|
|
|
Jeffrey Tim Query, Evaristo Diz
Pág. 145 - 159
AbstractIn this study we examine the robustness of fit for a multivariate and an autoregressive integrated moving average model to a data sample time series type. The sample is a recurrent actuarial data set for a 10-year horizon. We utilize ...
ver más
|
|
|
|
|
|
|
Houaria ABED, Lynda ZAOUI
Pág. 97 - 113
Recent years have witnessed great interest in developing methods for content-based image retrieval (CBIR). Generally, the image search results which are returned by an image search engine contain multiple topics, and organizing the results into different...
ver más
|
|
|
|
|
|
|
Damny Magdaleno Guevara, Yadriel Miranda, Ivett Fuentes, María Garc ía
Pág. 69 - 80
A huge amount of information is represented in XML format. Several tools have been developed to store, and query XML data. It becomes inevitable to develop high performance techniques for efficiently analysing extremely large collections of XML data. O...
ver más
|
|
|
|
|
|
|
Josue-Rafael Montes-Martínez, Hugo Jiménez-Hernández, Ana-Marcela Herrera-Navarro, Luis-Antonio Díaz-Jiménez, Jorge-Luis Perez-Ramos and Julio-César Solano-Vargas
Artificial vision system applications have generated significant interest as they allow information to be obtained through one or several of the cameras that can be found in daily life in many places, such as parks, avenues, squares, houses, etc. When th...
ver más
|
|
|
|
|
|
|
Erik Bollen, Bart Kuijpers, Valeria Soliani and Alejandro Vaisman
Sensor networks are used in an increasing number and variety of application areas, like traffic control or river monitoring. Sensors in these networks measure parameters of interest defined by domain experts and send these measurements to a central locat...
ver más
|
|
|
|
|
|
|
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi...
ver más
|
|
|
|
|
|
|
Chee-Hoe Loh, Yi-Chung Chen, Chwen-Tzeng Su and Sheng-Hao Lin
|
|
|
|
|
|
|
Jing Liu and Yong Zhong
As a structural indicator of dense subgraphs, k-core has been widely used in community search due to its concise and efficient calculation. Many community search algorithms have been expanded on the basis of k-core. However, relevant algorithms often set...
ver más
|
|
|
|
|
|
|
Pornrawee Tatit, Kiki Adhinugraha and David Taniar
Using spatial data in mobile applications has grown significantly, thereby empowering users to explore locations, navigate unfamiliar areas, find transportation routes, employ geomarketing strategies, and model environmental factors. Spatial databases ar...
ver más
|
|
|
|
|
|
|
Alexander Lange, Ronghua Xu, Max Kaeding, Steffen Marx and Joern Ostermann
Regular inspections of important civil infrastructures are mandatory to ensure structural safety and reliability. Until today, these inspections are primarily conducted manually, which has several deficiencies. In context of prestressed concrete structur...
ver más
|
|
|
|