To address the complex issues of detecting fraudulent practices in healthcare insurance, this research employs sophisticated machine learning, especially the Long Short-Term Memory (LSTM) model, to provide a complete ...
To address the complex issues of detecting fraudulent practices in healthcare insurance, this research employs sophisticated machine learning, especially the Long Short-Term Memory (LSTM) model, to provide a complete framework for reliable fraud detection. The study meticulously examines performance metrics such as accuracy, precision, recall, and the F1 score by employing and evaluating the LSTM model across two distinct datasets-Dataset A (198810 samples) and Dataset B (434319 samples)-illuminating the model's capacity to detect fraudulent activities while minimizing misclassifications. The evaluation process, as shown by confusion matrices displayed as percentages, reveals the model's strengths and points up areas for improvement. This study makes an important contribution to the field of fraud detection by providing practical insights to strengthen healthcare insurance against misleading practices. This research proclaimers a paradigm shift by combining innovative methodologies, extensive dataset curation, and stringent evaluation, ushering in increased security, transparency, and efficacy in healthcare insurance fraud detection, ultimately fostering a future of resilient and precise fraud detection mechanisms.
In autonomous driving scenarios, lidar-based object detectors are widely used in 3D object detection. For the sake of safety redundancy, some self-driving vehicles will be equipped with multiple lidars with different ...
In autonomous driving scenarios, lidar-based object detectors are widely used in 3D object detection. For the sake of safety redundancy, some self-driving vehicles will be equipped with multiple lidars with different beams, but training multiple lidar-based object detectors requires high costs. In our experiments, the performance of a lidar-based detector model trained on a high-beam lidar domain drops dramatically when transferred to a low-beam lidar domain. At present, there is no public 3D object detection dataset across-lidar-beams domains. In this paper, a 3D object detection dataset adapted across-lidar-beams domain is produced by the LGSVL simulator. The reason for the performance degradation of the lidar-based detectors across lidar-beams domains are mainly due to the large gap in the foreground object point count. To solve this problem, this paper proposed a semantic point generation method based on masked autoencoders, which can bridge the data gap between lidar beam-induced domains by generating more foreground semantic points so as to realize the migration of the detector model. In addition to solving the problem of lidar beam-induced domains migration, SP-MAE can also improve the performance of 3D lidar-based detectors. Experiments showed that the PVRCNN detector can improve 5.11 3D AP of pedestrian on the KITTI dataset after using SP-MAE.
The environment of underground coal mines (UCMs) is vulnerable to many environmental problems and consequential endangerment. Among those problems, mine fire is a liable threat that causes the loss of lives of mine wo...
详细信息
The record of answer books and attendance (RABA) in any examination system is an unexplained but necessary component of educational institutions to register the presence and trace the unique number of answer sheets of...
The record of answer books and attendance (RABA) in any examination system is an unexplained but necessary component of educational institutions to register the presence and trace the unique number of answer sheets of a certain applicant. Manually writing in the RABA of pupils traditionally is time-consuming, difficult to manage, and prone to human mistakes. To address these issues, an AI-based system with facial recognition and a fingerprint-based biometric system of digital RABA is presented. In this work, an automated system for face recognition and fingerprint identification using biometrics is proposed, and the answer sheet barcode is subsequently scanned for RABA input using a camera module. Finally, all of these records are stored in a database and may be retrieved at any moment by the institution of the university. This approach provides a faster and more precise means of avoiding proxy attendance.
To solve the low frequency, wide variety and changing problems in machine abnormal sound detection, we propose an unsupervised machine abnormal sound detection method based on residual autoencoder technology. This met...
To solve the low frequency, wide variety and changing problems in machine abnormal sound detection, we propose an unsupervised machine abnormal sound detection method based on residual autoencoder technology. This method can automatically learn and capture the characteristics of abnormal sounds without the need to mark a large number of abnormal samples in advance. First, Mel-frequency cepstral coefficients(MFCC) is used to construct the acoustic features of the normal sound, then residual autoencoder is used to reconstruct the acoustic features, and finally the anomaly fraction between the acoustic features reconstructed by the audio features to be measured and the acoustic features reconstructed by the normal sound is calculated. This method performs well in correctly identifying the abnormal sound.
The extension of transportation networks has sped up the speed of our lives. Car crashes cause a significant measure of death, property harm, and inestimable time, which is a significant worldwide medical condition. I...
详细信息
The extension of transportation networks has sped up the speed of our lives. Car crashes cause a significant measure of death, property harm, and inestimable time, which is a significant worldwide medical condition. It is viewed as one of the essential executioners in the advanced world. The plan of a savvy mishap identification, area following, and cautioning framework that can detect mishaps as they happen is shrouded in this article. To find the mishap's definite area, a GPS device is utilized. The Worldwide Framework for Versatile (GSM) module sends a notification message that remembers a connection to the mishap's area for a Google guide to the nearby emergency clinic and police control focus. They can do whatever it may take to facilitate the salvage exertion by visiting the connection to find where the mishap is in the area.
This paper considers the problem of human vital sign detection in a non-line-of-sight scenario by exploiting a millimeter-wave radar system. Specifically, first, the multipaths induced by wall reflections and corner d...
This paper considers the problem of human vital sign detection in a non-line-of-sight scenario by exploiting a millimeter-wave radar system. Specifically, first, the multipaths induced by wall reflections and corner diffraction are separated in the range-angle domain. Then, a path association method is proposed to match different multipaths with different targets to obtain the locations of the targets. After estimating the targets’ range cells, the time series signs with respect to multipath are formed and used to estimate the respiration and heartbeat information of the human targets by exploiting the cross-power spectrum. Finally, the proposed method is verified to get high-precision location information and vital sign values by both simulations and experiments.
The present study introduces a framework for the detection of threats in critical infrastructure in real-time. This framework leverages the capabilities of machine learning and utilizes data from Industrial Control Sy...
The present study introduces a framework for the detection of threats in critical infrastructure in real-time. This framework leverages the capabilities of machine learning and utilizes data from Industrial Control systems (ICS). In order to evaluate the accuracy of threat identification, we conducted a comparative analysis of three well-known machine learning models: Logistic Regression, Random Forest, and Knearest Neighbors. Our study specifically emphasized the importance of precision as a key parameter in this assessment. The results of our study indicate that Logistic Regression has higher performance compared to the other models, emerging as the most effective method for effectively identifying possible hazards in real-time ICS data. This study highlights the effectiveness of Logistic Regression in strengthening security protocols within vital infrastructure, presenting a hopeful resolution to protect against rising risks and weaknesses.
As intelligent devices and related technologies continue to develop, abnormal traffic detection has become a major issue in the field of internet security. Malicious attacks can have a negative impact on systems and c...
As intelligent devices and related technologies continue to develop, abnormal traffic detection has become a major issue in the field of internet security. Malicious attacks can have a negative impact on systems and cause a decline in computational performance. One of the technologies used to identify intruder activity and assess system security by sending out notifications is intrusion detectionsystems. In this endeavor, we employ the diversified NSL-KDD dataset for intrusion detection to introduce a novel feature selection and classification merging technique using support vector machines (SVM). The goal of this technique is to increase the capability of intrusion classification by considerably reducing the input feature set from the training data. The process of choosing significant input training features and discarding unimportant ones in supervised learning results in a feature subset that can produce greater classification accuracy. In our tests, we used the KDDTest+ and KDDTest-21 data sets’ various input feature subsets as input features for the SVM classifier. According to the experimental findings, the suggested technique obtains classification accuracy of 88.25% when using only KDDTest+ and 72.42% when using KDDTest-21.
This paper discusses how a 3D drafting system is developed to accommodate complex human-machine interface characteristics. An object-oriented multi-level structured test case design method is proposed. An Oracle-based...
This paper discusses how a 3D drafting system is developed to accommodate complex human-machine interface characteristics. An object-oriented multi-level structured test case design method is proposed. An Oracle-based distributed project management database is constructed. A new 3D CAD surface model search method is given. A 3D CAD surface model retrieval algorithm based on distance-curvature shape distribution is proposed. The method can effectively solve the collaboration problem of multiple parallel programs. The designed software platform is proved to be complete, scalable and open through practical applications. Finally, it can effectively achieve human-to-human collaboration and resource sharing.
暂无评论