We study the problem of fairly allocating a multiset M of m indivisible items among n agents with additive valuations. Specifically, we introduce a parameter t for the number of distinct types of items and study fair ...
详细信息
The advantages of graph neural networks (GNNs) in leveraging the graph topology of wireless networks have drawn increasing attentions. This paper studies the GNN-based learning approach for the sum-rate maximization i...
详细信息
The rapid growth of electronic commerce (e-commerce) has revolutionized the way Small and Medium-sized Enterprises (SMEs) conduct business, enabling them to reach global markets and unlock new growth opportunities. Ho...
The rapid growth of electronic commerce (e-commerce) has revolutionized the way Small and Medium-sized Enterprises (SMEs) conduct business, enabling them to reach global markets and unlock new growth opportunities. However, this digital transformation has also exposed SMEs to an escalating array of cybersecurity threats that could compromise their data, financial integrity, and reputation. Blockchain technology, known for its decentralized and immutable nature, has emerged as a potential solution to enhance the security and resilience of e-commerce operations for SMEs. This research paper aims to investigate the current state of cybersecurity preparedness among SMEs engaged in e-commerce and identify the prevalent threats they face in the digital landscape. To achieve this goal, the study incorporates systematic literature review (SLR) method to examine the best technological solution to address the cybersecurity issues faced by e-commerce organizations in this paper of SMEs operating in e-commerce to gather data on their security practices, incident history, and perceptions of cybersecurity risks. In the context of this research, blockchain technology will be explored as a potential mechanism to enhance the security of e-commerce operations for SMEs. The inherent features of blockchain, such as decentralization, transparency, and immutability, could help protect sensitive data and thwart cyberattacks. By exploring the integration of blockchain into e-commerce systems, the research aims to shed light on the potential benefits and challenges associated with its adoption by SMEs. The research findings will not only shed light on the prevailing cybersecurity practices within SMEs and highlight their vulnerabilities but will also explore how blockchain technology can be leveraged to address these challenges. By understanding these patterns and exploring the feasibility of blockchain integration, the research aims to provide comprehensive recommendations for enhancing cy
A renewable-energy-source-selection (RES-selection) is a complex multi-criteria-decision-making (MCDM) challenge to select the optimal RES on the basis of some criteria. The complexity exists due to the relationship o...
A renewable-energy-source-selection (RES-selection) is a complex multi-criteria-decision-making (MCDM) challenge to select the optimal RES on the basis of some criteria. The complexity exists due to the relationship of miscellaneous contradictory standards, unknown and vague information. To deal with inherent uncertainties and vague information, the theory of Ambiguous intuitionistic fuzzy set (AIFS) has been introduced recently. This study is an effort to provide a RES-classification method under the AIFS environment. This can be achieved by proposing new aggregation operators, namely the ambiguous-intuitionistic weighted-averaging (AI- W A) and the ambiguous-intuitionistic ordered-weighted-averaging (AI-OW A), to fuse AIFNs input information. Based on the proposed the AI-WA and the AI-OW A operators, we develop an approach for RES- classification problem and applied it to classify four considered RESs.
The dimensions of characters in a vehicle number plate are clearly specified by the Motor Vehicles Act of India. Any deviation from the specifications attracts penalty. Presently the inspecting authorities are not tak...
详细信息
In this paper, a mathematical model is developed to describe the evolution of the concentration of compounds through a gas chromatography column. The model couples mass balances and kinetic equations for all component...
详细信息
Actor-critic methods are widely used in offline reinforcement learning practice, but are not so well-understood theoretically. We propose a new offline actor-critic algorithm that naturally incorporates the pessimism ...
详细信息
If U is a unitary operator on a separable complex Hilbert space H, an application of the spectral theorem says there is a conjugation C on H (an antilinear, involutive, isometry on H) for which CUC = U∗. In this paper...
详细信息
Inverse design has proved to be a powerful tool in photonics for compact, high-performance devices. To date, applications have been limited to linear systems but have rarely been investigated or demonstrated in nonlin...
详细信息
暂无评论