ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Technology
Biology
Research
Economy
Pure sciences
Physical
Computing
Agronomy and forestry
Social Sciences
all records (74)

Languages
English
Spanish
Portuguese
German
Finnish

Countries
Indonesia
USA
Brazil
Ukraine
Poland
Italy
Canada
South Africa
Germany
Spain
all records (77)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
24.179  Articles
1 of 2.419 pages  |  10  records  |  more records»
The increased individuation and variety of logistics processes have spurred a strong demand for a new process customization strategy. In order to satisfy the increasingly specific requirements and demands of customers, organizations have been developing m... see more

Shape similarity measurement model is often used to solve shape-matching problems in geospatial data matching. It is widely used in geospatial data integration, conflation, updating and quality assessment. Many shape similarity measurements apply only to ... see more

Human mobility is closely associated with places. Due to advancements in GPS devices and related sensor technologies, an unprecedented amount of tracking data has been generated in recent years, thus providing a new way to investigate the interactions bet... see more

Trajectory pattern mining is becoming increasingly popular because of the development of ubiquitous computing technology. Trajectory data contain abundant semantic and geographic information that reflects people’s movement patterns, i.e., who is performin... see more

Trajectory pattern mining is becoming increasingly popular because of the development of ubiquitous computing technology. Trajectory data contain abundant semantic and geographic information that reflects people’s movement patterns, i.e., who is performin... see more

Data security by using an alphanumeric combination password is no longer used, so it needs to be added security that is difficult to be manipulated by certain people. One type of security is the type of biometrics technology using face recognition which h... see more

These days, due to growing the e-commerce sites, access to information about items is easier than past. But because of huge amount of information, we need new filtering techniques to find interested information faster and more accurate. Therefore Recommen... see more

These days, due to growing the e-commerce sites, access to information about items is easier than past. But because of huge amount of information, we need new filtering techniques to find interested information faster and more accurate. Therefore Recommen... see more

 The cost of hospitalization from a patient can be estimated by performing a cluster of patient. One of the algorithms that is widely used for clustering is K-means. K-means algorithm, based on distance still has weaknesses in terms of measuring the ... see more

1 of 2.419 pages  |  10  records  |  more records»