|
|
|
Young Hwan Choi and Joong Hoon Kim
This study compares the performance of self-adaptive optimization approaches in efficient water distribution systems (WDS) design and presents a guide for the selection of the appropriate method employing optimization utilizing the characteristic of each...
ver más
|
|
|
|
|
|
|
Kenan Liu, Wuyun Zhao, Bugong Sun, Pute Wu, Delan Zhu and Peng Zhang
Autonomous navigation for agricultural machinery has broad and promising development prospects. Kalman filter technology, which can improve positioning accuracy, is widely used in navigation systems in different fields. However, there has not been much r...
ver más
|
|
|
|
|
|
|
Dragan Pamucar, Nikola Kne?evic, Dragana Macura, Boban Ðorovic
Research Question: The paper explores the problem of defining the number of required employees and their skills, as well as optimizing the work time. Motivation: Motivation for this paper arises from the fact that an organizational structure of business ...
ver más
|
|
|
|
|
|
|
Erman Ozpolat and Arif Gulten
This paper explores the synchronization and implementation of a novel hyperchaotic system using an adaptive observer. Hyperchaotic systems, known for possessing a greater number of positive Lyapunov exponents compared to chaotic systems, present unique c...
ver más
|
|
|
|
|
|
|
Chuanxiang Song, Seong-Yoon Shin and Kwang-Seong Shin
This study introduces a novel approach named the Dynamic Feedback-Driven Learning Optimization Framework (DFDLOF), aimed at personalizing educational pathways through machine learning technology. Our findings reveal that this framework significantly enha...
ver más
|
|
|
|
|
|
|
Marian Wnuk
An important element of modern telecommunications is wireless radio networks, which enable mobile subscribers to access wireless networks. The cell area is divided into independent sectors served by directional antennas. As the number of mobile network s...
ver más
|
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
|
Thabit Atobishi, Sahar Moh?d Abu Bakir and Saeed Nosratabadi
As public sector agencies face rising imperatives to digitally transform citizen services, data systems, and internal operations, questions persist as to whether investments in big data analytics and automation capabilities, evidenced to drive organizati...
ver más
|
|
|
|
|
|
|
Devon Barrow, Antonija Mitrovic, Jay Holland, Mohammad Ali and Nikolaos Kourentzes
In forecasting research, the focus has largely been on decision support systems for enhancing performance, with fewer studies in learning support systems. As a remedy, Intelligent Tutoring Systems (ITSs) offer an innovative solution in that they provide ...
ver más
|
|
|
|
|
|
|
Davy Preuveneers and Wouter Joosen
Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously m...
ver más
|
|
|
|