Suggested Topics within your search.
Suggested Topics within your search.
- English language 2
- Moral and ethical aspects 2
- Public relations 2
- ART / Digital 1
- Advertising 1
- Agriculture 1
- Business English 1
- Business and Management 1
- Business writing 1
- Communication 1
- Computer animation 1
- Computer graphics 1
- Digital cinematography 1
- Digital techniques 1
- Economic aspects 1
- Electronic circuits 1
- Fault tolerance (Engineering) 1
- Führung 1
- Grammar 1
- Hospitality industry 1
- Image processing 1
- Information technology 1
- Journalistic ethics 1
- Leadership 1
- Maintainability (Engineering) 1
- Management 1
- Marketing 1
- Photography 1
- Professional ethics 1
- Public relations personnel 1
-
1021
Overall Efficiency of Four-Stage Structure with Undesirable Outputs: A New SBM Network DEA Model
Published 2022-01-01“…The proposed model differs from those proposed by other studies in the fact that all DEA models of benchmarking consider input and output values to be linear. However, in real-world problems, many DMU inputs and outputs have nonlinear values (values are the coefficients of inputs or outputs in modeling and can be the price of desirable outputs or the cost of inputs and undesirable outputs), something which was taken into account in the modeling process in this study. …”
Get full text
Article -
1022
A Parametric Method for Ranking Intuitionistic Fuzzy Numbers and Its Application to Solve Intuitionistic Fuzzy Network Data Envelopment Analysis Models
Published 2020-01-01“…Also, in three appropriate examples, the validity of the suggested method and its capacity to solve real-world problems are illustrated.…”
Get full text
Article -
1023
Hybrid clustering strategies for effective oversampling and undersampling in multiclass classification
Published 2025-01-01“…Abstract Multiclass imbalance is a challenging problem in real-world datasets, where certain classes may have a low number of samples because they correspond to rare occurrences. …”
Get full text
Article -
1024
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…Experimental results on two real-world social networks of different scales show that the proposed method can effectively improve the performance of social network alignment tasks.…”
Get full text
Article -
1025
Impulsive Control and Synchronization of Complex Lorenz Systems
Published 2014-01-01“…Nonlinear systems involving impulse effects, appear as a natural description of observed evolution phenomena of several real world problems; For example, many biological phenomena involving thresholds, bursting rhythm models in medicine and biology, optimal control models in economics, population dynamics and so forth do exhibit impulsive effects. …”
Get full text
Article -
1026
Operational Risk Aggregation Based on Business Line Dependence: A Mutual Information Approach
Published 2016-01-01“…The experiment on a real-world Chinese bank operational risk data set shows that using mutual information to model the dependencies between business lines is more reasonable than linear correlation.…”
Get full text
Article -
1027
Optimizing Transit Network Departure Frequency considering Congestion Effects
Published 2024-01-01“…The effectiveness of the proposed model and algorithm is demonstrated through two test examples, one of which involves a real-world scenario comprising over 130 transit lines. …”
Get full text
Article -
1028
On the Asymptotic Behavior of the Maximum and Record Values of Multivariate Data Using the R-ordering principle
Published 2024-12-01“…Finally, we demonstrate in a real-world scenario how to model multivariate extreme data sets utilizing the R-ordering principle and different norms.…”
Get full text
Article -
1029
Research Progress of Causal Inference in Bias Elimination
Published 2025-01-01“…The natural language processing (NLP) models have recently gained widespread attention and are increasingly being applied to real-world tasks. However, due to the presence of bias, the application of NLP models in specialized fields has led to various issues. …”
Get full text
Article -
1030
Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers
Published 2024-01-01“…The simulation section, divided into two parts, demonstrates the effectiveness of the algorithm: one part showcases its scalability in a large-scale system, and the other applies it to a real-world power system using the IEEE 123-node system. …”
Get full text
Article -
1031
Exploiting Blockchain Technology for Enhancing Digital Twins’ Security and Transparency
Published 2025-01-01“…In particular, we demonstrate how blockchain can improve critical aspects of the security and transparency of digital twins by analyzing a real-world scenario and evaluating produced experimental data. …”
Get full text
Article -
1032
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01“…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
Get full text
Article -
1033
Comparison of Ignition Control Techniques in HCCI Engines from Theoretical and Practical Perspectives
Published 2025-01-01“…This paper aims to delve into the theoretical and practical aspects of ignition control methods in HCCI engines, highlighting the differences and challenges between theoretical models and real-world applications.…”
Get full text
Article -
1034
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01“…Generated in a controlled testbed using advanced simulation tools Mininet(v2.3.0) and real internet traffic captured from real-world internet browsing sessions via Google Chrome and recorded using Wireshark(v3.0.2), this dataset is essential for researchers and practitioners working on TCP-SYN flood DDoS attack detection and machine learning-based traffic classification. …”
Get full text
Article -
1035
Development and trend of IoT identifier technology
Published 2018-06-01“…The Internet of things has broken through the traditional human-to-human communication model and introduced the perception of the real world,thereby establishing the communication between things,human being and things,as well as achieving the dynamic acquisition of information,intelligent processing,and seamless interaction and collaborative sharing.The IoT identifier that identifies and distinguishes different target objects is the basis and prerequisite for achieving the above mentioned information communications and various IoT applications.The IoT identifier is used to uniquely identify the physical and logical entities within a certain range,so that the network and application can manage the target objects based on it,and the acquisition,processing,transmission,and exchange of related information is the most important and fundamental resource in IoT Internet of things.Moreover,it is the “identity card” of IoT object.In order to uniquely identify various heterogeneous resources within a certain range,and to obtain and transmit related information based on the control and management of target objects,it is necessary to provide a identification resolution service based on the IoT identifier,and realize different levels of mapping between identifiers.…”
Get full text
Article -
1036
Semi-supervised Gaussian process classification algorithm addressing the class imbalance
Published 2013-05-01“…The traditional supervised learning is difficult to deal with real-world datasets with less labeled information when the training sets class is imbalanced.Therefore,a new semi-supervised Gaussian process classification of address-ing was proposed.The semi-supervised Gaussian process was realized by calculating the posterior probability to obtain more accurate and credible labeled data,and embarking from self-training semi-supervised methods to add class label into the unlabeled data.The algorithm makes the distribution of training samples relatively balance,so the classifier can adaptively optimized to obtain better effect of classification.According to the experimental results,when the circum-stances of training set are class imbalance and much lack of label information,The algorithm improves the accuracy by obtaining effective labeled in comparison with other related works and provides a new idea for addressing the class im-balance is demonstrated.…”
Get full text
Article -
1037
The history, current state and future possibilities of the non-invasive brain computer interfaces
Published 2025-03-01“…BCIs have evolved from early studies in neurophysiology to real-world applications that convert brain impulses into executable commands. …”
Get full text
Article -
1038
A Similarity Classifier with Bonferroni Mean Operators
Published 2016-01-01“…The new proposed similarity classifier variants are tested on four real world medical research related data sets. The results are compared with results from two previously presented similarity classifiers, one based on the generalized mean and another based on an arithmetic mean operator. …”
Get full text
Article -
1039
Feature Extraction and Classification of Music Content Based on Deep Learning
Published 2022-01-01“…To study the use of in-depth training in extracting and classifying the content of music samples, the work offers an algorithm for identifying and classifying musical genres based on a deep network of beliefs, enabling it to be used to extract and classify traditional Chinese musical instruments, and using real-world experiments to test its performance after training. …”
Get full text
Article -
1040
An Extreme Learning Machine-Based Community Detection Algorithm in Complex Networks
Published 2018-01-01“…Furthermore, results of extensive experiments undertaken on computer-generated networks and real-world datasets illustrate acceptable performances of the introduced algorithm in comparison with other typical community detection algorithms.…”
Get full text
Article