Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Big data-driven contextual processing methods for electrical capacitance tomography
A Romanowski - IEEE Transactions on Industrial Informatics, 2018 - ieeexplore.ieee.org
This paper presents a new approach to analyzing measurement records from industrial
processes. The proposed methodology is based on the model of contextual processing and …
processes. The proposed methodology is based on the model of contextual processing and …
Collaborative immersive analytics
Many of the problems being addressed by Immersive Analytics require groups of people to
solve. This chapter introduces the concept of Collaborative Immersive Analytics (CIA) and …
solve. This chapter introduces the concept of Collaborative Immersive Analytics (CIA) and …
From cyber security activities to collaborative virtual environments practices through the 3D cybercop platform
Although collaborative practices between cyber organizations are well documented,
managing activities within these organizations is still challenging as cyber operators tasks …
managing activities within these organizations is still challenging as cyber operators tasks …
[PDF][PDF] Designing for ambiguity in sensemaking: Visual analytics in risk analysis and prediction
S Nowak - 2023 - summit.sfu.ca
This dissertation investigates how visual analytics tools and techniques can address
ambiguity in complex risk assessment, prediction, and monitoring, focusing on the domain of …
ambiguity in complex risk assessment, prediction, and monitoring, focusing on the domain of …
[PDF][PDF] Evaluating contemporary digital awareness programs for future application within the cyber security social engineering domain
H Aldawood, G Skinner - International Journal of Computer …, 2020 - researchgate.net
Social engineering is a rising threat to individuals and organizations, causing massive
losses every day. Contemporary and innovative methods to mitigate these threats are …
losses every day. Contemporary and innovative methods to mitigate these threats are …
Reimagining design: Exploring the potential of the infinite canvas for collaborative interactive articles
P Klein - 2023 - repositum.tuwien.at
As digital technology continues to reshape communication and content consumption,
collaboration and collective ideation have become fundamental to modern web …
collaboration and collective ideation have become fundamental to modern web …
The effects of sharing viewpoints on task performance in collaborative VR applications
A Aminbeidokhti - 2023 - prism.ucalgary.ca
While virtual reality applications allow for face-to-face collaboration and the ability to see
each other's avatars, having different graphical viewpoints can hinder task performance due …
each other's avatars, having different graphical viewpoints can hinder task performance due …
[PDF][PDF] DESIGNING DIGITAL TOOLS TO SUPPORT HANDOFF AT SHIFT CHANGES IN AVALANCHE FORECASTING
Avalanche forecasters typically work in teams, relying on the continuity of their shared
understanding of avalanche conditions. Shift changes can disrupt this continuity as incoming …
understanding of avalanche conditions. Shift changes can disrupt this continuity as incoming …
Design of intelligent construction engineering frame based on communication information visualization
X Kou - 2021 International Conference on Artificial Intelligence …, 2021 - ieeexplore.ieee.org
Design of the intelligent construction engineering frame based on the communication
information visualization is presented in this paper. High-rise intelligent buildings are …
information visualization is presented in this paper. High-rise intelligent buildings are …
[PDF][PDF] An Awareness Policy Framework for Cyber Security Social Engineering Threats
HA Aldawood - 2020 - nova.newcastle.edu.au
Due to the ever-increasing adaptation of digital technologies, most organisations are
currently vulnerable to social engineering threats. In the context of cybersecurity, social …
currently vulnerable to social engineering threats. In the context of cybersecurity, social …