Search results for "Computer science"
showing 10 items of 22367 documents
Artificial intelligence centric scientific research on COVID-19 : an analysis based on scientometrics data
2023
AbstractWith the spread of the deadly coronavirus disease throughout the geographies of the globe, expertise from every field has been sought to fight the impact of the virus. The use of Artificial Intelligence (AI), especially, has been the center of attention due to its capability to produce trustworthy results in a reasonable time. As a result, AI centric based research on coronavirus (or COVID-19) has been receiving growing attention from different domains ranging from medicine, virology, and psychiatry etc. We present this comprehensive study that closely monitors the impact of the pandemic on global research activities related exclusively to AI. In this article, we produce highly info…
The Car Resequencing Problem with Pull-Off Tables
2011
AbstractThe car sequencing problem determines sequences of different car models launched down a mixed- model assembly line. To avoid work overloads of workforce, car sequencing restricts the maximum occurrence of labor-intensive options, e.g., a sunroof, by applying sequencing rules. We consider this problem in a resequencing context, where a given number of buffers (denoted as pull-off tables) is available for rearranging a stirred sequence. The problem is formalized and suited solution procedures are developed. A lower bound and a dominance rule are introduced which both reduce the running time of our graph approach. Finally, a real-world resequencing setting is investigated.
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
2022
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…
Introduction to Mathematical Logic, Edition 2021
2021
Textbook for students in mathematical logic. First order languages. Axioms of constructive and classical logic. Proving formulas in propositional and predicate logic. Glivenko's theorem and constructive embedding. Axiom independence. Interpretations, models and completeness theorems. Normal forms. Tableaux and resolution methods. Herbrand's theorem. Sections 1, 2, 3 represent an extended translation of the corresponding chapters of the book: V. Detlovs, Elements of Mathematical Logic, Riga, University of Latvia, 1964, 252 pp. (in Latvian).
Electrical Safety Analysis in the Presence of Resonant Grounding Neutral
2019
The resonant grounding is one of the possible methods of the system neutral grounding for the medium voltage distribution. IEEE standards do define this grounding configuration, but important advantages and drawbacks of the resonant grounding might not be fully known, due to its rather uncommon application in North America. On the other hand, resonant grounding in Europe is imposed by the increased requirements for power quality, especially for medium-voltage (MV) industrial users, imposed to electric utilities by regulatory authorities, with the purpose to protect the interests of users and consumers. Level of the continuity of the service, magnitude and phase of ground-fault currents, mag…
Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling
2014
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …
The changing paradigm of document delivery : exploring researchers’ peer to peer practices
2016
Purpose By definition, interlibrary lending is a process involving two libraries. The digital revolution changed the method by which the scientific documents were disseminated during the past couple of decades. Nowadays, researchers can exploit several software applications that enable them to upload, save and deliver their documents from one peer to another without the need for a middle man. This paper reviews this change via a study conducted in two Finnish academic universities. The aim of this study was to determine the extent to which researchers have adopted these new possibilities for document dissemination and how this change will affect the role of the libraries in document delive…
Efficiency of COVID-19 Testing Centers in Iran: A Data Envelopment Analysis Approach
2022
AbstractObjective:The purpose of this study is to investigate the efficiency of the Iranian Red Crescent Society (IRCS) in managing their nonmonetary resources involved in coronavirus disease 2019 (COVID-19) response.Methods:For this purpose, the data envelopment analysis approach was used to measure the efficiency, considering the number of personnel and vehicles and screened passengers as the input and output parameters, respectively. It was examined the efficiency of 10 IRCS’s branches given 17 d of screening operation. For the analysis, the DEA SolverPro software 15a version was used.Results:The results show that only 1 branch had been fully efficient in using the resources, while 5 bra…
A Systematic Literature Review and Analysis of Mobile Retailing Adoption
2019
The purpose of this study is to provide a comprehensive updated review and analysis of mobile retailing adoption. Although research on mobile channel utilization has increased significantly in recent years and many new studies on this topic have been published, research has not yet provided a clear structure regarding how consumers’ expectations have advanced in relation to mobile retailing adoption. Thus, this study synthetizes the mobile retail adoption literature and develops a framework for it. Our systematic literature review analyzed 94 scientific articles that were published between 2010 and 2018 to determine customers’ different expectations and demands during different mobile chann…
Novel VAMPIRE algorithms for quantitative analysis of the retinal vasculature
2013
This paper summarizes three recent, novel algorithms developed within VAMPIRE, namely optic disc and macula detection, arteryvein classification, and enhancement of binary vessel masks, and their performance assessment. VAMPIRE is an international collaboration growing a suite of software tools to allow efficient quantification of morphological properties of the retinal vasculature in large collections of fundus camera images. VAMPIRE measurements are currently mostly used in biomarker research, i.e., investigating associations between the morphology of the retinal vasculature and a number of clinical and cognitive conditions.