|
|
|
Nisa Boukichou-Abdelkader, Miguel Ángel Montero-Alonso and Alberto Muñoz-García
Recently, many methods and algorithms have been developed that can be quickly adapted to different situations within a population of interest, especially in the health sector. Success has been achieved by generating better models and higher-quality resul...
ver más
|
|
|
|
|
|
|
Su-Jin Choi, Hongjae Kang, Keejoo Lee and Sejin Kwon
The Korean National Space Council recently released ?Mars Exploration 2045? as part of its future strategic plan. The operations for a Mars explorer can be defined based on domestically available capabilities, such as ground operations, launch, in-space ...
ver más
|
|
|
|
|
|
|
Azad A. Ameen, Tarik A. Rashid and Shavan Askar
Child drawing development optimization (CDDO) is a recent example of a metaheuristic algorithm. The motive for inventing this method is children?s learning behavior and cognitive development, with the golden ratio being employed to optimize the aesthetic...
ver más
|
|
|
|
|
|
|
Saif Ur Rehman, Muhammad Altaf Khan, Habib Un Nabi, Shaukat Ali, Noha Alnazzawi and Shafiullah Khan
The regular frequent pattern mining (RFPM) approaches are aimed to discover the itemsets with significant frequency and regular occurrence behavior in a dataset. However, these approaches mainly suffer from the following two issues: (1) setting the frequ...
ver más
|
|
|
|
|
|
|
Lin Liu, Hang Li, Dongmei Pei and Shuai Liu
The rapid development of Internet technology has formed a huge virtual information space. In the information space, information flow has become a link of communication between objects. Information flow is an alternative or supplement to the traditional p...
ver más
|
|
|
|
|
|
|
Eric Hsueh-Chan Lu and You-Ru Lin
With the rise in the Internet of Things (IOT), mobile devices and Location-Based Social Network (LBSN), abundant trajectory data have made research on location prediction more popular. The check-in data shared through LBSN hide information related to lif...
ver más
|
|
|
|
|
|
|
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat...
ver más
|
|
|
|
|
|
|
Joseph Isabona, Agbotiname Lucky Imoize, Oluwasayo Akinloye Akinwumi, Okiemute Roberts Omasheye, Emughedi Oghu, Cheng-Chi Lee and Chun-Ta Li
Benchmarking different optimization algorithms is tasky, particularly for network-based cellular communication systems. The design and management process of these systems involves many stochastic variables and complex design parameters that demand an unb...
ver más
|
|
|
|
|
|
|
Igor S. Masich, Vadim S. Tyncheko, Vladimir A. Nelyub, Vladimir V. Bukhtoyarov, Sergei O. Kurashkin and Aleksey S. Borodulin
Logical analysis of data (LAD), an approach to data analysis based on Boolean functions, combinatorics, and optimization, can be considered one of the methods of interpretable machine learning. A feature of LAD is that, among many patterns, different typ...
ver más
|
|
|
|
|
|
|
Qian Chen, Xiang Gao, Jianming Mo and Zhouling Xu
The existing literature shows that, due to locality and familiarity, spatial investor?firm adjacency plays a key role in determining stock investor attention, as proxied by the location where investors initiate an Internet search of the ticker symbol. Th...
ver más
|
|
|
|