-
1741
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
Published 2025-06-01“…Additionally, an improved non-dominated sorting biogeography-based optimization (INSBBO) algorithm is employed to fine-tune the hyper-parameters of the hybrid model, further enhancing learning stability and detection performance. …”
Get full text
Article -
1742
Active Reinforcement Learning for the Semantic Segmentation of Urban Images
Published 2024-12-01“…Image segmentation using supervised learning algorithms usually requires large amounts of annotated training data, while urban datasets frequently contain unbalanced classes leading to poor detection of under-represented classes. …”
Get full text
Article -
1743
Detection of Aflatoxin B1 in Maize Silage Based on Hyperspectral Imaging Technology
Published 2025-05-01“…The results demonstrated that SD preprocessing was the most suitable for AFB1 detection in maize silage, and the Mixup data augmentation method effectively improved model performance. …”
Get full text
Article -
1744
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
Published 2025-06-01“…Results show success in generating several types of network metrics to be used in the future for training machine or deep learning algorithms. Therefore, when generating data for the purpose of congestion control, iperf3 is the best tool, whilst Ping is useful when generating data for the purpose of detecting distributed denial-of-service attacks. …”
Get full text
Article -
1745
Performance of predictive algorithms in estimating the risk of being a zero-dose child in India, Mali and Nigeria
Published 2023-10-01“…We applied supervised learning algorithms with three increasingly rich sets of predictors and multiple years of data from India, Mali and Nigeria. …”
Get full text
Article -
1746
Deep Learning in Finance: A Survey of Applications and Techniques
Published 2024-10-01“…Machine learning (ML) has transformed the financial industry by enabling advanced applications such as credit scoring, fraud detection, and market forecasting. …”
Get full text
Article -
1747
Reinforcement Learning Applications in Cyber Security: A Review
Published 2023-04-01“…A significant portion of our personal data is stored online and organizations run their business online. …”
Get full text
Article -
1748
Web application firewall based on machine learning models
Published 2025-07-01“…The study evaluated five classification algorithms—K-nearest neighbors, logistic regression, naïve Bayes, support vector machine, and decision tree—for detecting cross site scripting (XSS), Structured Query Language (SQL) Injection, Operating System Command Injection, and Local File Inclusion attacks. …”
Get full text
Article -
1749
Role of artificial intelligence in enhancing mechanical ventilation – A peek into the future
Published 2025-07-01“…Key practical issues surrounding the implementation of AI into existing clinical workflows, including data quality, data sharing and privacy, data standardisation, seamless integration with existing healthcare systems, transparency of algorithms, interoperability across multiple platforms, patient safety and addressing ethical concerns, remain. …”
Get full text
Article -
1750
Effective Dose Estimation in Computed Tomography by Machine Learning
Published 2025-01-01“…E calculated by DTS was chosen as the target value for prediction. Different machine learning algorithms were selected, optimizing parameters to achieve the best performance for each algorithm. …”
Get full text
Article -
1751
Anomaly Detection in Blockchain Systems Leveraging Immutable Audit Trails for Enhanced Security
Published 2025-06-01“…Some of the key objectives include investigating how and to what extent immutable audit trails are effective toward security, enhancing security and transparency in such systems, and applying machine learning techniques to improve anomaly detection. The resultant research would lead to the development of more secure and efficient blockchain-based systems that can benefit a wide range of industries, especially those where data security and integrity are of utmost importance. …”
Get full text
Article -
1752
Hybrid CNN-LSTM With Attention Mechanism for Robust Credit Card Fraud Detection
Published 2025-01-01“…Our hybrid CNN-LSTM-Attention model improves fraud detection by addressing both spatial and temporal data features while dynamically focusing on critical elements. …”
Get full text
Article -
1753
Advanced Classifiers and Feature Reduction for Accurate Insomnia Detection Using Multimodal Dataset
Published 2024-01-01Get full text
Article -
1754
Graph-Based COVID-19 Detection Using Conditional Generative Adversarial Network
Published 2024-01-01“…These reconstructed features serve as input to a classification module, comprising a multi-layer neural network, GCN, adept at processing graph-structured data, alongside conventional machine learning classifiers such as Support Vector Machine (SVM), Extreme Gradient Boosting (XGBoost), and Random Forest (RF), facilitating categorization of chest X-ray images into COVID-19, pneumonia, and normal cases. …”
Get full text
Article -
1755
UNVEILING FAKE NEWS DETECTION MODELS AND THEIR INTEGRATION INTO WEB SYSTEMS: AN EXTENSIVE INVESTIGATION
Published 2025-03-01“…Through meticulous preprocessing, including stemming and TF-IDF vectorization, the system optimizes textual data for analysis. Powered by Multinomial Naive Bayes and Passive Aggressive Classifier algorithms, Fake News Detection System ensures accurate classification. …”
Get full text
Article -
1756
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Machine learning based NIDS models leverage algorithms that learn from historical network traffic data to identify patterns and anomalies to capture complex relationships. …”
Get full text
Article -
1757
Tensor RT optimized driver drowsiness detection system using edge device
Published 2025-10-01“…The system uses transfer learning techniques for implementing CNN model algorithms to analyze live video from the camera module, allowing for real-time detection of driver behavior such as fatigue or distraction. …”
Get full text
Article -
1758
Diagnostic Performance of Artificial Intelligence–Based Methods for Tuberculosis Detection: Systematic Review
Published 2025-03-01“…ObjectiveWe aimed to provide a comprehensive evaluation of AI-based algorithms for TB detection across various data modalities. …”
Get full text
Article -
1759
FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder
Published 2025-08-01“…If the data from all devices is uploaded to a central server for centralised learning, it will not only face the pressure of computation and storage, but may also trigger the risk of privacy leakage. …”
Get full text
Article -
1760
Machine learning for predicting earthquake magnitudes in the Central Himalaya
Published 2025-01-01“… Human intervention cannot halt natural disasters like earthquakes, but machine learning application expertise can be utilized to detect patterns in data and increase understanding and predictive power. …”
Get full text
Article