Simultaneous localization and mapping (SLAM) is an essential task for autonomous rover navigation in an unknown environment, especially if no absolute location information is available. This paper presents a computati...
详细信息
One important application of machine learning is the analysis of electroencephalographic recordings (EEG). Such oscillatory signals are noisy, non-stationary, full of artifacts, contain transients, and chaotic transit...
详细信息
High utility itemset mining (HUIM) is a well-known pattern mining technique. It considers the utility of the items that leads to finding high profit patterns which are more useful for real conditions. Handling large a...
详细信息
This study integrates Artificial Neural Networks (ANN) with Meteoblue Weather data to improve the performance of hybrid diesel and solar power plants by accurately predicting wind energy output Focusing on the Derawan...
详细信息
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and gen...
详细信息
Although many sophisticated methods for analyzing electroencephalography (EEG) recordings have been developed, they are rarely used in clinical practice. To create robust EEG biomarkers that provide insight into the c...
详细信息
3D printing at point of care is an emerging business and many hospitals are on their way of becoming manufacturers of medical devices. In order to comply with medical regulations, production processes need to be manag...
详细信息
One of the main problems in process discovery is obtaining correctness workflow when analysing a Large Event-Log with high concurrent control flow, complex short loops, and uncertainty. T+ is a novel method to constru...
详细信息
Waste management in urban areas has become an increasingly pressing challenge in Indonesia, given the population of 270.20 million people. Rapid urbanization and population growth have led to rising waste generation, ...
详细信息
e-KYC is used to recognize the user of the system and validate if they are real and has the authority to access the service. The process can be automated using machine learning models. One of the elements of e-KYC is ...
详细信息
暂无评论