In this article, a method is proposed for analysing the thermovision-based video data that characterize the dynamics of temperature anisotropy of the heart tissue in a spatial doma...
Vincentas Veikutis, Gintautas Dzemyda, Povilas Tre...
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
HIV-1-associated dementia (HAD) is the most devastating disease happened in the central nervous system of AIDS patients. Neuronal damage, the early indicator of HAD, under differe...
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpen...