|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|
|
|
|
|
Yizhi Liu, Rutian Qing, Yijiang Zhao and Zhuhua Liao
Road intersections are essential to road networks. How to precisely recognize road intersections based on GPS data is still challenging in intelligent transportation systems. Road intersection recognition involves detecting intersections and recognizing ...
ver más
|
|
|
|
|
|
|
Mahmoud Maher ElMorshedy, Radwa Fathalla and Yasser El-Sonbaty
Compactness and separability of data points are two important properties that contribute to the accuracy of machine learning tasks such as classification and clustering. We propose a framework that enhances the goodness criteria of the two properties by ...
ver más
|
|
|
|
|
|
|
Ayman Taha, Bernard Cosgrave and Susan Mckeever
Insurance is a data-rich sector, hosting large volumes of customer data that is analysed to evaluate risk. Machine learning techniques are increasingly used in the effective management of insurance risk. Insurance datasets by their nature, however, are o...
ver más
|
|
|
|
|
|
|
Luís Oliveira, Rodrigo Rocha Silva and Jorge Bernardino
Wine is the second most popular alcoholic drink in the world behind beer. With the rise of e-commerce, recommendation systems have become a very important factor in the success of business. Recommendation systems analyze metadata to predict if, for examp...
ver más
|
|
|
|
|
|
|
Konstantinos Vantas and Epaminondas Sidiropoulos
The identification and recognition of temporal rainfall patterns is important and useful not only for climatological studies, but mainly for supporting rainfall?runoff modeling and water resources management. Clustering techniques applied to rainfall dat...
ver más
|
|
|
|
|
|
|
Dong-Kyu Chae, Sung-Jun Park, Eujeanne Kim, Jiwon Hong and Sang-Wook Kim
Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ...
ver más
|
|
|
|