|
|
|
Nikola ?igulic, Matko Glucina, Ivan Lorencin and Dario Matika
This study delves into the vital missions of the armed forces, encompassing the defense of territorial integrity, sovereignty, and support for civil institutions. Commanders grapple with crucial decisions, where accountability underscores the imperative ...
ver más
|
|
|
|
|
|
|
Gregorius Ryan, Pricillia Katarina and Derwin Suhartono
The rise of social media as a platform for self-expression and self-understanding has led to increased interest in using the Myers?Briggs Type Indicator (MBTI) to explore human personalities. Despite this, there needs to be more research on how other wor...
ver más
|
|
|
|
|
|
|
Joseph Isabona, Agbotiname Lucky Imoize, Oluwasayo Akinloye Akinwumi, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee and Chun-Ta Li
Benchmarking different optimization algorithms is tasky, particularly for network-based cellular communication systems. The design and management process of these systems involves many stochastic variables and complex design parameters that demand an unb...
ver más
|
|
|
|
|
|
|
Aristeidis Karras, Christos Karras, Nikolaos Schizas, Markos Avlonitis and Spyros Sioutas
The field of automated machine learning (AutoML) has gained significant attention in recent years due to its ability to automate the process of building and optimizing machine learning models. However, the increasing amount of big data being generated ha...
ver más
|
|
|
|
|
|
|
Dennis Delali Kwesi Wayo, Sonny Irawan, Alfrendo Satyanaga and Jong Kim
Data-driven models with some evolutionary optimization algorithms, such as particle swarm optimization (PSO) and ant colony optimization (ACO) for hydraulic fracturing of shale reservoirs, have in recent times been validated as one of the best-performing...
ver más
|
|
|
|
|
|
|
Shilpa Gite, Shruti Patil, Deepak Dharrao, Madhuri Yadav, Sneha Basak, Arundarasi Rajendran and Ketan Kotecha
Feature selection and feature extraction have always been of utmost importance owing to their capability to remove redundant and irrelevant features, reduce the vector space size, control the computational time, and improve performance for more accurate ...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Kyeong Ryong Kim, Aaron Lim and Jae Hyung Cho
The exterior location of a user can be accurately determined using a global positioning system (GPS). However, accurately locating objects indoors poses challenges due to signal penetration limitations within buildings. In this study, an MLP with stochas...
ver más
|
|
|
|
|
|
|
Xiangpeng Fan and Zhibin Guan
The automatic recognition of crop diseases based on visual perception algorithms is one of the important research directions in the current prevention and control of crop diseases. However, there are two issues to be addressed in corn disease identificat...
ver más
|
|
|
|
|
|
|
Pablo Moscato, Mohammad Nazmul Haque, Kevin Huang, Julia Sloan and Jonathon Corrales de Oliveira
In the field of Artificial Intelligence (AI) and Machine Learning (ML), a common objective is the approximation of unknown target functions y=f(x)" role="presentation">??=??(??)y=f(x)
y
=
f
(
x
)
using limited instances S=(x(i),y(i))" role="presentation...
ver más
|
|
|
|