-
901
Machine Learning-Based Approach for HIV/AIDS Prediction: Feature Selection and Data Balancing Strategy
Published 2025-03-01“…The study concludes that combining feature selection, data balancing, and machine learning techniques significantly improves predictive performance, making it a valuable approach for early detection and clinical decision support in HIV/AIDS diagnosis. …”
Get full text
Article -
902
Assessment of the Solar Potential of Buildings Based on Photogrammetric Data
Published 2025-02-01“…This paper describes also the Detecting Photovoltaic Panels algorithm with the use of deep learning techniques. …”
Get full text
Article -
903
Adaptive Dynamic Thresholding Method for Fault Detection in Diesel Engine Lubrication Systems
Published 2024-12-01“…Extensive diesel engine tests and actual fault data demonstrate that the proposed method can address the issues of missed faults encountered by static threshold methods and the low detection accuracy of machine learning approaches without the need for fault samples. …”
Get full text
Article -
904
A Novel Approach to Road Safety: Detecting Illegal Overtaking Using Smartphone Cameras and Deep Learning for Vehicle Auditing
Published 2025-01-01“…We used dashboard-mounted smartphone cameras and geolocation data to filter the analysis areas. We used the state-of-the-art deep learning model You Only Look Once version 8 (YOLOv8) to detect yellow road lanes. …”
Get full text
Article -
905
Using Machine Learning and Nationwide Population-Based Data to Unravel Predictors of Treated Depression in Farmers
Published 2025-01-01“…To complement these traditional studies, big data and machine learning (ML) can advantageously be harnessed. …”
Get full text
Article -
906
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01Get full text
Article -
907
Blind audio watermarking mechanism based on variational Bayesian learning
Published 2015-01-01“…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
Get full text
Article -
908
Diagnosis of steam turbine rotor based on improved convolutional neural network algorithm
Published 2025-04-01Get full text
Article -
909
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
Get full text
Article -
910
Comparing Models and Performance Metrics for Lung Cancer Prediction using Machine Learning Approaches.
Published 2024-12-01“…To achieve these goals, we explored many ML algorithms and compared them using a dataset with lifestyle and health data. …”
Get full text
Article -
911
Few-Shot Learning With Prototypical Networks for Improved Memory Forensics
Published 2025-01-01“…Securing computer systems requires effective methods for malware detection. Memory forensics analyzes memory dumps to identify malicious activity, but faces challenges including large and complex datasets, constantly evolving malware threats, and limited labeled data for training algorithms among others. …”
Get full text
Article -
912
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…With the increasing demand for time-series analysis, driven by the proliferation of IoT devices and real-time data-driven systems, detecting change points in time series has become critical for accurate short-term prediction. …”
Get full text
Article -
913
Driver drowsiness shield (DDSH): a real-time driver drowsiness detection system
Published 2025-05-01“…This paper aims to develop an advanced real-time drowsiness detection system using deep learning algorithms. For this purpose, we utilized an eye image dataset from the MRL Eye Dataset and performed extensive feature engineering and preprocessing to prepare the data for analysis. …”
Get full text
Article -
914
Developing a Prediction Model for Real-Time Incident Detection Leveraging User-Oriented Participatory Sensing Data
Published 2025-05-01“…Real crash data from the New Jersey Department of Transportation (NJDOT) and crowdsourced data from Waze were matched using the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm to differentiate true and false alerts. …”
Get full text
Article -
915
WeatherClean: An Image Restoration Algorithm for UAV-Based Railway Inspection in Adverse Weather
Published 2025-08-01Get full text
Article -
916
Secure Data Transmission Using GS3 in an Armed Surveillance System
Published 2025-06-01“…Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. …”
Get full text
Article -
917
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments
Published 2025-07-01“…The insights and hidden trends detected from network data and the architecture of a data-driven ML to avoid this attack are essential to establishing an intelligent security system. …”
Get full text
Article -
918
Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection
Published 2025-05-01“…Apart from that, an ensemble learning algorithm is also employed to support and enhance the detection phase, providing a robust defense against the dynamic and sophisticated nature of modern P2P botnets. …”
Get full text
Article -
919
Detecting and reducing heterogeneity of error in acoustic classification
Published 2022-11-01Get full text
Article -
920
A labeled synthetic mobile money transaction datasetMendeley Data
Published 2025-06-01“…The dataset is particularly suitable for training and testing machine learning algorithms to detect financial fraud. Additionally, it holds the potential for benchmarking fraud detection algorithms and systems and validating synthetic data generation methodologies.…”
Get full text
Article