Subjective data arrangement using clustering techniques for training expert systems Fulltext Access 15 Pages 2019
Continuous field based upper-bound analysis for the undrained bearing capacity of strip footings resting near clay slopes with linearly increased strength Fulltext Access 15 Pages 2019
Numerical study of interaction between a hydraulic fracture and a weak plane using the bonded-particle model based on moment tensors Fulltext Access 15 Pages 2019
Constrained energy minimization based upscaling for coupled flow and mechanics Fulltext Access 15 Pages 2019
Ultra-fast laser-patterning computation for advanced manufacturing of powdered materials exploiting knowledge-based heat-kernels Fulltext Access 15 Pages 2019
Sentiment analysis based on rhetorical structure theory:Learning deep neural networks from discourse trees Fulltext Access 15 Pages 2019
Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features Fulltext Access 15 Pages 2019
Semi-implicit integrations of perturbation equations for all-scale atmospheric dynamics Fulltext Access 15 Pages 2019
A novel recommendation approach based on chronological cohesive units in content consuming logs Fulltext Access 15 Pages 2019
A data analytic benchmarking methodology for discovering common causal structures that describe context-diverse heterogeneous groups Fulltext Access 15 Pages 2019
Machine learning approaches to understand the influence of urban environments on human's physiological response Fulltext Access 16 Pages 2019
Distributed event-triggered consensus for nonlinear multi-agent systems subject to cyber attacks Fulltext Access 16 Pages 2019
An exploratory study of the standard reuse practice in a medium sized software development firm Fulltext Access 16 Pages 2019
Cyberbullying in the university setting. Relationship with family environment and emotional intelligence Fulltext Access 16 Pages 2019
Numerical solution of the electron transport equation in the upper atmosphere Fulltext Access 16 Pages 2019
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems Fulltext Access 17 Pages 2019
A flexible transfer learning framework for Bayesian optimization with convergence guarantee Fulltext Access 17 Pages 2019
An advanced decision model enabling two-way initiative offloading in edge computing Fulltext Access 17 Pages 2019
Tensor decomposition processes for interpolation of diffusion magnetic resonance imaging Fulltext Access 17 Pages 2019
A complete expected improvement criterion for Gaussian process assisted highly constrained expensive optimization Fulltext Access 17 Pages 2019
Event-triggered distributed fusion estimation with random transmission delays Fulltext Access 17 Pages 2019
A non-intrusive reduced basis approach for parametrized heat transfer problems Fulltext Access 17 Pages 2019
Collaborative block compressed sensing reconstruction with dual-domain sparse representation Fulltext Access 17 Pages 2019
Efficient query-by-example spoken document retrieval combining phone multigram representation and dynamic time warping Fulltext Access 18 Pages 2019
An alternative updated Lagrangian formulation for finite particle method Fulltext Access 18 Pages 2019
Ultrasound image segmentation using a novel multi-scale Gaussian kernel fuzzy clustering and multi-scale vector field convolution Fulltext Access 18 Pages 2019
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection Fulltext Access 18 Pages 2019
A massively-parallel, unstructured overset method for mesh connectivity Fulltext Access 18 Pages 2019
Differentiating users by language and location estimation in sentiment analisys of informal text during major public events Fulltext Access 18 Pages 2019
Adaptive service function selection for Network Function Virtualization networking Fulltext Access 18 Pages 2019
Intelligent traffic light scheduling technique using calendar-based history information Fulltext Access 18 Pages 2019
Visual appearance or functional complementarity: Which aspect affects your decision making? Fulltext Access 19 Pages 2019
Quantitative measure of nonconvexity for black-box continuous functions Fulltext Access 19 Pages 2019
Mathematical modeling of delivery delay for multi-copy opportunistic networks with heterogeneous pairwise encounter rates Fulltext Access 19 Pages 2019
Emerging topic detection in twitter stream based on high utility pattern mining Fulltext Access 19 Pages 2019
Entropy solution at concave corners and ridges, and volume boundary layer tangential adaptivity Fulltext Access 19 Pages 2019
An approach for the secure management of hybrid cloud-edge environments Fulltext Access 19 Pages 2019
Local apparent and latent direction extraction for palmprint recognition Fulltext Access 20 Pages 2019
Multi-level spectral deferred corrections scheme for the shallow water equations on the rotating sphere Fulltext Access 20 Pages 2019
Multiple instance learning for histopathological breast cancer image classification Fulltext Access 20 Pages 2019
Edge-of-things computing framework for cost-effective provisioning of healthcare data Fulltext Access 20 Pages 2019
Balanced connected task allocations for multi-robot systems: An exact flow-based integer program and an approximate tree-based genetic algorithm Fulltext Access 20 Pages 2019
A novel and efficient data point neighborhood construction algorithm based on Apollonius circle Fulltext Access 21 Pages 2019
A text summarization method based on fuzzy rules and applicable to automated assessment Fulltext Access 21 Pages 2019
Reduced order model for simultaneous growth of multiple closely-spaced radial hydraulic fractures Fulltext Access 21 Pages 2019
Multi-goal motion planning using traveling salesman problem in belief space Fulltext Access 21 Pages 2019
A scalarization-based dominance evolutionary algorithm for many-objective optimization Fulltext Access 22 Pages 2019
Towards faster local search for minimum weight vertex cover on massive graphs Fulltext Access 22 Pages 2019
Key-policy attribute-based encryption against continual auxiliary input leakage Fulltext Access 23 Pages 2019
Intelligent web-phishing detection and protection scheme using integrated features of Images, frames and text Fulltext Access 23 Pages 2019
“I'd like to be under the sea”: Contextual cues in virtual environments influence the orientation of idea generation Fulltext Access 23 Pages 2019
The Pure Cold-Start Problem: A deep study about how to conquer first-time users in recommendations domains Fulltext Access 23 Pages 2019
Design and implementation of reconfigurable acceleration for in-memory distributed big data computing Fulltext Access 23 Pages 2019
Adaptive sliding mode fault-tolerant control for type-2 fuzzy systems with distributed delays Fulltext Access 24 Pages 2019
Examining Pareto optimality in analytic hierarchy process on real Data: An application in public transport service development Fulltext Access 24 Pages 2019
A deep learning approach for real-time detection of atrial fibrillation Fulltext Access 24 Pages 2019
Service oriented architecture maturity models: A systematic literature review Fulltext Access 25 Pages 2019
A fully implicit, conservative, non-linear, electromagnetic hybrid particle-ion/fluid-electron algorithm Fulltext Access 25 Pages 2019
Structure preserving schemes for the continuum Kuramoto model: Phase transitions Fulltext Access 25 Pages 2019
Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm Fulltext Access 25 Pages 2019
Isogeometric Analysis of the electrophysiology in the human heart: Numerical simulation of the bidomain equations on the atria Fulltext Access 25 Pages 2019
User behavior prediction via heterogeneous information preserving network embedding Fulltext Access 25 Pages 2019
A local pilot auxiliary key generation scheme for secure underwater acoustic communication Fulltext Access 25 Pages 2019
A numerical comparison of installation sequences of plain concrete rigid inclusions Fulltext Access 26 Pages 2019
A method for modelling operational risk with fuzzy cognitive maps and Bayesian belief networks Fulltext Access 26 Pages 2019
A stochastic asymptotic-preserving scheme for the bipolar semiconductor Boltzmann-Poisson system with random inputs and diffusive scalings Fulltext Access 26 Pages 2019
The use of Ordered Fuzzy Numbers for modelling changes in dynamic processes Fulltext Access 26 Pages 2019
An efficient method for two-fluid incompressible flows appropriate for the immersed boundary method Fulltext Access 26 Pages 2019
An intelligent regressive ensemble approach for predicting resource usage in cloud computing Fulltext Access 26 Pages 2019
Imposition of boundary conditions for elliptic equations in the context of non boundary fitted meshless methods Fulltext Access 26 Pages 2019
An efficient ensemble algorithm for numerical approximation of stochastic Stokes-Darcy equations Fulltext Access 27 Pages 2019
Investigating the impacts of regulatory focus and political skill within a social media context Fulltext Access 27 Pages 2019
Context-based prediction for road traffic state using trajectory pattern mining and recurrent convolutional neural networks Fulltext Access 27 Pages 2019
Combining Edge and Cloud computing for low-power, cost-effective metagenomics analysis Fulltext Access 27 Pages 2019
The relationship between cell phone use, physical activity, and sedentary behavior in adults aged 18-80 Fulltext Access 27 Pages 2019
Large-scale stochastic topology optimization using adaptive mesh refinement and coarsening through a two-level parallelization scheme Fulltext Access 27 Pages 2019
Multi-objective firefly algorithm based on compensation factor and elite learning Fulltext Access 27 Pages 2019
Recurrent convolutional neural network based multimodal disease risk prediction Fulltext Access 27 Pages 2019
Reverse engineering for the design patterns extraction of android mobile applications for attention deficit disorder Fulltext Access 28 Pages 2019
Security analysis and new models on the intelligent symmetric key encryption Fulltext Access 28 Pages 2019
Comprehensive link sharing avoidance and switch aggregation for software-defined data center networks Fulltext Access 28 Pages 2019
Constraint programming heuristics for configuring optimal products in multi product lines Fulltext Access 28 Pages 2019