-
1221
A Scalable Framework for Real-Time Network Security Traffic Analysis and Attack Detection Using Machine and Deep Learning
Published 2025-04-01“…Leveraging Artificial Intelligence and Natural Language Processing, we apply the BERT model with a Byte-level Byte-pair tokenizer to enhance network-based attack detection in IoT systems. …”
Get full text
Article -
1222
Image recognition method of cashmere and wool based on SVM-RFE selection with three types of features
Published 2025-05-01Get full text
Article -
1223
A stacked ensemble model for traffic conflict prediction using emerging sensor data
Published 2025-05-01Get full text
Article -
1224
Application of Quantum Recurrent Neural Network in Low-Resource Language Text Classification
Published 2024-01-01“…Text sentiment analysis is an important task in natural language processing and has always been a hot research topic. …”
Get full text
Article -
1225
Automated weed and crop recognition and classification model using deep transfer learning with optimization algorithm
Published 2025-08-01“…In the proposed AWRC-DLMLO technique, the main phase of Gaussian filtering (GF) utilizing image pre-processing is implemented to eliminate unwanted noise. …”
Get full text
Article -
1226
-
1227
Quantum AI: A Cognitive Machine Learning Technique based on Nurturing Food Security Sustainability Predictive Analysis for Life Science - Bioengineering in Healthcare
Published 2025-01-01“…The system starts with taking photos of food using a Convolutional Neural Network (CNN) is processed by it has a classification accuracy of 91.87%. …”
Get full text
Article -
1228
-
1229
PRECONDITIONS AND DETERMINING CAUSES OF THE SHADOW ECONOMY IN UKRAINE
Published 2014-03-01“…The article analyzes the main processes that led to the high level of the economy shadowing. …”
Get full text
Article -
1230
Multimodal GeoAI: An integrated spatio-temporal topic-sentiment model for the analysis of geo-social media posts for disaster management
Published 2025-05-01“…However, workflows are traditionally sequential with independent processing steps, limiting their ability to capture interconnections between modalities and risking chains of dependencies. …”
Get full text
Article -
1231
Comparison of Deep Learning Sentiment Analysis Methods, Including LSTM and Machine Learning
Published 2023-11-01“…This project uses natural language processing (NLP), deep learning, and models such as LSTM, CNN, SVM TF-IDF, Adaboost, Naive Bayes, and then combinations of models.The results of the study allowed us to obtain and verify model results with user reviews and compare model accuracy to see which model had the highest accuracy results from the models and their combination of CNN with LSTM model, but SVM with TF-IDF vectoring was most effective for this unbalanced data set. …”
Get full text
Article -
1232
-
1233
-
1234
Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
Published 2025-04-01“…Ultimately, the CKG empowers experts to efficiently analyze data and gain comprehensive understanding of cyberattacks, thereby help minimize potential attack vectors.…”
Get full text
Article -
1235
-
1236
Efficient Fourier base fitting on masked or incomplete structured data
Published 2025-06-01“…The developed method can be used for processing multi-dimensional data, including smoothing and intra-/extrapolation, even when confronted with missing data.ResultsThe developed method was verified using 1D, 2D, and 3D benchmarks. …”
Get full text
Article -
1237
Application of five seismic attributes in natural fracture prediction for deep coalbed methane production along the eastern margin of the Ordos Basin
Published 2025-04-01“…Therefore, the fine-scale characterization of the planar distribution of natural fractures is crucial to deep CBM production.Objectives and MethodsThis study investigated the No.8 coal seam in the Carboniferous Benxi Formation within the Daning-Jixian block on the eastern margin of the Ordos Basin. Through offset vector tiles (OVT) domain processing of offshore 3D wide-azimuth, broadband, and high-density (WBH) seismic data, this study determined five-dimensional seismic data: time, space (3D coordinates), offset (or shot-to-geophone distance), and azimuth. …”
Get full text
Article -
1238
-
1239
CONCEPT OF FINANCIAL FLOW MANAGEMENT OF ENTERPRISE CORPORATE SECURITY SYSTEM
Published 2022-07-01“…It is confirmed that modeling of financial resources of integrated logistics processes makes it possible not only to form the optimal vector of strategic goals of the multi-purpose model of integrated logistics processes but also to identify the interconnection between the composition and volume of incoming and outgoing financial flows of all enterprise integrated processes. …”
Get full text
Article -
1240
From Narratives to Diagnosis: A Machine Learning Framework for Classifying Sleep Disorders in Aging Populations: The <i>sleepCare</i> Platform
Published 2025-06-01“…<b>Results</b>: The transformer-based model utilizing BERT embeddings and an optimized Support Vector Machine classifier achieved an overall accuracy of <b>81%</b> on the test set. …”
Get full text
Article