The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult to process using typical data processing techniques. Due to...
详细信息
Handwriting verification, a subset of signature verification, involves using handwritten text to verify or authorize someone's identification. Although simple handwriting can serve as a signature, it is often modi...
详细信息
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ...
详细信息
Psoriasis is a chronic recurrent disease formed by lesions such as erythema and scale. To evaluate the severity of psoriasis, the psoriasis area and severity index (PASI) score have been used in clinical trials and st...
详细信息
The Spinal cord acts as the central transmission line connecting the Brain with all other body organs. Vertebrae are 33 uneven bones stacked over one another that holds the whole skeleton structure. Scoliosis is the t...
详细信息
The success of any organization depends on the quality of the decisions made, and good decisions can be made by analyzing all the available data and knowledge of the organization. Decision Support Systems (DSSs) are u...
详细信息
Implementing price-based energy management programs to change the consumption pattern of residential consumers has become an indispensable solution to the operational challenges of smart distribution power systems. Ho...
详细信息
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio...
详细信息
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t...
详细信息
暂无评论