Personas are crucial in software development processes, particularly in agile settings. However, no effective tools are available for generating personas from user feedback in agile software development processes. To ...
详细信息
Clustering is one of the data analysis activities for grouping data into several categories with the same characteristics based on certain criteria. The problem that often arises in the clustering process is getting o...
详细信息
Artificial intelligence-driven Chatbots, especially large language models (LLMs) like GPT-4, represent significant progress in digital education. These models excel in mimicking human-like text and transforming learni...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s ...
详细信息
Unmanned Aerial Vehicles(UAVs)provide a reliable and energyefficient solution for data collection from the Narrowband Internet of Things(NB-IoT)***,the UAV’s deployment optimization,including locations of the UAV’s stop points,is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection *** this regard,this paper proposes GainingSharing Knowledge(GSK)algorithm for optimizing the UAV’s *** GSK,the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire *** superiority of using GSK in the tackled problem is verified by simulation in seven *** provides significant results in all seven scenarios compared with other four optimization algorithms used before with the same ***,the NB-IoT is proposed as the wireless communication technology between the UAV and IoT devices.
Quantum encoding is a process to transform classical information into quantum states. It plays a crucial role in using quantum algorithms to solve classical problems, especially in quantum machine learning tasks. Ther...
详细信息
ISBN:
(纸本)9798350320725
Quantum encoding is a process to transform classical information into quantum states. It plays a crucial role in using quantum algorithms to solve classical problems, especially in quantum machine learning tasks. There are many QE methods. It is very difficult to determine which QE method to choose to improve classification accuracy. Therefore, this paper will analyze several QE methods. Training and testing on Iris flower datasets were performed in a architecture quantum circuit and some performances parameters were evaluated. The expected result is that we can compare the classification accuracy of some of these Quantum encodings.
In this study, a method of time series classification is considered. Classification is performed using forecasting models. It is assumed that processed time series are of different natures, i.e., they belong to differ...
In this study, a method of time series classification is considered. Classification is performed using forecasting models. It is assumed that processed time series are of different natures, i.e., they belong to different classes. Each class has its forecasting model. Thus, an unknown time series is presented to the models to evaluate forecasting errors. The classified time series is assigned to the class with the winning forecasting model. In the study, Fuzzy Cognitive Maps are used to build forecasting models. Prior to forecasting, the processed raw time series are preprocessed. Six different error functions having the most significant influence on classification are used. The error functions come from root mean square error and mean percentage error.
In the contemporary landscape of data-driven decision-making, businesses are increasingly harnessing customer segmentation as a strategic tool for tailoring their marketing endeavors. his research employs the Cross-In...
In the contemporary landscape of data-driven decision-making, businesses are increasingly harnessing customer segmentation as a strategic tool for tailoring their marketing endeavors. his research employs the Cross-Industry Standard Process for Data Mining (CRISP-DM) methodology to investigate customer segmentation for targeted marketing. It encompasses phases such as data understanding, preprocessing, modeling, evaluation, deployment, and monitoring. Our study applies K-Means and Hierarchical Clustering algorithms to create customer segments. While Hierarchical Clustering provides a visually insightful segmentation structure, K-Means excels in terms of the Silhouette score, a crucial clustering metric. Overall, K-Means Clustering emerges as the superior choice due to its interpretability and comprehensive utility. This research contributes to data-driven marketing by offering insights for businesses seeking to enhance marketing strategies, elevate customer engagement, and boost revenue.
When interacting with each other, humans adjust their behavior based on perceived trust. However, to achieve similar adaptability, robots must accurately estimate human trust at sufficiently granular timescales during...
详细信息
The degradation of air quality in hilly regions due to the influx of tourists and vehicular traffic is a significant global concern. This research focuses on assessing the impact of these factors specifically in the U...
The degradation of air quality in hilly regions due to the influx of tourists and vehicular traffic is a significant global concern. This research focuses on assessing the impact of these factors specifically in the Uttarakhand region. While various other factors contribute to the problem, our study aims to quantify the proportion of these two inputs. To achieve this, we employ data collection methods and develop innovative deep learning techniques tailored to the issue. The novelty of our work lies in the application of these novel methods to address the problem at hand. By conducting this study, researchers have gained insights into the extent of the impact and its implications for the region. The findings of our research contribute to the existing body of knowledge and provide valuable information for policymakers, environmentalists, and stakeholders involved in addressing air quality concerns in hilly regions.
Transmitters (MANETs) are particularly appropriate for uses like special outings, satellite communications in regions with no radio electric grid, crises and things in the environment, as well as diagnostic interventi...
详细信息
ISBN:
(纸本)9798350322309
Transmitters (MANETs) are particularly appropriate for uses like special outings, satellite communications in regions with no radio electric grid, crises and things in the environment, as well as diagnostic interventions for the armed forces. Despite the fact that MANETs have evolved into infrastructure-free, soul, and quickly moveable wireless technologies. Privacy may be the key IoT weak point due to the frameworks' flexibility and the constantly changing node mobility. Due to this, it is especially susceptible to numerous assaults, such as software modification, tunneling, and espionage. On MANET, security threats are more serious than problems with the quality of service (QoS). Invasion monitoring, which alters your system to identify further breach holes, is therefore the best way to protect MANET privacy. The ability to detect intrusions is essential for providing protection and acting as an extra layer of restrictions. The loss of the node's energy source might also affect the cellular station's capacity to send messages, which is solely dependent on system life. As a result, the protocol was created and this connection was chosen as the best, most dependable way to extend the MANETs for travel. It is challenging to provide secure and energy-efficient routing in this sort of network due to its dynamic topology and resource limitations. To address the problems of energy safety and security, we provide a hybrid technique of cat slapped solo algorithms (C-SSA), which selects the finest leaps in route advancement. This approach would enable confidence secure efficient energy traveling in MANETs. Fuzzy clustering is utilized initially, and number of clusters (CHs) are selected according to the importance of recent, implicit, and direct trust. Also discovered were nodes depending on the trust threshold value. Even the CHs participate in wireless multi-hop routing, and the best routes are selected here based on lag, throughput, and connection throughout this context
暂无评论