-
1061
Electricity Theft Detection Using Rule-Based Machine Leaning (rML) Approach
Published 2024-06-01“…Even though consumption-based models have been applied extensively to the detection of power theft, it can be difficult to reliably identify theft instances based only on patterns of usage. In this paper, a novel rule-based combined machine learning (rML) technique is developed for power theft detection to address the drawbacks of systems that rely just on consumption patterns. …”
Get full text
Article -
1062
A continuous real-world dataset comprising wearable-based heart rate variability alongside sleep diaries
Published 2025-08-01“…The dataset aims to benchmark in-the-wild HRV recordings, enable future analyses in the field, and support the development of predictive analytics that use sleep patterns and wearable data as health indicators.…”
Get full text
Article -
1063
Computer Based Body Exposure in Adolescents With Anorexia Nervosa: A Study Protocol
Published 2022-01-01“…Body dissatisfaction is a core feature of eating disorders (EDs) and plays an essential role in the development and maintenance of anorexia nervosa (AN). …”
Get full text
Article -
1064
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
1065
Interpretability Study of Gradient Information in Individual Travel Prediction
Published 2025-05-01“…Descending-order masking strategies exhibit the strongest impact, highlighting nonlinear interactions among features. Contribution maps visualize how gradients capture regular patterns and anomalies. …”
Get full text
Article -
1066
Innovative Techniques for Enhancing the Reliability of Machine Learning Classifiers in Protein-Protein Interaction Hotspot Prediction
Published 2025-03-01“…Key approaches include advanced feature engineering, integration of multi-omics data, ensemble learning methods, and the application of deep learning architectures. …”
Get full text
Article -
1067
Defect Detection and Correction in OpenMP: A Static Analysis and Machine Learning-Based Solution
Published 2025-01-01“…To enhance predictive accuracy, the tool incorporates machine learning classifiers—Naive Bayes (NB), Decision Tree (DT), Random Forest (RF), and Linear Support Vector Machine (LSVM)—trained on various feature combinations, including Abstract Features (AF), Halstead Features (HF), and Semantic Features (SF). …”
Get full text
Article -
1068
SGSNet: a lightweight deep learning model for strawberry growth stage detection
Published 2024-12-01“…However, dense planting patterns and complex environments within greenhouses present challenges for accurately detecting growth stages. …”
Get full text
Article -
1069
-
1070
Deep learning identification of reward-related neural substrates of preadolescent irritability: A novel 3D CNN application for fMRI
Published 2025-06-01“…Regression activation mapping (RAM) was employed to extract feature maps of brain regions most predictive of irritability severity from the model. …”
Get full text
Article -
1071
Emotional Interactive Simulation System of English Speech Recognition in Virtual Context
Published 2020-01-01“…Hidden Markov style has been widely used in English speech semantic recognition. The experiments of feature extraction and pattern recognition of speech samples prove that Hidden Markovian has higher recognition rate and better recognition effect in speech emotion recognition. …”
Get full text
Article -
1072
A review of the FIVA project: Novel windows employing vacuum glazing products
Published 2022-12-01“…Four different designs were developed that not only integrated vacuum glass products, but also featured unusual opening patterns, the latest generation of electrically driven fitting products, and specific seals. …”
Get full text
Article -
1073
Optimizing Personalized and Context-Aware Recommendations in Pervasive Computing Environments
Published 2024-12-01“…Though various recommendation techniques exist, there is a need to develop a unique technique for capturing latent factors and patterns from sparse and high-dimensional data in pervasive environments, specifically for optimizing dynamic recommendations. …”
Get full text
Article -
1074
Dementia Scale Score Classification Based on Daily Activities Using Multiple Sensors
Published 2022-01-01“…We analyzed the effects of different types of sensor data, such as time spent in an individual room according to human motion sensors, location in a facility, and sleep patterns, on dementia detection. We then developed a feature extraction method related to daily activity patterns based on a clustering algorithm and analyzed its effectiveness. …”
Get full text
Article -
1075
Remote Sensing Identification of Major Crops and Trade-Off of Water and Land Utilization of Oasis in Altay Prefecture
Published 2025-07-01“…Within this fragile balance lies a critical opportunity: efficient water resource management could pave the way for sustainable development across the entire arid oasis regions. This study uses a decision tree model based on a feature threshold to map the spatial distribution of major crops in the Altay Prefecture oasis, assess their water requirements, and identify the coupling relationships between agricultural water and land resources. …”
Get full text
Article -
1076
3D mesh segmentation of historic buildings for architectural surveys
Published 2018-01-01“…The developed method has proved to be effective for feature detection and suitable for inclusion in architectural surveying applications.…”
Get full text
Article -
1077
Self-Adaptive Deep Learning Framework for Non-Intrusive Load Monitoring: Addressing Aging Appliance Challenges With Transfer Learning and Pseudo Labeling
Published 2025-01-01“…Unlike traditional NILM models, this approach incorporates a unique self-adaptive feature that enables the model to automatically adapt to changing power patterns resulting from aging appliances. …”
Get full text
Article -
1078
Applications of gene pair methods in clinical research: advancing precision medicine
Published 2025-04-01“…To bridge methodological development with practical implementation, we establish a reproducible analytical pipeline incorporating feature selection, classifier construction, and model evaluation modules using real-world benchmark datasets from pulmonary tuberculosis studies. …”
Get full text
Article -
1079
Classification of Toraja Wood Carving Motif Images Using Convolutional Neural Network (CNN)
Published 2024-08-01“…By understanding the meaning of each Toraja carving, both tourists and the local community can gain knowledge about Toraja culture, thereby preserving and maintaining the culture amidst modern developments. Image processing approaches, particularly the development of Convolutional Neural Networks (CNN), offer a solution for extracting information from the diverse and intricate patterns of Toraja wood carvings. …”
Get full text
Article -
1080
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…Feature extraction is later employed to identify patterns and characteristics commonly associated with SQL injection, such as certain SQL clauses and logical operators. …”
Get full text
Article