ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
1 Yibin University, School of Computer Science and Technology, Yibin, China 2 Southwest Petroleum University, School of Computer and Software, Chengdu, China Network security is the core guarantee for ...
Abstract: Nonintrusive load monitoring (NILM) can effectively evaluate and track fine-grained energy consumption at the appliance level by using instruments or devices such as smart meters, providing ...
Abstract: The K-nearest neighbors (kNNs) algorithm, a cornerstone of supervised learning, relies on similarity measures constrained by real-number-based distance metrics. A critical limitation of ...
An analysis of star movements from the Gaia spacecraft reveals that the Small Magellanic Cloud — a satellite galaxy bound to the Milky Way — is being torn apart by its larger neighbor. When you ...
1 Department of Psychiatry, The First Affiliated Hospital of Chongqing Medical University, Chongqing, China 2 Mental Health Center, University-Town Hospital of Chongqing Medical University, Chongqing, ...
Matrix Executions, an agency-only broker dealer and trading technology provider, has enhanced its US listed options algorithm technology suite with new price discovery and liquidity-seeking tools. The ...
ABSTRACT: To ensure the efficient operation and timely maintenance of wind turbines, thereby enhancing energy security, it is critical to monitor the operational status of wind turbines and promptly ...
A sophisticated cyber-espionage attack used by notorious Russian advanced persistent threat (APT) Fancy Bear at the outset of the current Russia-Ukraine war demonstrates a novel attack vector that a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results