作者:
Oleksandra BulgakovaViacheslav ZosimovAutomation
Robotics and Computer Programming P.M Platonov Educational and Scientific Institute of Computer Engineering Odesa National University of Technology Odesa Ukraine
This paper presents the impact of external factors on consumer purchasing behavior in e-commerce. It examines how variables such as time of day, weather conditions, economic fluctuations, social influences, cultural t...
详细信息
ISBN:
(数字)9798331542634
ISBN:
(纸本)9798331542641
This paper presents the impact of external factors on consumer purchasing behavior in e-commerce. It examines how variables such as time of day, weather conditions, economic fluctuations, social influences, cultural trends, seasonal events, and others can influence online purchasing decisions. Using data from an e-commerce website, a model was built using GIA GMDH to analyze the impact of these factors on consumer purchasing behavior. The study found significant correlations between seemingly minor external factors and consumer behavior, highlighting the importance of holistic analysis for companies to adapt their strategies and improve e-commerce performance.
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime platform, Intel's open-source Java virtual machine. We introduced the optimization technologies for synchronization removal and object stack allocation, as well as the runtime deoptimization and compensation work. The deoptimization and compensation technologies are crucial for a practical Escape analysis in open world. We evaluated the runtime efficiency of the deoptimization and compensation work on benchmarks like SPECjbb2000 and SPECjvm98.
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ...
详细信息
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
Heart disease, known as cardiovascular disease has been one of the main causes of death worldwide in recent years. It is affected by various risk factors such as high blood pressure, high cholesterol, diabetes, smokin...
详细信息
Developing vehicles with the Internet of Thing technology including driver health monitoring systems, driver safety systems, and accident prevention has drawn the attention of researchers in the last few years. The mo...
详细信息
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due to the impossibility of changing the image (such as medical data where high accuracy is required and the appearance of artifacts is unacceptable) or due to the presence of a higher distortion of the container. This algorithm is based on DWT, SVD and operations in the field by modulo 256. The software implementation of the algorithm was developed (using the Accord and *** libraries to implement DWT, SVD). The software implementation of the algorithm was tested. This algorithm has advantages in the form of normalization of the average error, but it needs further research to improve its performance.
The number of annual scientific publications is growing year by year, which has led to the accumulation and formation of large databases. This increases the complexity of the search for relevant articles. Modern searc...
详细信息
The report considers the peculiarities of the distribution of computing resources in cloud systems. The most used classification of existing technologies of cloud services is considered. The advantages and disadvantag...
详细信息
暂无评论