ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Economy
Computing
Languages
Literature
Technology
Social Sciences
Computing
Mathematics
Research
all records (71)

Languages
English
Portuguese
Spanish
German
French

Countries
Indonesia
USA
Brazil
South Africa
Ukraine
Italy
Australia
Germany
Canada
Switzerland
all records (72)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
47.612  Articles
1 of 4.762 pages  |  10  records  |  more records»
The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can res... see more

The task of this article is to make a forecast of the container flow (which is being mastered by intermodal transport operator) in order to determine in future such moment when the purchase of new transport unit will be most cost-effective. Here the analy... see more

The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can res... see more

A method based on improved fuzzy theory of evidence was presented to solve the problem that there exist all kinds of uncertainty in the process of information security risk assessment. The hierarchy model for the information systems risk assessment was es... see more

Logistic regression plays an important role in machine learning. People excitingly use it in conceptual matching yet with some details to be understood further. This paper aims to present a reasonable statement on logistic regression based on fuzzy sets a... see more

Managers nowadays face challenging decisions on daily basis and must weigh a growing number of factors while making such decisions. Previously, such judgments were frequently assessed solely based on a single criterion, such as profit or cost. Cost or pro... see more

Vast majority of data mining algorithms have been designed to work on centralized data, unfortunately however, almost all of nowadays data sets are distributed both geographically and conceptually. Due to privacy and computation cost, centralizing distrib... see more

1 of 4.762 pages  |  10  records  |  more records»