|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|
|
|
|
Vladimir Stanovov, Shakhnaz Akhmedova, Aleksei Vakhnin, Evgenii Sopov, Eugene Semenkin and Michael Affenzeller
In this study, the modification of the quantum multi-swarm optimization algorithm is proposed for dynamic optimization problems. The modification implies using the search operators from differential evolution algorithm with a certain probability within p...
ver más
|
|
|
|
|
|
Aiiad Albeshri
Many smart city and society applications such as smart health (elderly care, medical applications), smart surveillance, sports, and robotics require the recognition of user activities, an important class of problems known as human activity recognition (H...
ver más
|
|
|
|
|
|
Abdelraouf Ishtaiwi, Feda Alshahwan, Naser Jamal, Wael Hadi and Muhammad AbuArqoub
For decades, the use of weights has proven its superior ability to improve dynamic local search weighting algorithms? overall performance. This paper proposes a new mechanism where the initial clause?s weights are dynamically allocated based on the probl...
ver más
|
|
|
|
|
|
Svitlana Danshyna
Pág. 43 - 52
The subject matter of the article is the processes of managing the material resources of the project. The goal of the work is to form a generalized approach to the management of material resources project by determining and formalizing the management pro...
ver más
|
|
|