Nowadays, progressive parking systems still have disadvantages. It only serves to notify total parking rates to motorized vehicle users when they are still in the parking area. Besides, the payment uses cash. Meanwhil...
详细信息
We discuss an algorithm for generating all permutations of numbers between 1 and N. The algorithm is short and efficient, yet its behavior is not obvious from the code, mostly owing to the recursion. The discussion to...
详细信息
The MTDL 2011 workshop in its third edition aims to continue in the contribution and evaluation of the impact of multimedia technologies to e-Learning. This workshop is held in conjunction with the ACM Multimedia 2011...
详细信息
Digital technologies have changed the way supply chain operations are *** this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A tax...
详细信息
Digital technologies have changed the way supply chain operations are *** this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber *** analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new *** paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk *** system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the *** enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks.
In this work we provide numerical results concerning a silicon-on-insulator photonic neuromorphic circuit configured as a physical unclonable function. The proposed scheme is enhanced with the capability to be operate...
详细信息
The two-volume set LNAI 6591 and LNCS 6592 constitutes the refereed proceedings of the Third International Conference on Intelligent Information and Database Systems, ACIIDS 2011, held in Daegu, Korea, in April 2011. ...
详细信息
ISBN:
(数字)9783642200427
ISBN:
(纸本)9783642200410
The two-volume set LNAI 6591 and LNCS 6592 constitutes the refereed proceedings of the Third International Conference on Intelligent Information and Database Systems, ACIIDS 2011, held in Daegu, Korea, in April 2011.
The 110 revised papers presented together with 2 keynote speeches were carefully reviewed and selected from 310 submissions. The papers are thematically divided into two volumes; they cover the following topics: intelligent database systems, data warehouses and data mining, natural language processing and computational linguistics, semantic Web, social networks and recommendation systems, technologies for intelligent information systems, collaborative systems and applications, e-business and e-commerce systems, e-learning systems, information modeling and requirements engineering, information retrieval systems, intelligent agents and multi-agent systems, intelligent information systems, intelligent internet systems, intelligent optimization techniques, object-relational DBMS, ontologies and knowledge sharing, semi-structured and XML database systems, unified modeling language and unified processes, Web services and semantic Web, computer networks and communication systems.
The main purpose of this paper is to explore the influence of predation on the spread of a disease developed in the prey population where we assume that the prey has a social *** memory of the prey and the predator me...
详细信息
The main purpose of this paper is to explore the influence of predation on the spread of a disease developed in the prey population where we assume that the prey has a social *** memory of the prey and the predator measured by the time fractional derivative plays a crucial role in modeling the dynamical response in a predator–prey *** memory can be modeled to articulate the involvement of interacting species by the presence of the time fractional derivative in the considered *** the purpose of studying the complex dynamics generated by the presence of infection and the time-fractional-derivative we split our study into two cases. The first one is devotedto study the effect of a non-selective hunting on the spread of the disease, where the localstability of the equilibria is investigated. Further the backward bifurcation is obtainedconcerning basic reproduction rate of the infection. The second case is for explaining theimpact of selecting the weakest infected prey on the edge of the herd by a predator onthe prevalence of the infection, where the local behavior is scrutinized. Moreover, for thegraphical representation part, a numerical simulation scheme has been achieved usingthe Caputo fractional derivative operator.
Federated learning is a distributed machine learning method that is well-suited for the Industrial Internet of Things (IIoT) as it enables the training of machine learning models on distributed datasets. One of the mo...
详细信息
Caching of video files at the wireless edge, i.e., at the base stations or on user devices, is a key method for improving wireless video delivery. While global popularity distributions of video content have been inves...
详细信息
暂无评论