Showing 2,081 - 2,100 results of 4,331 for search 'machine patterns', query time: 0.14s Refine Results
  1. 2081

    Bio-Magneto Sensing and Unsupervised Deep Multiresolution Analysis for Labor Predictions in Term and Preterm Pregnancies by Ejay Nsugbe, Oluwarotimi Williams Samuel, Jose Javier Reyes-Lagos, Dawn Adams, Olusayo Obajemu

    Published 2023-11-01
    “…DWS is combined with select pattern-recognition-based prediction machines in order to assemble a clinical decision pipeline for the prediction of the states of various pregnancies, with a greater degree of machine intelligence. …”
    Get full text
    Article
  2. 2082

    3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs by Yongchao Dang, Alp Karakoc, Saba Norshahida, Riku Jantti

    Published 2023-01-01
    “…With the upcoming 5G and beyond wireless communication system, cellular-connected Unmanned Aerial Vehicles (UAVs) are emerging as a new pattern to give assistance for target searching, emergency rescue, and network recovery. …”
    Get full text
    Article
  3. 2083

    A method for predicting postpartum depression via an ensemble neural network model by Yangyang Lin, Dongqin Zhou

    Published 2025-04-01
    “…The structure of the FCNN is simple and straightforward. The connection pattern among the neurons of the FCNN makes it easy to understand the relationship between the features and the target feature, endowing the proposed model with interpretability. …”
    Get full text
    Article
  4. 2084

    An Automated Compliance Framework for Critical Infrastructure Security Through Artificial Intelligence by Sardar Muhammad Ali, Abdul Razzaque, Muhammad Yousaf, Rafi Us Shan

    Published 2025-01-01
    “…These impacts encompass the theft of confidential information, service interruptions, and expenses tied to breach remediation, underscoring the urgent necessity for strengthened cybersecurity strategies. Machine learning (ML) is highly effective in signifying cybersecurity standards, leveraging large-scale data analysis, pattern recognition, and adaptability to emerging threats. …”
    Get full text
    Article
  5. 2085

    Automatic detection for a comprehensive view of Mayotte seismicity by Retailleau, Lise, Saurel, Jean-Marie, Laporte, Marine, Lavayssière, Aude, Ferrazzini, Valérie, Zhu, Weiqiang, Beroza, Gregory C., Satriano, Claudio, Komorowski, Jean-Christophe, OVPF Team

    Published 2022-06-01
    “…Moreover, while the VT earthquakes of the proximal cluster occur continuously with no apparent pattern, LP events occur in swarms that last for tens of minutes. …”
    Get full text
    Article
  6. 2086

    Cooperative control method for multi-agent ground fracturing truck group based on offline reinforcement learning by RuYi Wang, HuiShen Jiao, YingCheng Tian, Yi Zhao, SiQi Wang, Ke Zhang, Bo Huang, QinRui Sun, DanDan Zhu

    Published 2025-06-01
    “…However, this manual decision-making pattern often exhibits insufficient collaborative capability when confronted with complex construction scenarios. …”
    Get full text
    Article
  7. 2087

    Full-chain comprehensive assessment and multi-scenario simulation of geological disaster vulnerability based on the VSD framework: a case study of Yunnan province in China by Li Xu, Shucheng Tan, Runyang Li

    Published 2025-06-01
    “…The results show that from 2030 to 2050, GDV in Yunnan Province is generally at a medium–high level, with a spatial distribution pattern of “centered on Kunming, with a radial increase extending outward.” …”
    Get full text
    Article
  8. 2088

    Landslide and Collapse Susceptibility Analysis in Wenchuan Earthquake-damaged Area Based on Ensemble Learning Methods by DING Jiawei, WANG Xiekang

    Published 2025-07-01
    “…Recent advancements in data science and machine learning provide promising solutions. Two state-of-the-art ensemble learning algorithms, eXtreme Gradient Boosting (XGBoost) and Light Gradient Boosting Machine (LightGBM), are introduced to formulate dependable models for appraising susceptibility to landslides and collapses within the confines of Wenchuan County.MethodsA comprehensive evaluation of factors related to topography, geology, meteorology, and hydrology was conducted to select ten evaluative factors: Elevation, slope, aspect, terrain relief, distance to rivers, distance to faults, normalized difference vegetation index (NDVI), land cover type, average annual precipitation, and lithology. …”
    Get full text
    Article
  9. 2089

    A Supervised Approach for Land Use Identification in Trento Using Mobile Phone Data as an Alternative to Unsupervised Clustering Techniques by Manuel Mendoza-Hurtado, Gonzalo Cerruela-García, Domingo Ortiz-Boyer

    Published 2025-02-01
    “…Our supervised machine-learning approach outperforms unsupervised clustering techniques by capturing complex patterns and achieving higher accuracy. …”
    Get full text
    Article
  10. 2090
  11. 2091

    BTCP: Binary Temporal Convolutional Network-Based Data Prefetcher for Low Inference Latency and Storage Overhead by Chang Ho Ryu, Tae Hee Han

    Published 2025-01-01
    “…Data prefetching is crucial for hiding long-latency memory access on modern high-performance processors. Machine learning (ML)-based data prefetchers have demonstrated superior address prediction performance compared with traditional rule-based prefetchers by learning complex patterns to hide long-latency memory access. …”
    Get full text
    Article
  12. 2092
  13. 2093

    The Prediction of Civil Building Energy Consumption Using a Hybrid Model Combining Wavelet Transform with SVR and ELM: A Case Study of Jiangsu Province by Xiangxu Chen, Jinjin Mu, Zihan Shang, Xinnan Gao

    Published 2025-07-01
    “…The analysis reveals that the observed patterns align with the Environmental Kuznets Curve (EKC). …”
    Get full text
    Article
  14. 2094

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
    Get full text
    Article
  15. 2095
  16. 2096

    Proactive Detection of Malicious Webpages Using Hybrid Natural Language Processing and Ensemble Learning Techniques by Althaf Ali A, Rama Devi K, Syed Siraj Ahmed N, Ramchandran P, Parvathi S

    Published 2024-01-01
    “…By leveraging semantic analysis, lexical patterns, and metadata extraction, the proposed framework enhances the identification of suspicious patterns in web page content. …”
    Get full text
    Article
  17. 2097

    A Driving Simulator Investigation on the Aggressiveness of an Automatic Lane-Change System by Muhua Guan, Zheng Wang, Bo Yang, Chenchang Li, Kimihiko Nakano

    Published 2025-01-01
    “…The experiment entailed the collection of both subjective perceptions and gaze patterns from the participants. The research findings indicate that the aggressiveness of automatic lane changes simultaneously affects drivers’ perceptions, particularly safety evaluations and decision agreement, as well as gaze patterns toward the rear vehicle in the target lane. …”
    Get full text
    Article
  18. 2098

    Electric vehicle charging station demand prediction model deploying data slotting by A.V. Sreekumar, R.R. Lekshmi

    Published 2024-12-01
    “…One major challenge associated with development of machine learning models is the inherent uncertainty in electric vehicle charging behaviour that includes variations in charging patterns, user preferences, and vehicle types. …”
    Get full text
    Article
  19. 2099

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
    Get full text
    Article
  20. 2100

    A systematic review on sleep stage classification and sleep disorder detection using artificial intelligence by Tayab Uddin Wara, Ababil Hossain Fahad, Adri Shankar Das, Md Mehedi Hasan Shawon

    Published 2025-07-01
    “…Therefore, a sleep study that includes sleep patterns and disorders is crucial to enhancing our knowledge about individual health status. …”
    Get full text
    Article