- In this paper, a new scheme for the simulation of tactical communications systems is introduced where the mobility, call and availability patterns for the communications equipmen...
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Background: Microarray experiments measure changes in the expression of thousands of genes. The resulting lists of genes with changes in expression are then searched for biologica...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
One of the biggest challenges that higher learning institutions face today is to improve the quality of managerial decisions. The managerial decision making process becomes more co...
Naeimeh Delavari, Somnuk Phon-Amnuaisuk, M. Reza B...