|
|
|
Min Hu, Fan Zhang and Huiming Wu
Various abnormal scenarios might occur during the shield tunneling process, which have an impact on construction efficiency and safety. Existing research on shield tunneling construction anomaly detection typically designs models based on the characteris...
ver más
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
Zhen Liu, Qifeng Yang, Anlue Wang and Xingyu Gu
In the process of driving in an underground interchange, drivers are faced with many challenges, such as being in a closed space, visual changes alternating between light and dark conditions, complex road conditions in the confluence section, and dense s...
ver más
|
|
|
|
|
|
George Papageorgiou, Vangelis Sarlis and Christos Tjortjis
This study utilized advanced data mining and machine learning to examine player injuries in the National Basketball Association (NBA) from 2000?01 to 2022?23. By analyzing a dataset of 2296 players, including sociodemographics, injury records, and financ...
ver más
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|