Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
This paper presents rough sets generating prediction rules scheme for stock price movement. The scheme was able to extract knowledge in the form of rules from daily stock movement...
Hameed Al-Qaheri, Shariffah Zamoon, Aboul Ella Has...
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
Previous cognitive modelling work has suggested that the decline of short-term memory (STM) capacity is the dominant factor of age-related decline on recall ability. We report the...
Richard Ll. Smith, Peter C. R. Lane, Fernand Gobet
This paper presents investigations into the development of control schemes for end-point vibration suppression and input tracking of a flexible manipulator. A constrained planar s...