Recent Articles

Open access

ISSN: 2666-7649
CN: 61-1530/TN
p-ISSN: 2097-3187

Survival strategies for family-run homestays: analyzing user reviews through text mining

Online booking of homestays through e-travel portals is based on the virtual brand and perception, which are largely affected by user-generated electronic word-of-mouth (eWOM). With the objective of...

Share article

Development of a machine learning model for predicting abnormalities of commercial airplanes

Airplanes are a social necessity for movement of humans, goods, and other. They are generally safe modes of transportation; however, incidents and accidents occasionally occur. To prevent aviation accidents,...

Share article

Machine acceleration time series prediction for dimensional accuracy of 3D printed parts

This study explores the influence of infill patterns on machine acceleration prediction in the realm of three-dimensional (3D) printing, particularly focusing on extrusion technology. Our primary objective...

Share article

Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks

In the burgeoning field of anomaly detection within attributed networks, traditional methodologies often encounter the intricacies of network complexity, particularly in capturing nonlinearity and sparsity....

Share article

Understanding users' effective use of generative conversational AI from a media naturalness perspective: A hybrid SEM-ANN approach

Although generative conversational artificial intelligence (AI) can answer questions well and hold conversations as a person, the semantic ambiguity inherent in text-based communication poses challenges...

Share article

An Explainable Feature Selection Framework for Web Phishing Detection with Machine Learning

In the evolving landscape of cyber threats, phishing attacks pose significant challenges, particularly through deceptive webpages designed to extract sensitive information under the guise of legitimacy....

Share article

Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology

Open innovation communities (OICs) are important for the development of modern enterprises. However, there are still many safety hazards and trust crises on community platforms. This paper proposes...

Share article

Effects of feature selection and normalization on network intrusion detection

The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence (AI) techniques (such as machine learning (ML) and deep learning...

Share article

Digital Volunteer Services in Emergency Situations: Typological Characteristics, Advantages, and Challenges

Volunteer engagement in emergency management, focusing on mitigating adverse consequences, has attracted scholarly and practitioner attention. Digital volunteering helps overcome the limitations of...

Share article

Forecast Uncertainties Real-Time Data-Driven Compensation Scheme for Optimal Storage Control

This study introduces a real-time data-driven battery management scheme designed to address uncertainties in load and generation forecasts, which are integral to an optimal energy storage control system....

Share article

Dual-market quantitative trading: The dynamics of liquidity and turnover in financial markets

Financial market liquidity is a popular research topic. Investor-driven research uses the turnover rate to measure liquidity and generally finds that the higher the stock turnover rate, the lower the...

Share article

A Model for Predicting Dropout of Higher Education Students

Higher education institutions are becoming increasingly concerned with the retention of their students. This work is motivated by the interest in predicting and reducing student dropout, and consequently...

Share article

Comparative study of IoT- and AI-based computing disease detection approaches

The emergence of different computing methods such as cloud-, fog-, and edge-based Internet of Things (IoT) systems has provided the opportunity to develop intelligent systems for disease detection....

Share article

Using multi-criteria decision-making and machine learning for football player selection and performance prediction: a systematic review

Evaluating and selecting players to suit football clubs and decision-makers (coaches, managers, technical, and medical staff) is a difficult process from a managerial-financial and sporting perspective....

Share article

Topic prevalence and trends of metaverse in healthcare: a bibliometric analysis

Metaverse technology is an advanced form of virtual reality and augmented technologies. It merges the digital world with the real world, thus benefitting healthcare services. Medical informatics is...

Share article

Secure approach to sharing digitized medical data in a cloud environment

Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment,...

Share article

Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks

Many types of real-world information systems, including social media and e-commerce platforms, can be modelled by means of attribute-rich, connected networks. The goal of anomaly detection in artificial...

Share article

Metaverse application, flow experience, and Gen-Zers’ participation intention of intangible cultural heritage communication

With outstanding advantages in virtuality, immersion, connectivity, and openness, the application of the metaverse in the development of intangible cultural heritage has demonstrated great potential...

Share article

Data- and management-driven metaverse research

The metaverse has become a very important phenomenon in society because of the emergence of new technologies. The widespread adoption of the metaverse has generated significant discussions about the...

Share article

Hybrid scientific article recommendation system with COOT optimization

Today, recommendation systems are everywhere, making a variety of activities considerably more manageable. These systems help users by personalizing their suggestions to their interests and needs. They...

Share article

Divide and recombine approach for warranty database: estimating the reliability of an automobile component

The continuously updated database of failures and censored data of numerous products has become large, and on some covariates, information regarding the failure times is missing in the database. As...

Share article

Creating NFT-backed emoji art from user conversations on blockchain

In metaverse, digital assets are essential to define identity, shape the virtual environment, and facilitate economic transactions. This study introduces a novel feature to the metaverse by capturing...

Share article

Value Realization of Intelligent Emergency Management: Research Framework from Technology Enabling to Value Creation

This paper studies the application and the application value of intelligent emergency for emergency management in the big data environment, to fill the research gap that neglected the application value...

Share article

Enhancing Cyber Threat Detection with an Improved Artificial Neural Network Model

Identifying cyber-attacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability...

Share article

Audiovisual speech recognition based on a deep convolutional neural network

Audiovisual speech recognition is an emerging research topic. Lipreading is the recognition of what someone is saying using visual information, primarily lip movements. In this study, we created a custom...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.