-
12741
Deep Learning Based Early Intrusion Detection in IIoT using Honeypot
Published 2023-06-01“…The accuracy of DL algorithms has been shown across a range of scientific fields. …”
Get full text
Article -
12742
Analysis of the capabilities of an information system for improving sleep quality based on biometric data analysis
Published 2024-12-01“…The system is able to function independently thanks to the use of machine learning algorithms, including LSTM for prediction, Kalman filter for data cleaning, Isolation Forest for anomaly detection, and K-means for clustering sleep patterns.…”
Get full text
Article -
12743
Integrative multi-omics and machine learning reveal critical functions of proliferating cells in prognosis and personalized treatment of lung adenocarcinoma
Published 2025-07-01“…An integrative machine learning program, comprising 111 algorithms, was developed to construct a Scissor+ proliferating cell risk score (SPRS). …”
Get full text
Article -
12744
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…The present research utilized the Isolation Forest algorithm to detect outliers in high-dimensional data sets. …”
Get full text
Article -
12745
Lightweight UAV Detection Method Based on IASL-YOLO
Published 2025-04-01“…Second, we introduce the SIoU loss function to address the orientation mismatch issue between predicted and ground truth bounding boxes. Finally, we employ the LAMP pruning algorithm to compress the model. …”
Get full text
Article -
12746
Two‐stage video anomaly detection based on dual‐stream networks and multi‐instance learning
Published 2024-12-01“…Therefore, it is crucial to develop intelligent algorithms for video anomaly detection. The method can detect whether segments of a video contain abnormal events. …”
Get full text
Article -
12747
Gradient-based optimization for parameter identification of lithium-ion battery model for electric vehicles
Published 2024-12-01“…The findings were contrasted to those from various algorithms, such as whale optimization algorithm, multi-verse optimizer, sine cosine algorithm, arithmetic optimization algorithm, particle swarm optimization, red kite optimization algorithm, tree-seed algorithm, and white shark optimizer. …”
Get full text
Article -
12748
Link and Loss Aware GW-COOP Routing Protocol for FANETs
Published 2021-01-01“…This paper proposes GW-COOP (Gray Wolf Algorithm using Cooperative Diversity Technique) routing protocol for FANETs. …”
Get full text
Article -
12749
Harnessing AI forward and backward chaining with telemetry data for enhanced diagnostics and prognostics of smart devices
Published 2025-03-01“…This study proposes a novel AI-driven framework that integrates forward chaining and backward chaining algorithms to analyze telemetry data from IoT devices. …”
Get full text
Article -
12750
A vehicular network–based intelligent transport system for smart cities
Published 2019-11-01“…Our results show reduced travel times of up to 33.3% when compared to a traditional fixed route-selection algorithm.…”
Get full text
Article -
12751
AI-Driven Advances in Parkinson’s Disease Neurosurgery: Enhancing Patient Selection, Trial Efficiency, and Therapeutic Outcomes
Published 2025-05-01“…Machine learning (ML) algorithms and big data analytics enable precise patient stratification, risk assessment, and outcome prediction, accelerating the development of novel therapeutic approaches. …”
Get full text
Article -
12752
A Review of Abnormal Crowd Behavior Recognition Technology Based on Computer Vision
Published 2024-10-01“…Its goal is to use computer vision technology and abnormal behavior detection models to accurately perceive, predict, and intervene in potential abnormal behaviors of the crowd and monitor the status of the crowd system in public places in real time, to effectively prevent and deal with public security risks and ensure public life safety and social order. …”
Get full text
Article -
12753
Distributed hybrid consensus–based square-root cubature quadrature information filter and its application to maneuvering target tracking
Published 2019-12-01“…The simulation results show that the proposed hybrid consensus–based square-root cubature quadrature information filter outperforms the existing algorithms at the expense of a slight increase in computational cost.…”
Get full text
Article -
12754
Enhancing piezoelectric control of cracks in thin solid aluminum plates using finite element data and a neural networks approach
Published 2025-03-01“…In addition, artificial neural networks, specifically feedforward neural networks, are employed for optimal SIF prediction, showcasing the ability to integrate soft computing with mechanical engineering challenges. …”
Get full text
Article -
12755
Automatic screening for posttraumatic stress disorder in early adolescents following the Ya’an earthquake using text mining techniques
Published 2024-12-01“…Text classification models were constructed using three supervised learning algorithms (BERT, SVM, and KNN) to identify PTSD symptoms and their corresponding behavioral indicators in each sentence of the self-narratives.ResultsThe prediction accuracy for symptom-level classification reached 73.2%, and 67.2% for behavioral indicator classification, with the BERT performing the best.ConclusionsThese findings demonstrate that self-narratives combined with text mining techniques provide a promising approach for automated, rapid, and accurate PTSD screening. …”
Get full text
Article -
12756
Real-Time Algal Monitoring Using Novel Machine Learning Approaches
Published 2025-06-01“…Among the models tested, DTS achieved the highest accuracy for cell count prediction (R<sup>2</sup> = 0.77), while RF demonstrated superior performance for dry biomass estimation (R<sup>2</sup> = 0.66). …”
Get full text
Article -
12757
Wide-Angle Image Distortion Correction and Embedded Stitching System Design Based on Swin Transformer
Published 2025-07-01“…The model integrates multi-scale feature extraction, Thin Plate Spline (TPS) control point prediction, and optical flow-guided constraints, balancing correction accuracy and computational efficiency. …”
Get full text
Article -
12758
Characterization of the immune cell infiltration patterns in lung adenocarcinoma to facilitate immunotherapy
Published 2025-02-01“…Herein, ESTIMATE and CIBERSORT algorithms were conducted to characterize the ICI patterns of 1155 patients with LUAD. …”
Get full text
Article -
12759
Software Supporting the Visualization of Hazardous Substance Emission Zones During a Fire at an Industrial Enterprise
Published 2025-07-01“…The objective of this study is to develop algorithms for the development of a mathematical model of a hazardous zone during an explosion and fire at an enterprise. …”
Get full text
Article -
12760
Research on Multi-Objective Optimization Design of High-Speed Train Wheel Profile Based on RPSTC-GJO
Published 2025-07-01“…Firstly, the chaotic map is introduced into the population initialization process of the golden jackal algorithm. In the later stage of the algorithm iteration, random disturbance is introduced with optimization algebra as the switching condition to obtain an improved optimization algorithm, and the performance index of the optimization algorithm is verified to be superior to other algorithms. …”
Get full text
Article