11   Artículos

 
en línea
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis    
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yizhi Liu, Rutian Qing, Yijiang Zhao and Zhuhua Liao    
Road intersections are essential to road networks. How to precisely recognize road intersections based on GPS data is still challenging in intelligent transportation systems. Road intersection recognition involves detecting intersections and recognizing ... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Mahmoud Maher ElMorshedy, Radwa Fathalla and Yasser El-Sonbaty    
Compactness and separability of data points are two important properties that contribute to the accuracy of machine learning tasks such as classification and clustering. We propose a framework that enhances the goodness criteria of the two properties by ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ayman Taha, Bernard Cosgrave and Susan Mckeever    
Insurance is a data-rich sector, hosting large volumes of customer data that is analysed to evaluate risk. Machine learning techniques are increasingly used in the effective management of insurance risk. Insurance datasets by their nature, however, are o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Luís Oliveira, Rodrigo Rocha Silva and Jorge Bernardino    
Wine is the second most popular alcoholic drink in the world behind beer. With the rise of e-commerce, recommendation systems have become a very important factor in the success of business. Recommendation systems analyze metadata to predict if, for examp... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Konstantinos Vantas and Epaminondas Sidiropoulos    
The identification and recognition of temporal rainfall patterns is important and useful not only for climatological studies, but mainly for supporting rainfall?runoff modeling and water resources management. Clustering techniques applied to rainfall dat... ver más
Revista: Hydrology    Formato: Electrónico

 
en línea
Dong-Kyu Chae, Sung-Jun Park, Eujeanne Kim, Jiwon Hong and Sang-Wook Kim    
Malware are developed for various types of malicious attacks, e.g., to gain access to a user?s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »