PDF

This dataset contains full details of the use case scenarios. Those can be used for effort elicitation using the adapted Use Case Points method. Despite the extensive use of UCP in software engineering, it has yet to be adapted for IoT systems, which is essential for project management and resource planning. Our proposed adaptation, UCP for IoT, is based on a four-layer IoT architecture and tailors the standard software UCP to the specifications of IoT systems.

Categories:
75 Views

The dataset contains detailed information on a 100kVA transformer in ONAN cooling mode. The file consists of three PDF documents, which describe the transformer’s overall structure, core structure and size, winding structure and dimension, respectively. 

Categories:
82 Views

Document layout analysis (DLA) plays an important role for identifying and classifying the different regions of digital documents in the context of Document Understanding tasks. In light of this, SciBank seeks to provide a considerable amount  of data from text (abstract, text blocks, caption, keywords, reference, section, subsection, title), tables, figures and equations (isolated equations and inline equations) of 74435 scientific articles pages. Human curators validated that these 12 regions were properly labeled.

Categories:
979 Views

We focus on subjective and objective Point Cloud Quality Assessment (PCQA) in an immersive environment and study the effect of geometry and texture attributes in compression distortion. Using a Head-Mounted Display (HMD) with six degrees of freedom, we establish a subjective PCQA database named SIAT Point Cloud Quality Database (SIAT-PCQD). Our database consists of 340 distorted point clouds compressed by the MPEG point cloud encoder with the combination of 20 sequences and 17 pairs of geometry and texture quantization parameters.

Categories:
497 Views

Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today!

Before going for a Cyber security solutions for small to mid-sized businesses deliver enterprise-level protection.

Download this (Checklist for a Small Firm's Cybersecurity Program 2020-2021) data set to deploy secure functioning of various aspects of your small business including, employee data, website and more.

Categories:
1263 Views

One best circuit for the electronics choke for tube light

Categories:
98 Views

One new circuit design is invented by me for electronic fan regulator which is cheap and best

Categories:
95 Views

This is a PDF of the OPM model of the first part of ISO/IEC/IEEE 15288 International Standard 

Categories:
224 Views

Secure cryptographic protocols are indispensable for modern communication systems. It is realized through an encryption process in cryptography. In quantum cryptography, Quantum Key Distribution (QKD) is a widely popular quantum communication scheme that enables two parties to establish a shared secret key that can be used to encrypt and decrypt messages.

Categories:
136 Views

 

Example axial and coronal phase maps and post-treatment MRI from 68 thalamotomies in essential tremor patients and four pallidotomies in Parkinson's disease patients. From the manuscript "Using phase data from MR temperature imaging to visualize anatomy during MRI-guided focused ultrasound neurosurgery" published in 2020 in IEEE Trans. Med. Imaging.

 

Normal
0

false
false
false

EN-US
X-NONE
X-NONE

Categories:
313 Views

Pages