|
|
|
Yusuke Hoshino and Takashi Hirao
Artificial intelligence (AI) has become popular worldwide after technological breakthroughs in the early 2010s. Accordingly, many organizations and individuals have been using AI for various applications. Previous research has been dominated by case stud...
ver más
|
|
|
|
|
|
Jai Prakash Verma, Shir Bhargav, Madhuri Bhavsar, Pronaya Bhattacharya, Ali Bostani, Subrata Chowdhury, Julian Webber and Abolfazl Mehbodniya
The recent advancements in big data and natural language processing (NLP) have necessitated proficient text mining (TM) schemes that can interpret and analyze voluminous textual data. Text summarization (TS) acts as an essential pillar within recommendat...
ver más
|
|
|
|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|
|
|
|
Tri Kushartadi, Aditya Eka Mulyono, Azhari Haris Al Hamdi, Muhammad Afif Rizki, Muhammad Anwar Sadat Faidar, Wirawan Dwi Harsanto, Muhammad Suryanegara and Muhamad Asvial
The estimated global population for 2050 is 9 billion, which implies an increase in food demand. Agriculture is the primary source of food production worldwide, and improving its efficiency and productivity through an integration with information and com...
ver más
|
|
|
|
|
|
David Olson and Bongsug (Kevin) Chae
This study examined the Security and Exchange Commission (SEC) annual reports of selected logistics firms over the period from 2006 through 2021 for risk management terms. The purpose was to identify which risks are considered most important in supply ch...
ver más
|
|
|