Results (10)
Search Parameters:
Keyword: StringA Theory on How Strings Responds to Gravitation by Refraction in Curved Spacetime
General relativity and its modified theories are unable to account for quantum mechanics and cannot explain dark matter or the origin of the gravitation. This paper presents a theory that describes how Newtonian gravitation originates at the level of the particle, and how particles induce gravitation and respond to the source of gravitation. This paper…
Read MoreCIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing
In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…
Read MoreOn Mining Most Popular Packages
In this paper, we will discuss two algorithms to solve the so-called package design problem, by which a set of queries (referred to as a query log) is represented by a collection of bit strings with each indicating the favourite activities or items of customers. For such a query log, we are required to design…
Read MoreA Proposal of Code Modification Problem for Self-study of Web Client Programming Using JavaScript
In current societies, web application systems take central roles in computer systems. Thus, web client programming using JavaScript has increased values to add dynamic features and functions in web pages by well working with HTML and CSS. In this paper, as a new type of exercise problem for its self-study, we propose a code modification…
Read MoreValue Trace Problems for Code Reading Study in C Programming
C programming is taught in a lot of universities across the world as the first computer programming language. Then, for novice students, it is important to read many simple C source codes and understand their behaviors to be familiar to the programming paradigm. Unfortunately, effective tools to support independent code reading study at home have…
Read MoreEvolution of Teaching Approaches for Science, Engineering and Technology within an Online Environment: A Review
The emergence of the COVID-19 pandemic earlier this year destabilised the operations in the education sector, particularly in institutions of higher learning. Most of these institutions are now expected to teach online, assess their students using non-venue examinations and offer remote laboratory practical and experiments. However, many of these institutions were not prepared for such…
Read MoreFour-Dimensional Sparse Data Structures for Representing Text Data
This paper focuses on a string encoding algorithm, which produces sparse distributed representations of text data. A characteristic feature of the algorithm described here, is that it works without tokenizing the text and can avoid other data preparation steps, such as stemming and lemmatization. The text can be of arbitrary size, whether it is a…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreWeb Authentication: no Password; Listen and Touch
Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read More
