Few studies have explored recurrent neural network models in municipal solid waste (MSW) generation forecasting regarding the inefficiency of conventional and probabilistic tools. This study aimed ...
{"title":"Use of Socio-economic, Climatic, and Land use Land Cover Patterns in Solid Waste Forecasting with Integrated Gradient LSTNet Based Model in Lomé, Togo","authors":"Kanlanféi Sambiani, Yendoubé Lare, Adamou Zanguina, Satyanarayana Narra","doi":"10.1080/08839514.2024.2387504","DOIUrl":"https://doi.org/10.1080/08839514.2024.2387504","url":null,"abstract":"Few studies have explored recurrent neural network models in municipal solid waste (MSW) generation forecasting regarding the inefficiency of conventional and probabilistic tools. This study aimed ...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"30 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-05DOI: 10.1080/08839514.2024.2385857
Xiumu Weng, Ding Pan, Yun Jin
Consumer trust is a crucial issue in social commerce, i.e. how to help consumers find trustworthy products. However, the current evaluation system in the market has significant shortcomings. This c...
{"title":"An Adaptive Distributed Consumer Trust Model for Social Commerce","authors":"Xiumu Weng, Ding Pan, Yun Jin","doi":"10.1080/08839514.2024.2385857","DOIUrl":"https://doi.org/10.1080/08839514.2024.2385857","url":null,"abstract":"Consumer trust is a crucial issue in social commerce, i.e. how to help consumers find trustworthy products. However, the current evaluation system in the market has significant shortcomings. This c...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"44 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-05DOI: 10.1080/08839514.2024.2385268
Lu Zhou, Yiheng Chen, Xinmin Li, Yanan Li, Ning Li, Xiting Wang, Rui Zhang
Named entity recognition (NER) is a crucial step in extracting medical information from Chinese text, and fine-tuning large language models (LLMs) for this task is an effective approach. However, f...
{"title":"A New Adapter Tuning of Large Language Model for Chinese Medical Named Entity Recognition","authors":"Lu Zhou, Yiheng Chen, Xinmin Li, Yanan Li, Ning Li, Xiting Wang, Rui Zhang","doi":"10.1080/08839514.2024.2385268","DOIUrl":"https://doi.org/10.1080/08839514.2024.2385268","url":null,"abstract":"Named entity recognition (NER) is a crucial step in extracting medical information from Chinese text, and fine-tuning large language models (LLMs) for this task is an effective approach. However, f...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"47 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the integration of intelligent industrial process monitoring, quality prediction, and predictive maintenance solutions has garnered significant attention, driven by rapid advanceme...
近年来,在快速发展的推动下,智能工业过程监控、质量预测和预测性维护解决方案的集成受到了广泛关注。
{"title":"Reinforcement Learning for Autonomous Process Control in Industry 4.0: Advantages and Challenges","authors":"Nuria Nievas, Adela Pagès-Bernaus, Francesc Bonada, Lluís Echeverria, Xavier Domingo","doi":"10.1080/08839514.2024.2383101","DOIUrl":"https://doi.org/10.1080/08839514.2024.2383101","url":null,"abstract":"In recent years, the integration of intelligent industrial process monitoring, quality prediction, and predictive maintenance solutions has garnered significant attention, driven by rapid advanceme...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"72 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1080/08839514.2024.2384333
Aleksandar Seizovic, Steven Goh, David Thorpe, Lucas Skoufa
This manuscript critically examines existing research on cyber battle management systems (CBMS) and underscores the importance of advancing complex structure thinking, cybernetics, wicked problem-s...
{"title":"Cyber Battle Management Systems (CBMS) is Considered as Systems of Systems (SoS) and Emergent Behavior is Present, where Viable System Model (VSM) only Controls System Variety","authors":"Aleksandar Seizovic, Steven Goh, David Thorpe, Lucas Skoufa","doi":"10.1080/08839514.2024.2384333","DOIUrl":"https://doi.org/10.1080/08839514.2024.2384333","url":null,"abstract":"This manuscript critically examines existing research on cyber battle management systems (CBMS) and underscores the importance of advancing complex structure thinking, cybernetics, wicked problem-s...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"28 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-30DOI: 10.1080/08839514.2024.2385856
Abubaker A. Alguttar, Osama A. Shaaban, Remzi Yildirim
The proliferation of misinformation across various domains necessitates robust detection mechanisms. With its ability to analyze vast datasets, machine learning emerges as a powerful tool. This res...
{"title":"Optimized Fake News Classification: Leveraging Ensembles Learning and Parameter Tuning in Machine and Deep Learning Methods","authors":"Abubaker A. Alguttar, Osama A. Shaaban, Remzi Yildirim","doi":"10.1080/08839514.2024.2385856","DOIUrl":"https://doi.org/10.1080/08839514.2024.2385856","url":null,"abstract":"The proliferation of misinformation across various domains necessitates robust detection mechanisms. With its ability to analyze vast datasets, machine learning emerges as a powerful tool. This res...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"28 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-29DOI: 10.1080/08839514.2024.2385249
Elena Flondor, Liliana Donath, Mihaela Neamtu
This paper delves into the analysis of card fraud within the banking system. Its aim is to gain a comprehensive understanding of fraud in the banking sector and explore effective detection techniqu...
本文深入分析了银行系统内的银行卡欺诈行为。其目的是全面了解银行业的欺诈行为,并探索有效的检测技术。
{"title":"Automatic Card Fraud Detection Based on Decision Tree Algorithm","authors":"Elena Flondor, Liliana Donath, Mihaela Neamtu","doi":"10.1080/08839514.2024.2385249","DOIUrl":"https://doi.org/10.1080/08839514.2024.2385249","url":null,"abstract":"This paper delves into the analysis of card fraud within the banking system. Its aim is to gain a comprehensive understanding of fraud in the banking sector and explore effective detection techniqu...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"139 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-26DOI: 10.1080/08839514.2024.2381882
Faeiz Alserhani
At present, encrypted data is the cornerstone of Internet communication, providing the maximum degree of privacy and security protection for all transmitted data while shielding users against poten...
{"title":"Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments","authors":"Faeiz Alserhani","doi":"10.1080/08839514.2024.2381882","DOIUrl":"https://doi.org/10.1080/08839514.2024.2381882","url":null,"abstract":"At present, encrypted data is the cornerstone of Internet communication, providing the maximum degree of privacy and security protection for all transmitted data while shielding users against poten...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"14 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-24DOI: 10.1080/08839514.2024.2381317
Bastian Engelmann, Anna-Maria Schmitt, Moritz Heusinger, Vladyslav Borysenko, Niklas Niedner, Jan Schmitt
Changeover events occur in every industrial production when a machine is prepared and setup for production of the next product variant. Changeover times must be acquired with a high degree of valid...
{"title":"Detecting Changeover Events on Manufacturing Machines with Machine Learning and NC data","authors":"Bastian Engelmann, Anna-Maria Schmitt, Moritz Heusinger, Vladyslav Borysenko, Niklas Niedner, Jan Schmitt","doi":"10.1080/08839514.2024.2381317","DOIUrl":"https://doi.org/10.1080/08839514.2024.2381317","url":null,"abstract":"Changeover events occur in every industrial production when a machine is prepared and setup for production of the next product variant. Changeover times must be acquired with a high degree of valid...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"2 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-24DOI: 10.1080/08839514.2024.2378274
Fernando Pérez Nava, Isabel Sánchez Berriel
This paper presents an automatic 3D building reconstruction methodology for historical urban maps. It uses facade and openings detection on the maps, followed by rectification, regularization, and ...
{"title":"Automatic Detection and 3D Reconstruction of Buildings from Historical Maps","authors":"Fernando Pérez Nava, Isabel Sánchez Berriel","doi":"10.1080/08839514.2024.2378274","DOIUrl":"https://doi.org/10.1080/08839514.2024.2378274","url":null,"abstract":"This paper presents an automatic 3D building reconstruction methodology for historical urban maps. It uses facade and openings detection on the maps, followed by rectification, regularization, and ...","PeriodicalId":8260,"journal":{"name":"Applied Artificial Intelligence","volume":"61 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}