Orthogonal Polynomials in the Problems of Digital Information Processing by Yaroslav Pyanylo 1,* , Valentyna Sobko 1 , Halyna Pyanylo 1 , Oksana Pyanylo 2 1 Pidstryhach Institute for Applied Problems of Mechanics and Mathematics, National Academy of Sciences of Ukraine Lviv, 79060, Ukraine2 CodeTiburon, Kharkiv, Ukraine * Author to whom correspondence should be addressed. Journal of Engineering …
Continue reading “Orthogonal Polynomials in the Problems of Digital Information Processing”
Designing Critical and Secondary Information in Augmented Reality Headsets for Situational Awareness by Julia Woodward 1,* , Jesse Smith 2, Isaac Wang 3 , Sofia Cuenca 4, Jaime Ruiz2 1 Department of Computer Science and Engineering, University of South Florida, Tampa, Florida, 33620, USA2 Department of Computer and Information Science and Engineering, University of Florida, …
Continue reading “Designing Critical and Secondary Information in Augmented Reality Headsets for Situational Awareness”
Modelling, Simulation and Sensitivity Analysis of Generator Control Systems using Coexisting and Cooperative Tools by Javier Urquizo 1,* , Diover Bonilla 1, Francisco Rivera 1 , Rommel Chang 2 1 Escuela Superior Politécnica del Litoral, ESPOL, FIEC, Campus Gustavo Galindo Km. 30.5 Via Perimetral, Guayaquil, Ecuador2 CELEC EP Unidad de Negocio Hidronación, Central Baba, Kilómetro …
Continue reading “Modelling, Simulation and Sensitivity Analysis of Generator Control Systems using Coexisting and Cooperative Tools”
Human-Computer Interaction for Older Adults – a Literature Review on Technology Acceptance of eHealth Systems by Awais Ahmad 1 * and Peter Mozelius 2 1 Uppsala University, Department of Information Technology, Uppsala, 751 05, Sweden2 Mid Sweden University, Department of Computer and System Science, Östersund, 831 25, Sweden * Author to whom correspondence should be …
Continue reading “Human-Computer Interaction for Older Adults – a Literature Review on Technology Acceptance of eHealth Systems”
An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation – A Review by Roberto Mazzolin 1,* and Asad Madni 2 1 RHEA Group, Ottawa, Canada2 Samueli School of Engineering, UCLA, Los Angeles, California, USA * Author to whom correspondence should be addressed. Journal of Engineering Research and Sciences, …
Continue reading “IEEE Invited Paper – An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation – A Review”
Educational Applications and Comparative Analysis of Network Simulators: Protocols, Types, and Performance Evaluation by Nikolaos V. Oikonomou ¹ and Dimitrios V . Oikonomou ² 1 Department of Informatics & Telecommunications, University of Ioannina, Arta,47150, Greece 2Department of Regional & Cross Border Studies, University of Western Macedonia, Kozani,50100, Greece * Author to whom correspondence should be …
Continue reading “Educational Applications and Comparative Analysis of Network Simulators: Protocols, Types, and Performance Evaluation”
Analyzing the Impact of Optical Wireless Communication Technologies on 5G/6G and IoT Solutions: Prospects, Developments, and Challenges by Ramsha Khalid 1,2 ,* , Muhammad Naqi Raza 1 1Department of Electrical Engineering Technology, University of Sialkot, Sialkot, 51310, Pakistan 2Department of Electrical Engineering, University of Lahore, Lahore, 53720, Pakistan * Author to whom correspondence should be …
Continue reading “Analyzing the Impact of Optical Wireless Communication Technologies on 5G/6G and IoT Solutions: Prospects, Developments, and Challenges.”
Browser-in-the-Browser (BitB) Attack: Case Study by Khalid Alissa ¹ * , Bushra Alhetela ¹ Ghadeer Alazman¹ , Asma Bader² , Noor Alhomeed² , Layan Almubarak² , Fajer Almulla² 1 Department of Networks and Communication, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia²SAUDI ARAMCO Cybersecurity …
Continue reading “Browser-in-the-Browser (BitB) Attack: Case Study”
Engineering and Science collectively played a major role in the lives we live in the 21st century. In today’s technology-driven world, engineering is the cornerstone and driver of innovation of the devices we utilize daily to improve our quality of life. The latter driver, namely the new ideas, is actually elements of research in engineering. …
Continue reading “Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2024)”
Quantum Machine Learning on Remote Sensing Data Classification by Yi Liu1 , Wendy Wang 1,* , Haibo Wang 3 , Bahram Alidaee4 1 University of Massachusetts Dartmouth, Department of Computer and Information Science, Dartmouth, MA 02747, USA2 University of North Alabama, Computer Sciences and Information Systems, Florence, AL 35632, USA3 Texas A&M International University, Division of International …
Continue reading “Quantum Machine Learning on Remote Sensing Data Classification”