|
|
|
Ren-Raw Chen, Cameron D. Miller and Puay Khoon Toh
We developed a swarm intelligence-based model to study firm search across innovation topics. Firm search modeling has primarily been ?firm-centric,? emphasizing the firm?s own prior performance. Fields interested in firm search behavior?strategic managem...
ver más
|
|
|
|
|
|
|
Yuri Kuzmin and Stanislav Proshkin
Based on a rigorous solution to the problem, analytical expressions are obtained for calculating the diffraction of the electromagnetic field of a grounded cable on an elongated dielectric spheroid in a conductive layer. The field of a grounded AC cable ...
ver más
|
|
|
|
|
|
|
Daiho Uhm and Sunghae Jun
Due to the expansion of the internet, we encounter various types of big data such as web documents or sensing data. Compared to traditional small data such as experimental samples, big data provide more chances to find hidden and novel patterns with big ...
ver más
|
|
|
|
|
|
|
Seol-Hyun Noh
With advances in science and technology and changes in industry, research on promising future technologies has emerged as important. Furthermore, with the advent of a ubiquitous and smart environment, governments and enterprises are required to predict f...
ver más
|
|
|
|
|
|
|
Junseok Lee, Sangsung Park and Juhyun Lee
Outliers that deviate from a normal distribution are typically removed during the analysis process. However, the patterns of outliers are recognized as important information in the outlier detection method. This study proposes a technology trend screenin...
ver más
|
|
|
|
|
|
|
Wendan Yang, Guozhong Cao, Qingjin Peng, Junlei Zhang and Chuan He
Identifying technological opportunities early on is critical for the development of radical inventions (RIs). Patents are recognized as one of the most reliable resources for identifying technological opportunities. In line with this, this study aimed to...
ver más
|
|
|
|
|
|
|
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr...
ver más
|
|
|
|
|
|
|
Agnieszka Kleszcz and Krzysztof Rusek
This paper provides new insights into the causal effects of the enlargement of the European Union (EU) on patent performance. The study focuses on the new EU member states (EU-13) and accession is considered as an intervention whose causal effect is esti...
ver más
|
|
|
|
|
|
|
Ruifa Hu, Changxin Yu, Yanhong Jin, Carl Pray and Haiyan Deng
China?s pesticide industry has played an important role in the growth of agricultural productivity in both China and worldwide, but its development is hampered by production inefficiency and the lack of innovation of active ingredients. To improve innova...
ver más
|
|
|
|
|
|
|
Ming Li, Jason Li-Ying, Yuandi Wang and Xiangdong Chen
Prior studies have extensively discussed firms? propensity of licensing under different levels of competition. This study clarifies the differences between potential technology competition (PTC) and actual licensing competition (ALC). We investigate the ...
ver más
|
|
|
|