Cyber Security Scenarios and Control for Small and Medium Enterprises [PDF]
As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business.
Nilaykumar Kiran SANGANI +1 more
doaj
Improved YOLOv3 Integrating SENet and Optimized GIoU Loss for Occluded Pedestrian Detection
Occluded pedestrian detection faces huge challenges. False positives and false negatives in crowd occlusion scenes will reduce the accuracy of occluded pedestrian detection.
Qiangbo Zhang +4 more
doaj +1 more source
A radio channel emulator for WCDMA, based on the hidden Markov model (HMM) [PDF]
One of the main development and research subjects within the telecommunications area activity is the 3G mobile systems standardisation. The radio access is, of course, the main trouble in mobile systems, so it is important to investigate its implication.
Díaz Romero, M. del Pilar +1 more
core +1 more source
Gradient Harmonized Single-stage Detector
Despite the great success of two-stage detectors, single-stage detector is still a more elegant and efficient way, yet suffers from the two well-known disharmonies during training, i.e.
Li, Buyu, Liu, Yu, Wang, Xiaogang
core +1 more source
Fuel subsidies versus market power : is there a countervailing second-best optimum? [PDF]
Fuel subsidies distort end-use prices below cost, resulting in overconsumption and huge environmental cost. On the other hand, the mark-up over cost due to the exercise of market power results in the social loss of consumer surplus. We open a new line of
Adetutu, Morakinyo O. +1 more
core +1 more source
Expectation-maximization alternating least squares for tensor network logistic regression
In recent years, a learning method for classifiers using tensor networks (TNs) has attracted attention. When constructing a classification function for high-dimensional data using a basis function model, a huge number of basis functions and coefficients ...
Naoya Yamauchi +3 more
doaj +1 more source
MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME [PDF]
The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion.
R. Shalin, D. Kesavaraja
doaj
Investigating design issues of context-aware mobile guides for people with visual impairments [PDF]
While mobile wayfinding systems for visually impaired people offer huge potential, most insufficiently address the differences between visual impairments and contextual environments, and offer very little context-awareness - usability issues of which are
Bradley, N.A., Dunlop, M.D.
core +1 more source
Theoretical and experimental study of AC loss in HTS single pancake coils
The electromagnetic properties of a pancake coil in AC regime as a function of the number of turns is studied theoretically and experimentally. Specifically, the AC loss, the coil critical current and the voltage signal are discussed.
Clem J R +13 more
core +1 more source
Brief Communication: Climatic, meteorological and topographical causes of the 16–17 June 2013 Kedarnath (India) natural disaster event [PDF]
The devastating flood episode (16–17 June 2013) at Kedarnath (Uttrakhand, India), caused a huge loss of lives and loss of physical/material wealth. To understand this catastrophic event, rainfall/convective data and associated climate meteorological ...
R. Singh +7 more
doaj +1 more source

