|
|
|
Young Hwan Choi and Joong Hoon Kim
This study compares the performance of self-adaptive optimization approaches in efficient water distribution systems (WDS) design and presents a guide for the selection of the appropriate method employing optimization utilizing the characteristic of each...
ver más
|
|
|
|
|
|
|
Jakub Ka?cak, Marek Koci?ko, Adrián Vodilka, Jozef Török and Tomá? Coranic
The persistent challenge of adhesion in Fused Filament Fabrication (FFF) technology is deeply rooted in the mechanical and chemical properties of utilized materials, necessitating the exploration of potential resolutions. This involves adjustments target...
ver más
|
|
|
|
|
|
|
Stergios Roumeliotis, Kyriakos Lampropoulos, Ekaterini Delegou, Elisavet Tsilimantou, Vasileios Keramidas, Asterios Bakolas and Antonia Moropoulou
The restoration of historic buildings and structures involves a wide range of scientific and technical fields. The grouting process is among an array of rehabilitation and preservation interventions and aims to homogenize the structure after the implemen...
ver más
|
|
|
|
|
|
|
Mihai Petru Stef and Zsolt Alfred Polgar
With the constant growth of software-defined radio (SDR) technologies in fields related to wireless communications, the need for efficient ways of testing and evaluating the physical-layer (PHY) protocols developed for these technologies in real-life tra...
ver más
|
|
|
|
|
|
|
Ikjae Kim, Moosung Park, Hyun-Jin Lee, Jisoo Jang, Soojin Lee and Dongkyoo Shin
With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, the proliferation of defense systems based on these technologies is increasing worldwide. In respon...
ver más
|
|
|
|
|
|
|
Max Schrötter, Andreas Niemann and Bettina Schnor
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi...
ver más
|
|
|
|
|
|
|
Lowri Williams, Eirini Anthi and Pete Burnap
The performance of emotive text classification using affective hierarchical schemes (e.g., WordNet-Affect) is often evaluated using the same traditional measures used to evaluate the performance of when a finite set of isolated classes are used. However,...
ver más
|
|
|
|
|
|
|
Massimiliano Pepe, Domenica Costantino and Vincenzo Saverio Alfio
The aim of the paper is to identify a suitable method for assessing the deformation of structures (buildings, bridges, walls, etc.) by means of topographic measurements of significant targets positioned on the infrastructure under consideration. In parti...
ver más
|
|
|
|
|
|
|
Abdul Rehman Khalid, Nsikak Owoh, Omair Uthmani, Moses Ashawa, Jude Osamor and John Adejoh
In the era of digital advancements, the escalation of credit card fraud necessitates the development of robust and efficient fraud detection systems. This paper delves into the application of machine learning models, specifically focusing on ensemble met...
ver más
|
|
|
|
|
|
|
Meng Li, Jiqiang Liu and Yeping Yang
Data governance is an extremely important protection and management measure throughout the entire life cycle of data. However, there are still data governance issues, such as data security risks, data privacy breaches, and difficulties in data management...
ver más
|
|
|
|