-
1061
-
1062
Trade-offs between machine learning and deep learning for mental illness detection on social media
Published 2025-04-01“…Logistic regression provides the advantage of capturing both positive and negative associations between features and mental health conditions, whereas tree-based models prioritize decision-making power through split-based feature selection. …”
Get full text
Article -
1063
A Novel Method for Traceability of Crude Oil Leakage on Offshore Platforms Based on Improved YOLOv5 Model Multi-Target Identification and Correlation Analysis
Published 2025-01-01“…In order to meet the requirement of oil leakage monitoring on offshore platforms, The paper investigates a method for identifying oil spill targets and potential associated targets that may lead to oil leakage based on the YOLOv5 model. …”
Get full text
Article -
1064
-
1065
Evaluating Medical Students' Perspectives on the CBME Curriculum: A Qualitative Exploration of Curriculum Structure, Pedagogical Approaches, and Educational Integration
Published 2025-01-01“…Introduction: The introduction of the Competency-Based Medical Education (CBME) curriculum by the National Medical Commission (NMC) in India in 2019 has reshaped medical education by integrating foundational courses, learning strategies, and assessment methods that emphasize competencies essential for modern healthcare. …”
Get full text
Article -
1066
Visual Disturbances to Avatar Foot Position Increase Step-Width Variability in Immersive VR Treadmill Walking
Published 2025-01-01“…Gait variability, the subtle fluctuations in walking patterns, is crucial for adaptation and motor learning. While existing methods to increase gait variability often rely on force-based perturbations, these can reduce motivation. …”
Get full text
Article -
1067
3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs
Published 2023-01-01“…Precisely, the edge UAV flight controller uses ray tracing tools deterministic channel models, and Kriging methods to construct a theoretical 3D radio map. Then the machine learning methods, such as text Multi-Layer Perceptrons (MLP), Convolutional Neural Networks (CNN), and Recurrent Neural Networks (RNN), are employed to detect GPS spoofing by analyzing the UAV/base station reported Received Signal Strength (RSS) values and the theoretical radio map RSS values. …”
Get full text
Article -
1068
-
1069
-
1070
Multi-cohort study in gastric cancer to develop CT-based radiomic models to predict pathological response to neoadjuvant immunotherapy
Published 2025-03-01“…This study sought to develop and validate a radiomics-based machine learning (ML) model for patients with locally advanced gastric cancer (LAGC), specifically to predict whether patients will achieve a major pathological response (MPR) following neoadjuvant immunotherapy. …”
Get full text
Article -
1071
Decoding Humor-Induced Amusement via Facial Expression Analysis: Toward Emotion-Aware Applications
Published 2025-07-01Get full text
Article -
1072
-
1073
Intersection collision prediction and prevention based on vehicle-to-vehicle (V2V) and cloud computing communication
Published 2025-05-01“…Initially, the framework gathers vehicle trajectory, speed, acceleration, and relative position information via V2V communication technology to construct a graph representation of the traffic environment. …”
Get full text
Article -
1074
-
1075
-
1076
Comparison of nanoimaging and nanoflow based detection of extracellular vesicles at a single particle resolution
Published 2024-10-01“…Additionally, we applied machine learning models to correct for false positive particles identified in imaging‐based results by fitting size distribution data.…”
Get full text
Article -
1077
Small Scale Invade-Target Recognition and Location Based on Improved Faster RCNN
Published 2021-03-01Get full text
Article -
1078
Facial recognition optimization based on adversarial sample generation in the field of artificial intelligence
Published 2025-05-01“…Thus, the research on facial adversarial sample generation based on ensemble learning is carried out. Firstly, the traditional AdaBoost is improved using particle swarm optimization algorithm and dual threshold classification method. …”
Get full text
Article -
1079
Optimization for threat classification of various data types-based on ML model and LLM
Published 2025-07-01“…The ML-based model XGBoost showed an accuracy of 0.9999 with the TF-IDF embedding method, SVM showed 0.9699 with the TF-IDF embedding method, and Random Forest showed 0.9493 with the TF-IDF method. …”
Get full text
Article -
1080