|
|
|
Khaled Almiani, Mutaz Abu Alrub, Young Choon Lee, Taha H. Rashidi and Amirmohammad Pasdar
As a critical factor in ensuring the growth of the electronic auction (e-auction) domain, the privacy and security of the participants (sellers and buyers) must always be guaranteed. Traditionally, auction data, including participant details, are stored ...
ver más
|
|
|
|
|
|
Panagiotis Skondras, Nikos Zotos, Dimitris Lagios, Panagiotis Zervas, Konstantinos C. Giotopoulos and Giannis Tzimas
This article presents a study on the multi-class classification of job postings using machine learning algorithms. With the growth of online job platforms, there has been an influx of labor market data. Machine learning, particularly NLP, is increasingly...
ver más
|
|
|
|
|
|
Zhongchang Ye, Xin Ye and Zhonghua Zhao
Intelligent video surveillance (IVS) technology is widely used in various security systems. However, quality degradation in surveillance images (SIs) may affect its performance on vision-based tasks, leading to the difficulties in the IVS system extracti...
ver más
|
|
|
|
|
|
Michael Giardino, Daniel Schwyn, Bonnie Ferri and Aldo Ferri
With the computational systems of even embedded devices becoming ever more powerful, there is a need for more effective and pro-active methods of dynamic power management. The work presented in this paper demonstrates the effectiveness of a reinforcement...
ver más
|
|
|
|
|
|
Georgy I. Shapiro and Jose M. Gonzalez-Ondina
A simple and computationally efficient method is presented for creating a high-resolution regional (child) model nested within a coarse-resolution, good-quality data-assimilating (parent) model. The method, named Nesting with Downscaling and Data Assimil...
ver más
|
|
|