|
|
|
Vladimir Ulansky and Ahmed Raza
Maintenance strategies play a crucial role in ensuring the reliability and performance of complex systems. Imperfect inspections, characterized by the probabilities of false positives and false negatives, significantly impact the effectiveness of mainten...
ver más
|
|
|
|
|
|
|
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh
In the era of digital advancements, the escalation of credit card fraud necessitates the development of robust and efficient fraud detection systems. This paper delves into the application of machine learning models, specifically focusing on ensemble met...
ver más
|
|
|
|
|
|
|
Damian Valdés-Santiago, Angela M. León-Mecías, Marta Lourdes Baguer Díaz-Romañach, Antoni Jaume-i-Capó, Manuel González-Hidalgo and Jose Maria Buades Rubio
This contribution presents a wavelet-based algorithm to detect patterns in images. A two-dimensional extension of the DST-II is introduced to construct adapted wavelets using the equation of the tensor product corresponding to the diagonal coefficients i...
ver más
|
|
|
|
|
|
|
Yun-Wei Lin, Yuh-Hwan Liu, Yi-Bing Lin and Jian-Chang Hong
Deep learning models are often trained with a large amount of labeled data to improve the accuracy for moving object detection in new fields. However, the model may not be robust enough due to insufficient training data in the new field, resulting in som...
ver más
|
|
|
|
|
|
|
Lubomir Cvrk,Frantisek Mazuch,Tomas Sykora
The article discusses the modeling of artificial intelligence to address the issue of predicting future demand in the service sector (hairdressing, massages, exercise, doctors, physiotherapists, etc.). Future demand is examined on a w...
ver más
|
|
|
|
|
|
|
Malak Al-Hassan, Bilal Abu-Salih and Ahmad Al Hwaitat
The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range of ...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Rong Xiang, Maochen Zhang and Jielan Zhang
Recognition of plant stems is vital to automating multiple processes in fruit and vegetable production. The colour similarity between stems and leaves of tomato plants presents a considerable challenge for recognising stems in colour images. With duality...
ver más
|
|
|
|
|
|
|
Ingrid Luffman and Daniel Connors
Volunteered Geographic Information, data contributed by community scientists, is an increasingly popular tool to collect scientific data, involve the community in scientific research, and provide information and education about a prominent issue. Johnson...
ver más
|
|
|
|
|
|
|
Shawn Hinz, Jennifer Coston-Guarini, Michael Marnane and Jean-Marc Guarini
In this review, the use of environmental DNA (eDNA) within Environmental Impact Assessment (EIA) is evaluated. EIA documents provide information required by regulators to evaluate the potential impact of a development project. Currently eDNA is being inc...
ver más
|
|
|
|