—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
—Although the current E-Learning systems have many merits, many of them only treat advanced information technology as simple communication tools, and release some learning conten...
—Pose problem is a big challenge for applying face recognition technology under real world conditions. In this paper, appearance based approach was proposed to recognize face acr...
Hongzhou Zhang, Yongping Li, Lin Wang, Chengbo Wan...
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
— We present in this paper a generic methodology based on genetic automata for modelling community detection. With Communities, we deal with dynamic organizations which are self-...
—One problem of generating a model to recognize any string is how to generate one that is generalized enough to accept strings with similar patterns and, at the same time, is spe...
— This paper presents a detailed comparison between a conventional PI controller and a variable structure controller based on a fuzzy sliding mode strategy used for speed control...
- We proposed the cost effective (in sense of gate number) asynchronous two-level logic. It is based on AND-OR implementation of minimized logic functions. We formulated and proved...
- The manufacture of nitrocellulose, which is the basis of most artillery, tank, mortar and rocket propellant is intrinsically risky due to the energetic nature of the product and ...