-
2481
Predicting determinants of unimproved water supply in Ethiopia using machine learning analysis of EDHS-2019 data
Published 2025-04-01“…To examine the significance of features in tree-based models, permutation importance and SHAP values were utilized. …”
Get full text
Article -
2482
-
2483
Exploring the relationship between sepsis and Golgi apparatus dysfunction: bioinformatics insights and diagnostic marker discovery
Published 2025-02-01“…To further evaluate immune microenvironmental features, unsupervised clustering was applied to identify immunological subgroups. …”
Get full text
Article -
2484
Comparative Evaluation of Multimodal Large Language Models for No-Reference Image Quality Assessment with Authentic Distortions: A Study of OpenAI and Claude.AI Models
Published 2025-05-01“…Our results demonstrate that these LLMs outperform traditional methods based on hand-crafted features. However, more advanced deep learning models, especially those based on deep convolutional networks, surpass LLMs in performance. …”
Get full text
Article -
2485
Evaluation of a Peak-Free Chemometric Laser-Induced Breakdown Spectroscopy Method for Direct Rapid Cancer Detection via Trace Metal Biomarkers in Tissue
Published 2022-01-01“…In this work, a peak-free chemometric LIBS method based on a single-shot (for rapidity and nondestructiveness) and an artificial neural network multivariate calibration strategy with spectral feature selection was evaluated for its utility for direct trace quantitative analysis of copper (Cu), iron (Fe), manganese (Mg), magnesium (Mg), and zinc (Zn) in model soft body tissue. …”
Get full text
Article -
2486
-
2487
Limits of Solar Flare Forecasting Models and New Deep Learning Approach
Published 2025-01-01Get full text
Article -
2488
NeuroMorse: a temporally structured dataset for neuromorphic computing
Published 2025-01-01Get full text
Article -
2489
RT-DETR-Pro: An Enhanced RT-DETR Model for Visual Detection of Photovoltaic Module Defects
Published 2025-01-01Get full text
Article -
2490
Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm
Published 2024-12-01“…As a result, because it is a linear transformation, it has challenges capturing non-linear relationships between feature properties in the network traffic datasets. …”
Get full text
Article -
2491
-
2492
Prediction of microbe-drug associations using a CNN-Bernoulli random forest model
Published 2025-08-01“…A convolutional neural network (CNN) is then used to reduce the dimensionality of all feature vectors, including those in the training set. …”
Get full text
Article -
2493
Deep learning-based debris flow hazard detection and recognition system: a case study
Published 2025-02-01“…It consists of a video feature extraction network using a 3D convolutional neural network (CNN), a debris flow hazard detection network using a multi-layer perceptron (MLP), and a debris flow hazard recognition network for verification employing another CNN. …”
Get full text
Article -
2494
A Novel Multistep Wavelet Convolutional Transfer Diagnostic Framework for Cross-Machine Bearing Fault Diagnosis
Published 2025-05-01“…Firstly, a multistep time shift wavelet convolutional network (MTSWCN) based on the multiscale technique and wavelet transform is proposed to explore the diversity information regarding original vibration data and enhance the feature expression ability. …”
Get full text
Article -
2495
Tertiary Review on Explainable Artificial Intelligence: Where Do We Stand?
Published 2024-08-01Get full text
Article -
2496
Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine
Published 2022-02-01“…To address these two issues, a novel defect prediction model called SSEPG based on Stacked Sparse Denoising AutoEncoders (SSDAE) and Extreme Learning Maching (ELM) optimised by Particle Swarm Optimisation (PSO) and another complementary Gravitational Search Algorithm (GSA) are proposed in this paper, which has two main merits: (1) employ a novel deep neural network – SSDAE to extract new combined features, which can effectively learn the robust deep semantic feature representation. (2) integrate strong exploitation capacity of PSO with strong exploration capability of GSA to optimise the input weights and hidden layer biases of ELM, and utilise the superior discriminability of the enhanced ELM to predict the defective modules. …”
Get full text
Article -
2497
A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm
Published 2025-04-01“…A novel hybrid IDS model integrating the Flower Pollination Algorithm (FPA), Cheetah Optimization Algorithm (COA), and Artificial Neural Networks (ANN) is proposed to enhance detection accuracy, reduce false positives, and optimize feature selection, anomaly detection, and rule adaptation. …”
Get full text
Article -
2498
AutoLDT: a lightweight spatio-temporal decoupling transformer framework with AutoML method for time series classification
Published 2024-11-01“…TS-separable linear self-attention mechanism and convolutional feedforward network achieve feature extraction in a lightweight way by decoupling temporal and spatial features of time series. …”
Get full text
Article -
2499
Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm
Published 2025-04-01“…Therefore, identifying numerous anomalies or cyberattacks in a network and constructing an effectual intrusion detection system (IDS) becomes more significant. …”
Get full text
Article -
2500
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01“…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
Get full text
Article