Haku
Aineistot 2111-2120 / 2136
Conductivity reconstruction from power density data in limited view
(Royal Danish Library, 2023)
In acousto-electric tomography, the objective is to extract information about the interior electrical conductivity in a physical body from knowledge of the interior power density data generated from prescribed boundary ...
Agent‐based time delay margin in consensus of multi‐agent systems by an event‐triggered control method : Concept and computation
(Wiley-Blackwell, 2023)
This paper deals with defining the concept of agent-based time delay margin and computing its value in multi-agent systems controlled by event-triggered based controllers. The agent-based time delay margin specifying the ...
Expert Drivers’ Prospective Thinking-Aloud to Enhance Automated Driving Technologies : Investigating Uncertainty and Anticipation in Traffic
(Elsevier BV, 2020)
Current automated driving technology cannot cope in numerous conditions that are basic daily driving situations for human drivers. Previous studies show that profound understanding of human drivers’ capability to interpret ...
Multi-resolution Statistical Shape Models for Multi-organ Shape Modelling
(Springer, 2020)
Statistical shape models (SSMs) are widely used in medical image segmentation. However, traditional SSM methods suffer from the High-Dimension-Low-Sample-Size (HDLSS) problem in modelling. In this work, we extend the ...
Semantic Portal as a Tool for Structural Reform of the Ukrainian Educational System
(Routledge; Commonwealth Secretariat, 2015)
Education is recognized as a fundamental enabler of human development. The adoption of information and communications technologies (ICTs) by education (especially in developing countries) contributes to educational system ...
Improving Password Memorability, While Not Inconveniencing the User
(Academic Press, 2019)
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors (e.g.,
password reuse). Therefore, new and innovative ...
Too many passwords? : How understanding our memory can increase password memorability
(Academic Press, 2018)
Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such ...
TB-Structure : Collective Intelligence for Exploratory Keyword Search
(Springer International Publishing, 2017)
In this paper we address an exploratory search challenge by presenting a new (structure-driven) collaborative filtering technique. The aim is to increase search effectiveness by predicting implicit seeker’s intents at an ...
From Deep Learning to Deep University : Cognitive Development of Intelligent Systems
(Springer, 2018)
Search is not only an instrument to find intended information. Ability to search is a basic cognitive skill helping people to explore the world. It is largely based on personal intuition and creativity. However, due to the ...
How Memory Anxiety Can Influence Password Security Behavior
(Elsevier, 2024)
Password reuse and modification are insecure password behaviors that are becoming increasingly prevalent as users are obliged to remember more passwords to access various digital services. Many users adopt these risky ...