Skip to main content
Since the beginning of the “War on Terror” in 2001, there has been a sudden rise in interest in countering violent extremism through peace education. In Pakistan, the focus has largely been on Islamic seminaries (madrassas), but... more
    • by  and +1
    •   2  
      Peace EducationPeace Education and Curriculum Development
    • by 
    • Financial Accounting
Agile Development Methods adalah sekelompok metodologi pengembangan perangkat lunak yang didasarkan pada prinsip-prinsip yang sama atau pengembangan sistem jangka pendek yang memerlukan adaptasi cepat dari pengembang terhadap perubahan... more
    • by 
Agile Development Methods adalah sekelompok metodologi pengembangan perangkat lunak yang didasarkan pada prinsip-prinsip yang sama atau pengembangan sistem jangka pendek yang memerlukan adaptasi cepat dari pengembang terhadap perubahan... more
    • by 
    • Agile software development
Since the use of computers in business world, data collection has become one of the most important issues due to the available knowledge in the data; such data has been stored in database. Database system was developed which led to the... more
    • by 
الشاعر والمفكر والفيلسوف العلامة محمد اقبال واحد من اشهر الشعراء خلال حقبة النصف الاول من القرن العشرين, و هو من الهند المستعمرة من قبل  بريطانيا مسبقا و حاليا الباكستان .كتب العديد من القصائد العتيدة والمقالات حول الدين والاخلاقيات في... more
    • by 
The application of metaheuristic search techniques in test data generation has been extensively investigated in recent years. Most studies, however, have concentrated on the application of such techniques in structural testing. The use of... more
    • by 
In this paper, a hardware system for Sobel Edge Detection Algorithm is designed and simulated for a 128 pixel, 8-bit monochrome line-scan camera. The system is designed to detect objects as they move along a conveyor belt in a... more
    • by 
    •   7  
      Image ProcessingDigital Image ProcessingEdge DetectionImage Processing for Edge Detection
Clinical workflows are safety critical workflows as they have the potential to cause harm or death to patients. Their safety needs to be considered as early as possible in the development process. Effective safety analysis methods are... more
    • by  and +2
    •   26  
      RadiologyPatient SafetyRisk and VulnerabilityRisk Management
Classical Huffman codes have a very good compression performance over traditional systems. Yet, more efficient encoding is possible by considering and applying techniques that treat the binary bits differently considering requirement of... more
    • by  and +2
    •   14  
      Electrical EngineeringCoding TheoryComputer ScienceAlgorithms
Time delays in system subcomponents or control may result into unacceptable system operation or uncertainty in specialised technical systems like aircraft control, plant control, robotics, etc. In parallel computing, different... more
    • by  and +2
    •   12  
      Computer ScienceDistributed ComputingParallel ComputingComputer Engineering
Time delays in system states or control may result into unacceptable system operation or uncertainty in specialised technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability,... more
    • by  and +1
Contour representation of binary object is increasingly used in image processing and pattern recognition. Chain code and crack code are popular methods of contour encoding. However, by using these methods, an accurate estimate of... more
    • by 
    •   6  
      Image ProcessingPattern RecognitionData CompressionDigital Image Processing
Over the past two decades, research has focused on simplifying dependability analysis by looking at how we can synthesise dependability information from system models automatically. This has led to the field of model-based safety... more
    • by 
    •   17  
      Safety EngineeringProbability TheoryFuzzy LogicFuzzy set theory
ISO 26262, titled Road Vehicles–Functional Safety, is the new automotive functional safety standard for passenger vehicle industry. In order to accomplish the goal of designing and developing dependable automotive systems , ISO 26262 uses... more
    • by 
    •   10  
      Safety EngineeringGenetic AlgorithmsAnt Colony OptimizationAutomotive Industry
Critical technological systems exhibit complex dynamic characteristics such as time-dependent behaviour, functional dependencies among events, sequencing and priority of causes that may alter the effects of failure. Dynamic fault trees... more
    • by 
    •   15  
      Safety EngineeringProbability TheoryComputer ScienceComputer Engineering
Safety and reliability are two important aspects of dependability that are needed to be rigorously evaluated throughout the development life-cycle of a system. Over the years, several methodologies have been developed for the analysis of... more
    • by  and +2
    •   4  
      Computer Security And ReliabilityReliability EngineeringReliabilityFault Tree Analysis
Over the years, several approaches have been developed for the quantitative analysis of dynamic fault trees (DFTs). These approaches have strong theoretical and mathematical foundations; however, they appear to suffer from the state-space... more
    • by 
Temporal fault trees (TFTs), an extension of classical Boolean fault trees, can model timedependent failure behaviour of dynamic systems. The methodologies used for quantitative analysis of TFTs include algebraic solutions, Petri nets... more
    • by 
This article proposes an approach named SafeML II, which applies empirical cumulative distribution function-based statistical distance measures in a designed human-in-theloop procedure to ensure the safety of machine learning-based... more
    • by 
    •   2  
      Computer ScienceComputer