-
1441
Enhanced residual attention-based subject-specific network (ErAS-Net): facial expression-based pain classification with multiple attention mechanisms
Published 2025-06-01“…To further evaluate generalizability, a cross-dataset experiment was conducted using the BioVid Heat Pain Database, where ErAS-Net achieved 78.14% accuracy for binary pain detection on unseen data without fine-tuning. The fact that this finding supports the attention mechanism and human perception is why the proposed model proves to be a powerful and reliable tool for automatic pain detection.…”
Get full text
Article -
1442
-
1443
-
1444
Machine learning for detection of diffusion abnormalities-related respiratory changes among normal, overweight, and obese individuals based on BMI and pulmonary ventilation paramet...
Published 2025-07-01“…Abstract Background The integration of machine learning (ML) algorithms enables the detection of diffusion abnormalities-related respiratory changes in individuals with normal body mass index (BMI), overweight, and obesity based on BMI and pulmonary ventilation parameters. …”
Get full text
Article -
1445
Pseudo-Labeling and Time-Series Data Analysis Model for Device Status Diagnostics in Smart Agriculture
Published 2024-11-01Get full text
Article -
1446
HAD-YOLO: An Accurate and Effective Weed Detection Model Based on Improved YOLOV5 Network
Published 2024-12-01Get full text
Article -
1447
Intrusion Detection System for Network Security Using Novel Adaptive Recurrent Neural Network-Based Fox Optimizer Concept
Published 2025-02-01“…Data normalization is conducted to scale the incoming data into a usable format. …”
Get full text
Article -
1448
AI-Aided Proximity Detection and Location-Dependent Authentication on Mobile-Based Digital Twin Networks: A Case Study of Door Materials
Published 2024-10-01“…Such cyber-physical authentication (CPA) with the ITC is built on the dynamic BLE beaconing scheme with accurate proximity detection and dynamic identifier (ID) allocation. To achieve high accuracy in proximity detection, the proposed scheme is conducted using a wide variety of data pre-processing algorithms, machine learning technologies, and ensemble techniques. …”
Get full text
Article -
1449
-
1450
A Real-Time Semi-Supervised Log Anomaly Detection Framework for ALICE O<sup>2</sup> Facilities
Published 2025-05-01Get full text
Article -
1451
Adaptive ensemble techniques leveraging BERT based models for multilingual hate speech detection in Korean and english
Published 2025-06-01“…Popular machine learning algorithms such as Random Forest, Logistic Regression, Gaussian Naïve Bayes, and Support Vector Machine are employed as meta-learners for PMF. …”
Get full text
Article -
1452
UEF-HOCUrdu: Unified Embeddings Ensemble Framework for Hate and Offensive Text Classification in Urdu
Published 2025-01-01Get full text
Article -
1453
Hyperparameters optimization of evolving spiking neural network using artificial bee colony for unsupervised anomaly detection
Published 2025-07-01“…Nowadays, anomaly detection in streaming data has gained considerable attention due to the exponential growth in the data gathered by Internet of Things applications. …”
Get full text
Article -
1454
-
1455
Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Published 2025-01-01“…This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. …”
Get full text
Article -
1456
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…Next, the network intrusion detection process is modeled as a Markov decision process and integrated with the Soft Actor-Critic (SAC) reinforcement learning algorithm, with a view to constructing agents; In the context of adversarial training, two agents, designated as the attacker and the defender, are defined to perform asynchronous adversarial training. …”
Get full text
Article -
1457
PROACTIVE APPROACH IN TAX RISK MANAGEMENT: DATA ANALYSIS TECHNIQUES TO IDENTIFY HIGH-RISK TAXPAYERS
Published 2024-12-01“…Although, the work of experts in traditional methods and data analysis in auditing is limited, the effectiveness of data mining methods and the combination of the results obtained with tax scenarios approach the desired accuracy rate in risk detection. …”
Get full text
Article -
1458
YOLOv8n-WSE-Pest: A Lightweight Deep Learning Model Based on YOLOv8n for Pest Identification in Tea Gardens
Published 2024-09-01“…To enable the intelligent monitoring of pests within tea plantations, this study introduces a novel image recognition algorithm, designated as YOLOv8n-WSE-pest. Taking into account the pest image data collected from organic tea gardens in Yunnan, this study utilizes the YOLOv8n network as a foundation and optimizes the original loss function using WIoU-v3 to achieve dynamic gradient allocation and improve the prediction accuracy. …”
Get full text
Article -
1459
Abnormal Sound Detection of Wind Turbine Gearboxes Based on Improved MobileFaceNet and Feature Fusion
Published 2024-12-01Get full text
Article -
1460
Quantum key distribution through quantum machine learning: a research review
Published 2025-05-01“…This review will explore current research gaps and future developments in QKD, security analysis of QKD protocols, and eavesdropping detection by leveraging various QML algorithms.…”
Get full text
Article