark-line (SQL) transition scale and then test the latter SQL scale against the decuplet ...
Boglione J. M.+10 more
core +3 more sources
Conversion of conventional gravitational-wave interferometers into QND interferometers by modifying their input and/or output optics [PDF]
The LIGO-II gravitational-wave interferometers (ca. 2006--2008) are designed to have sensitivities at about the standard quantum limit (SQL) near 100 Hz. This paper describes and analyzes possible designs for subsequent, LIGO-III interferometers that can
A. Dorsel+47 more
core +3 more sources
Bridging the Semantic Gap with SQL Query Logs in Natural Language Interfaces to Databases
A critical challenge in constructing a natural language interface to database (NLIDB) is bridging the semantic gap between a natural language query (NLQ) and the underlying data. Two specific ways this challenge exhibits itself is through keyword mapping
Baik, Christopher+2 more
core +1 more source