Skip to main content

xlsx

In this study, adaptive hybrid (AH) scheme is proposed to enhance the measurement accuracy of conventional CD method to acquire the 2-dimensional velocity field of blood flows. It can offer the assistance of the velocity field information measured preliminarily using ultrasound speckle image velocimetry (SIV) technique. Consequently, erroneous vectors in the CD results were replaced with the SIV results. The performance of the proposed AH method was validated by varying flow rate and insonation angle. We compared the AH method with the CD and SIV methods in an agarose vessel model.

Categories:

This dataset contains the results of a systematic literature review of visualization in Building Information Modeling (BIM). BIM employs data-rich 3D CAD models for large-scale facility design, construction, and operation. These complex datasets contain a large amount and variety of information, ranging from design specifications to real-time sensor data. They are used by architects and engineers for various analysis and simulations throughout a facility's life cycle. Many techniques from different visualization fields could be used to analyze these data.

Categories:

This dataset contains the results of a systematic literature review of information visualization in Building Information Modeling (BIM). BIM employs 3D CAD models as a central knowledge base for large-scale facility design, construction, and operation. For many years now, the construction industry has researched how to best take advantage of this integrated environment. Its growing information complexity calls upon innovative techniques for effective visual analysis and exploration.

Categories:

Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time.

Categories:

For reproducibility purposes, a large test bench of fiber links is simulated to test the Baseband Subcarrier Sweep framework and associated monitoring techniques. The test bench comprises three sets of 1000 fiber links each containing one, two, or three faults.

Categories:

 

Static analysis is increasingly used by companies and individual code developers to detect bugs and security vulnerabilities. As programs grow more complex, the analyses have to support new code concepts, frameworks and libraries. However, static-analysis code itself is also prone to bugs. While more complex analyses are written and used in production systems every day, the cost of debugging and fixing them also increases tremendously.

Categories: