This paper explores a novel correlation between prime numbers and nuclear synthesis, proposing a theory where primes form the foundation of nuclear fusion and elemental abundance in the universe. By simulating fusion and fission using... more
Purpose This study investigates which dimensions of the management control system (MCS) increase the perception of organizational justice and reduce unethical behavior in the perception of managers. The purpose of this paper is to... more
Voglio scrivere qualche riga che rimanga a testimonianza su un tema che reputo importante: la relazione tra emissione energetica solare (altrimenti chiamata in linguaggio tecnico TSI = Total Solar Irradiance) e temperatura globale del... more
This PowerPoint presentation presented at the 2006 Atlantic Provinces Political Science Association Annual Conference visually shows how a key element of gerrymandering works. Instead of redrawing state legislative or congressional... more
This is not linguistic evolution. It is the result of colonial editing, where one letter decides which narrative you originate from: from "glory" (слава) or from "word" (слово), from a People of Farmers and Warriors or from an... more
Originally XMLw as used as as tandardp rotocolf or data exchange in computing. The evolutionofinformation technology hasopenedupnew situations in whichXML canbe used to author,m aintain, andd eliver contenta nd consequently,n ew... more
This paper reports on an ongoing Knowledge Graph generation project at the industrial automation company Festo. The project aims at establishing a well defined and easily traceable extract, transform, load (ETL) process of technical data... more
Despite increasingly distributed internet information sources with diverse storage formats and access-control constraints, most of the end applications (e.g., filters and media players) that view and manipulate data from these sources... more
The multicore architecture has been the norm for all computing systems in recent years as it provides the CPU-level support of parallelism. However, existing algorithms for processing XML streams do not fully take advantage of the... more
For integrating relational databases (RDBs) into semantic web applications, the W3C RDB2RDF Working Group recommended two approaches, Direct Mapping (DM) and R2RML. The DM provides a set of mapping rules according to RDB schema, while the... more
With the accumulation of large amounts of health related data, predictive analytics could stimulate the transformation of reactive medicine towards Predictive, Preventive and Personalized (PPPM) Medicine, ultimately affecting both cost... more
We propose a fraud detection systems (FDS) for AMI based on anomaly detection on the energy consumption reports from smart meters. Fraud inspection is triggered when a discrepancy between the energy supplied by the grid and that reported... more
New immersive devices (e.g., virtual or augmented reality) enable displaying large amounts of data in space to better support data analysis. Manipulating this data efficiently is crucial, but challenging because the user must be able to... more
Figure 1: (a): A line graph representing heart rate over six minutes and including 300 data points; (b): we simplify the line graph in (a) using the Space-Filling Line Graph (SF-LG) technique; (c) & (d): the available space created around... more
Figure 1: (a): A line graph representing heart rate over six minutes and including 300 data points; (b): we simplify the line graph in (a) using the Space-Filling Line Graph (SF-LG) technique; (c) & (d): the available space created around... more
In this chapter, we briefly review the development of natural user interfaces and discuss their role in providing human-computer interaction that is immersive in various ways. Then we examine some opportunities for how these technologies... more
HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
The article deals with a design of a system that provides tools for creation of automatically provisioned embedded communication system and its components. As the key feature of the BEESIP platform (Bright Efficient Embedded Solution for... more
Teknoloji kullanımın her geçen gün artmasıyla birlikte sosyal medya ve internet kullanımı hızla yaygınlaşmaktadır. Özellikle sosyal medya kullananların sayısının artmasıyla insanlar duygu ve düşüncelerini, gündemle ilgili görüş ve... more
A well-functioning procurement system is an essential requirement for a developing country like Kenya. In order to promote development, proper management of scarce resources is vital. A system that ensures transparency, efficiency, cost... more
İnternet kullanımındaki artışa paralel olarak dünyanın farklı noktalarındaki insanlar farklı konulardaki duygu ve düşüncelerini sosyal medyalar aracılığıyla kolay bir şekilde aktarabilmektedirler. Bu sosyal medyalar içerisinde önemli bir... more
With the rapid advancement of networking technologies, security system has become increasingly important to academics from several sectors. Intrusion detection (ID) provides a valuable protection by reducing the human resources required... more
User-maintained mode is often adopted in facilitating a bimanual interaction using multitouch devices, in which a thumb of a non-dominant hand holding the device can press a part of the screen and keep pressed in order to activate and... more
Recent advances in linked data generation through mapping such as RML (RDF mapping language) allows for providing large-scale RDF data in a more automatic way.However, considerable amount of data in open data portals remain inaccessible... more
Traditionally, manipulation has been considered as an act that necessarily takes place somewhere in the background, in secret, "backstage", in the dark, so to speak, in the "unconscious" part of our social actions. Such an understanding... more
The injection of interface faults through API parameter corruption is a technique commonly used in experimental dependability evaluation. Although the interface faults injected by this approach can be considered as a possible consequence... more
It is common practice for data providers to include text descriptions for each column when publishing data sets in the form of data dictionaries. While these documents are useful in helping an end-user properly interpret the meaning of a... more
In this paper the behavior of assertion-based error detection mechanisms is characterized under faults injected according to a quite general fault model. Assertions based on the knowledge of the application can be very effective at... more
Large vertical displays are increasingly widespread, and content sharing between them and personal mobile devices is central to many collaborative usage scenarios. In this chapter we present FlowTransfer, bidirectional transfer techniques... more
The Navy's Advanced Avionics Subsystem Technology (AAST) Fault Tolerant program is clarifyin the Navy's fault tolerant avionics specifications mekods and acceptance tests. The goal of the program will be clarify the Specification and... more
The recent surge of popularity has established Mashups as an important category of Web 2.0 applications. Mashups are essentially Web services that are often created by end-users. They aggregate and manipulate data from sources around the... more
Recently, mashups are gaining tremendous popularity as an important Web 2.0 application. Mashups provide end-users with an opportunity to create personalized Web services which aggregate and manipulate data from multiple diverse sources... more
Acknowledgments. The research reported here is part of the Interactive Collaborative Information Systems (ICIS) project, supported by the Dutch Ministry of Economic Affairs, grant nr: BSIK03024.
Baby-foot, a popular 2v2 table soccer game, has become an essential part of employee leisure and team building in various companies, including Hays Brussels where I work since January 2021. The game has found its way into corporate... more
It is common practice for data providers to include text descriptions for each column when publishing data sets in the form of data dictionaries. While these documents are useful in helping an end-user properly interpret the meaning of a... more
A continuación, transcribimos una carta muy interesante que apareció en el número 24 de la revista Cultura Boliviana. Fue escrita por Pedro Domingo Murillo luego de la Revolución de La Paz, en el marco de la Guerra Separatista de América,... more
Self-reporting procedures have been largely employed in literature to measure the mental workload experienced by users when executing a specific task. This research proposes the adoption of these mental workload assessment techniques to... more
Modeling temporal database over relational database<br> using 1NF model is considered the most popular approach. This<br> is because of the easy implementation as well as the modeling and<br> querying power of 1NF model.... more
In this article, we investigate the problem of electricity theft attacks on smart meters when malicious customers (i.e., adversaries) claim injecting more generated energy into the grid to get more profits from utility companies. These... more
The controllability principle, which stipulates that managers should only be evaluated based on elements that they can control, has been widely studied in the management control literature, both from theoretical and empirical... more