We have various interesting time series data in our daily life, such as weather data (e.g., temperature and air pressure) and stock prices. Polyline chart is one of the most commo...
Computational simulation is an established method to gain insight into cellular processes. As the resulting data sets are usually large and complex, visualization can play a signi...
Andrea Unger, Enrico Gutzeit, Matthias Jeschke, He...
Examining the quality of a set of requirements is a sensible project health check given their role in the engineering of quality software systems. However, not all project stakeho...
This paper investigates on nine listed Companies in Shanghai and Shenzhen stock markets that have implemented the Open Market Repurchase (OMR) program. In this research, the event ...
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
SOSEMANUK is a word-oriented stream cipher submitted to the ECRYPT stream cipher project, with a variable-length key between 128 and 256 bits. The algorithm is similar to the strea...
: An adaptive threshold for early termination is proposed in this paper to enhance the cross octagonal search algorithm (COSA)[1]. In block motion estimation, search patterns have ...
—There have been several studies on using computer technologies to improve elections and these studies lead to widespread adoption of “direct recording electronic” (DRE) voti...