Suggested Topics within your search.
Suggested Topics within your search.
-
22901
An Efficient Random Forest Classifier for Detecting Malicious Docker Images in Docker Hub Repository
Published 2024-01-01“…The paper develops a machine learning model for detecting malicious Docker images by using a newly created dataset containing Docker images associated with 14 corresponding features that were specifically chosen as they are critical indicators of potential security risks in Docker images, and the dataset was published for research purposes. Moreover, the paper developed and tested several machine learning algorithms using Docker image features: Naïve Bayes, Decision Tree, Random Forest, Gradient Boosting, Extreme Gradient Boosting, and Neural Network. …”
Get full text
Article -
22902
Software Methodology for Data Control and Collection for Autonomous Monitoring Systems with a Large Amount of Generated Information on the Example of Software for a Hydrological Ra...
Published 2023-05-01“…In some applications, such a flow is redundant and can be optimized through the use of various algorithms for the primary processing of information. …”
Get full text
Article -
22903
A deep learning approach for blood glucose monitoring and hypoglycemia prediction in glycogen storage disease
Published 2025-04-01“…However, there is a lack of research focusing specifically on patients with GSD. …”
Get full text
Article -
22904
Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
Published 2024-12-01“…The research reveals pressing issues related to data privacy, security, and user autonomy and highlights the imperative need for an increased focus on algorithmic transparency and the integration of ethical considerations in the design and development of IoT applications. …”
Get full text
Article -
22905
Modelling and Output Power Estimation of a Combined Gas Plant and a Combined Cycle Plant Using an Artificial Neural Network Approach
Published 2024-01-01“…The dataset used in this research is a 9568-unit full combined cycle power plant basis load dataset, accessible through the public UCI Machine Learning Repository. …”
Get full text
Article -
22906
Development of the Model of Diagnostics of Design-Technological Thinking in Secondary School Students in the Subject of Labor (Technology) in the Module “Robotics and Automated Sys...
Published 2025-03-01“…Currently, there is a significant amount of research papers devoted to design and technological styles of thinking. …”
Get full text
Article -
22907
The Potential of Artificial Intelligence in Pharmaceutical Innovation: From Drug Discovery to Clinical Trials
Published 2025-05-01“…AI systems work through algorithms based on rules or instructions that enable the machine to make decisions. …”
Get full text
Article -
22908
-
22909
Epileptic Seizure Detection in EEG Signals Using Machine Learning and Deep Learning Techniques
Published 2024-01-01“…This research presents a novel approach to detecting epileptic seizures leveraging the strengths of Machine Learning (ML) and Deep Learning (DL) algorithms in EEG signals. …”
Get full text
Article -
22910
Innovative Solutions for Oil Well Monitoring: Data-Driven Multiphase Virtual Flow Metering Using Ensemble Machine Learning and Historical Field Data
Published 2025-05-01“…By combining data-driven ensemble machine-learning algorithms and historical oil field portable test reports, this paper proposes a Data-Drive Multiphase Virtual Flow Meter (DD-MVFM) that estimates oil, gas, and water flow rates and provides real-time monitoring, and predicts future production with appropriate accuracy. …”
Get full text
Article -
22911
Enhancing Epilepsy Seizure Detection Through Advanced EEG Preprocessing Techniques and Peak-to-Peak Amplitude Fluctuation Analysis
Published 2024-11-01“…<b>Conclusions:</b> The present research extends the epilepsy diagnosis with clues on brain activity during seizures and further demonstrates the effectiveness of advanced preprocessing techniques. …”
Get full text
Article -
22912
Deep Reinforcement Learning: A Chronological Overview and Methods
Published 2025-02-01“…The survey extends to policy gradient methods, actor–critic architectures, and state-of-the-art algorithms such as proximal policy optimization, soft actor–critic, and emerging model-based approaches. …”
Get full text
Article -
22913
From information exposure to legal consciousness: The chain mediating role of political trust and social equality in Chinese college students
Published 2025-09-01“…The cultivation of college students' legal consciousness in the digital media environment is crucial for advancing social responsibility, moral awareness, and rule-of-law societies. However, prior research often assumes a linear positive relationship between information exposure and legal consciousness, overlooking potential negative effects in which algorithmic biases and emotional framing in digital media may weaken legal consciousness. …”
Get full text
Article -
22914
Decoding Depression from Different Brain Regions Using Hybrid Machine Learning Methods
Published 2025-04-01Get full text
Article -
22915
Computer-Aided Facial Soft Tissue Reconstruction with Computer Vision: A Modern Approach to Identifying Unknown Individuals
Published 2025-05-01“…The models did not indicate significant similarity, highlighting a gap between human perception and algorithmic assessment. These findings suggest that current face recognition algorithms may not yet be fully suited to evaluating reconstructions, which tend to deviate in subtle but critical facial features. …”
Get full text
Article -
22916
Digital technologies for signal radio vision and radio monitoring
Published 2024-08-01“…The results of fundamental research on electrodynamic effects of vector-wave deformation of nonstationary fields of sub-nanosecond configuration are presented as a means of identifying and authenticating signal radio images. …”
Get full text
Article -
22917
Development of Engineering Models of Nanosatellites for Student Training
Published 2022-10-01“…It has reduced development costs, flexible equipment reconfiguration, and easier access to the simulator's internal architecture for demonstration purposes.The developed complexes allow students to practically study the ultra-small satellite components design and ground stations, methods for receiving and processing telemetry and scientific information, attitude determination and control algorithms. The complexes allow to conduct of research in the development of individual onboard systems and special-purpose equipment of the nanosatellite and their testing in the loop. …”
Get full text
Article -
22918
SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS
Published 2016-03-01“…The results could be the basis for further theoretical research and practical applications such as: the development of new cryptographic primitives, error-correcting codes, algorithms of data compression, signal structures, and algorithms of block and stream encryption, all based on the perspective principles of many-valued logic. …”
Get full text
Article -
22919
The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the $$QSCD_{ff}$$ Q S C D ff problem
Published 2024-12-01“…Our contribution provides a theoretical foundation for the physical feasibility analysis of quantum cryptographic algorithms, offering insights into the challenges and prospects of implementing these algorithms in quantum computation environments.…”
Get full text
Article -
22920
Analysis of disease severity and mortality prediction using machine learning during COVID-19
Published 2025-08-01“…This paper focuses on how machine learning (ML) algorithms and applications have been used to analyze disease severity and mortality prediction in COVID-19 research. …”
Get full text
Article