-
61
An Efficient Approach Based on RAE-GAMI-NET for Long Range Attack Detection on Blockchain
Published 2025-01-01“…The proposed explainable neural network model includes Residual Auto Encoder (RAE) guided generalized additive models with incorporating structured interactions (RAE-GAMI-Net) for LRA detection in PoS Blockchain In this work, a wrapper-based Binary Orchard Algorithm (W-BOA) is used to find the best features to lessen the dimensionality of extracted Characteristics, and a global feature extraction has been implemented based on multi-scale Densenet (MDensenet) that assures early convergence and optimal performance by providing global optimal solution. …”
Get full text
Article -
62
Multi-Class Classification Using Improved Mahalanobis-Taguchi System Based on Binary Tree and Its Application
Published 2025-06-01“…And a multi-class classification using improved MTS based on binary tree is proposed. Research the project of building binary tree, which makes a comprehensive consideration of capability of class partition and numbers of samples, according to characteristic of MTS. …”
Get full text
Article -
63
-
64
Land use classification through fusion of remote sensing images and multi-source data
Published 2025-06-01Get full text
Article -
65
Advancing multi-categorization and segmentation in brain tumors using novel efficient deep learning approaches
Published 2024-11-01“…For this purpose, we utilized Enhanced Res2Net to extract the essential features. Using the Binary Chaotic Transient Search Optimization (BCTSO) Algorithm, the most pertinent features in terms of shape, texture, and colour are chosen to minimize complexity. …”
Get full text
Article -
66
CREDIT CARD FRAUD DETECTION USING LINEAR DISCRIMINANT ANALYSIS (LDA), RANDOM FOREST, AND BINARY LOGISTIC REGRESSION
Published 2022-12-01“…The largest AUC value was obtained by binary logistic regression with 90:10 separation data and Random Forest Algorithm with 60:40 separation data.…”
Get full text
Article -
67
-
68
Voice Security Using Hybrid Algorithm
Published 2010-12-01“…This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). …”
Get full text
Article -
69
An efficient hybrid Hopfield convolutional neural network for detecting spam bots in Twitter platform
Published 2025-12-01Get full text
Article -
70
Air quality prediction method based on improved BCCSA and deep LSTM
Published 2022-06-01Get full text
Article -
71
G4 & the balanced metric family – a novel approach to solving binary classification problems in medical device validation & verification studies
Published 2024-10-01“…G4, P4, and MCC do not share this limitation and paint a more complete picture of a medical device’s performance in a clinical setting. Therefore, researchers are encouraged to explore the balanced metric family when evaluating binary classification problems.…”
Get full text
Article -
72
Implementation of Fruit Grading & Sorting Station Using Digital Image Processing Techniques
Published 2018-12-01Get full text
Article -
73
-
74
Estimating cover image for universal payload region detection in stego images
Published 2022-09-01“…Finding the length of payload and regions where the message is hidden, in a stego object is a challenging task and forms a part of Active or Forensic Steganalysis. Many researchers have worked towards finding the length of message, but not much work has been done on finding region where message is hidden. …”
Get full text
Article -
75
Segmentation of Brain Tumor Images Using Genetic Algorithms
Published 2009-03-01“…In this research, the brain images resulting from computerized tomography (CT) have been used in order to determine the tumor area in the brain. the steps started by preprocessing operation to the image before inputting it to algorithm .the image was converted to binary image in order to segment the image, later on into equal segments ,then the correlation coefficient was found among these segments ,these values used as fitness function in the genetic algorithm in order to different iate between segments ,the result of the genetic algorithm was segment numbers which will be merged to form the sub-images ,then continuing these steps till determining the tumor approximate location. …”
Get full text
Article -
76
A Suggested Algorithm for Video Motion and Applicate It to Basketball
Published 2005-12-01“…Here, the video frames have been are read from video file directly, then each frame is processed without the need of frames conversion into separate images. This research includes algorithm suggestion to estimate ball position in each video frame then plotting the ball motion track along the video sequence, by choosing ball initial position and creating ball-rounding window and applying the adaptable threshold to the produced window in order to obtain binary representation window. …”
Get full text
Article -
77
SSCM: An Unambiguous Acquisition Algorithm for CBOC Modulated Signal
Published 2017-01-01Get full text
Article -
78
Genetic Algorithm for Finding the Global Forcing Number of Bipartite Graphs
Published 2024-12-01Get full text
Article -
79
-
80
pACP-HybDeep: predicting anticancer peptides using binary tree growth based transformer and structural feature encoding with deep-hybrid learning
Published 2025-01-01“…Furthermore, a k-nearest neighbor-based binary tree growth (BTG) algorithm is employed to select an optimal feature set from the multi-perspective vector. …”
Get full text
Article