Showing 2,481 - 2,500 results of 5,074 for search 'features network (evolution OR evaluation)', query time: 0.20s Refine Results
  1. 2481

    Predicting determinants of unimproved water supply in Ethiopia using machine learning analysis of EDHS-2019 data by Jember Azanaw, Mihret Melese, Eshetu Abera Worede

    Published 2025-04-01
    “…To examine the significance of features in tree-based models, permutation importance and SHAP values were utilized. …”
    Get full text
    Article
  2. 2482
  3. 2483

    Exploring the relationship between sepsis and Golgi apparatus dysfunction: bioinformatics insights and diagnostic marker discovery by Wanli Ma, Xinyi Liu, Ran Yu, Jiannan Song, Lina Hou, Ying Guo, Hongwei Wu, Dandan Feng, Qi Zhou, Haibo Li

    Published 2025-02-01
    “…To further evaluate immune microenvironmental features, unsupervised clustering was applied to identify immunological subgroups. …”
    Get full text
    Article
  4. 2484

    Comparative Evaluation of Multimodal Large Language Models for No-Reference Image Quality Assessment with Authentic Distortions: A Study of OpenAI and Claude.AI Models by Domonkos Varga

    Published 2025-05-01
    “…Our results demonstrate that these LLMs outperform traditional methods based on hand-crafted features. However, more advanced deep learning models, especially those based on deep convolutional networks, surpass LLMs in performance. …”
    Get full text
    Article
  5. 2485

    Evaluation of a Peak-Free Chemometric Laser-Induced Breakdown Spectroscopy Method for Direct Rapid Cancer Detection via Trace Metal Biomarkers in Tissue by Otieno Emily Akinyi, Angeyo Hudson Kalambuka, Alix Dehayem-Kamadjeu

    Published 2022-01-01
    “…In this work, a peak-free chemometric LIBS method based on a single-shot (for rapidity and nondestructiveness) and an artificial neural network multivariate calibration strategy with spectral feature selection was evaluated for its utility for direct trace quantitative analysis of copper (Cu), iron (Fe), manganese (Mg), magnesium (Mg), and zinc (Zn) in model soft body tissue. …”
    Get full text
    Article
  6. 2486
  7. 2487
  8. 2488
  9. 2489
  10. 2490

    Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm by Ayuba John, Ismail Fauzi Bin Isnin, Syed Hamid Hussain Madni, Farkhana Binti Muchtar

    Published 2024-12-01
    “…As a result, because it is a linear transformation, it has challenges capturing non-linear relationships between feature properties in the network traffic datasets. …”
    Get full text
    Article
  11. 2491
  12. 2492

    Prediction of microbe-drug associations using a CNN-Bernoulli random forest model by Zihao Song, Qingnuo Li, Jincheng Zhao, Qinggang Bu, Zekang Bian, Jia Qu

    Published 2025-08-01
    “…A convolutional neural network (CNN) is then used to reduce the dimensionality of all feature vectors, including those in the training set. …”
    Get full text
    Article
  13. 2493

    Deep learning-based debris flow hazard detection and recognition system: a case study by Fei Wu, Jianlin Zhang, Dunlong Liu, Andreas Maier, Vincent Christlein

    Published 2025-02-01
    “…It consists of a video feature extraction network using a 3D convolutional neural network (CNN), a debris flow hazard detection network using a multi-layer perceptron (MLP), and a debris flow hazard recognition network for verification employing another CNN. …”
    Get full text
    Article
  14. 2494

    A Novel Multistep Wavelet Convolutional Transfer Diagnostic Framework for Cross-Machine Bearing Fault Diagnosis by Lujia Zhao, Yuling He, Hai Zheng, Derui Dai

    Published 2025-05-01
    “…Firstly, a multistep time shift wavelet convolutional network (MTSWCN) based on the multiscale technique and wavelet transform is proposed to explore the diversity information regarding original vibration data and enhance the feature expression ability. …”
    Get full text
    Article
  15. 2495
  16. 2496

    Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine by Nana Zhang, Shi Ying, Kun Zhu, Dandan Zhu

    Published 2022-02-01
    “…To address these two issues, a novel defect prediction model called SSEPG based on Stacked Sparse Denoising AutoEncoders (SSDAE) and Extreme Learning Maching (ELM) optimised by Particle Swarm Optimisation (PSO) and another complementary Gravitational Search Algorithm (GSA) are proposed in this paper, which has two main merits: (1) employ a novel deep neural network – SSDAE to extract new combined features, which can effectively learn the robust deep semantic feature representation. (2) integrate strong exploitation capacity of PSO with strong exploration capability of GSA to optimise the input weights and hidden layer biases of ELM, and utilise the superior discriminability of the enhanced ELM to predict the defective modules. …”
    Get full text
    Article
  17. 2497

    A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm by Deepshikha Kumari, Prashant Pranav, Abhinav Sinha, Sandip Dutta

    Published 2025-04-01
    “…A novel hybrid IDS model integrating the Flower Pollination Algorithm (FPA), Cheetah Optimization Algorithm (COA), and Artificial Neural Networks (ANN) is proposed to enhance detection accuracy, reduce false positives, and optimize feature selection, anomaly detection, and rule adaptation. …”
    Get full text
    Article
  18. 2498

    AutoLDT: a lightweight spatio-temporal decoupling transformer framework with AutoML method for time series classification by Peng Wang, Ke Wang, Yafei Song, Xiaodan Wang

    Published 2024-11-01
    “…TS-separable linear self-attention mechanism and convolutional feedforward network achieve feature extraction in a lightweight way by decoupling temporal and spatial features of time series. …”
    Get full text
    Article
  19. 2499

    Attack resilient IoT security framework using multi head attention based representation learning with improved white shark optimization algorithm by Jawhara Aljabri

    Published 2025-04-01
    “…Therefore, identifying numerous anomalies or cyberattacks in a network and constructing an effectual intrusion detection system (IDS) becomes more significant. …”
    Get full text
    Article
  20. 2500

    Research on cloud computing users’ public safety trust model based on scorecard-random forest by Shengli ZHOU, Canghong JIN, Lifa WU, Zheng HONG

    Published 2018-05-01
    “…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
    Get full text
    Article