Existing representation learning usually neglects two important issues, the intra-class representation diversity and underexploited label utilization, especially the negative feedback during training process. Fortunat...
详细信息
AI together with ML technology now provides detailed rapid medical data evaluation to enhance cancer diagnosis and treatment methods. Advanced algorithms installed in these technologies help medical staff identify can...
详细信息
ISBN:
(纸本)9798331523923
AI together with ML technology now provides detailed rapid medical data evaluation to enhance cancer diagnosis and treatment methods. Advanced algorithms installed in these technologies help medical staff identify cancer indicators which human experts commonly miss leading to better diagnostic accuracy. AI-powered Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) scan analysis allows doctors to perform quicker and more efficient medical diagnosis. the usage of ML models enables medical professionals to detect prognostic trace elements thus they can enhance treatment choices by analyzing tumor cell biological classification groups. AI actively participates in protein and gene targeting together with clinical trial planning to move personal cancer treatment forward. AI applications face multiple obstacles that stop their effective adoption in the field of oncology. the majority of present-day barriers to AI implementation in oncology stem from problems with data privacy together with algorithmic biases and model validation methods while the high complexity of systems and decreasing model interpretability specifically hinder usage. the success of AI models depends on extensive and diverse datasets although the actual availability of relevant data sets combined with standardization procedures continues to be difficult. Medical diagnostic applications where AI performs its decision-making work present important transparency issues that create doubts about its effectiveness. the analysis of data privacy through federated learning and XAI for interpretability and transfer learning for efficiency and deep learning for accuracy improvement are recent solutions being researched to resolve these problems. the primary aim of this research explores how AI and ML influence cancer diagnosis together with treatment methods while studying present challenges alongside suggested methods to boost their operational performance. the combination of better data governance toget
For the past few years, detecting object surface defects using deep learning has become an important tool in industry and a major research area for researchers involved. there is a wide variety of articles on object s...
详细信息
the proceedings contain 40 papers. the special focus in this conference is on Innovations in Computational Intelligence and Computer Vision. the topics include: Dataset Balancing Techniques and Supervised Learnin...
ISBN:
(纸本)9789819769940
the proceedings contain 40 papers. the special focus in this conference is on Innovations in Computational Intelligence and Computer Vision. the topics include: Dataset Balancing Techniques and Supervised learningalgorithms for Predictive Analysis of Rice and Corn Yields;fish Blood Cell as Biological Dosimeter: In Between Measurements, Radiomics, Preprocessing, and Artificial Intelligence;predictive Analysis for Early Detection of Breast Cancer through Artificial Intelligence algorithms;boosting Security: An Effective Approach to Intrusion Detection in Wireless Sensor Networks with AdaBoost Classifiers;Chat2Fluency: Enhancing Language learningthrough Conversational AI;REED-NET: Residual Enhanced Encoder-Decoder Network for Low-Dose CT Reconstruction;comparative Analysis of Large Language Models;Visualizing Insights to Empower HR Decision-Making: A Data-Driven Approach;handling Uncertainty in Parkinson’s Disease Voice Data Using Intuitionistic Fuzzy Entropy Measure;Exploring Shopping Opportunities and Elevating Customer Experiences through AI-Powered E-Commerce Strategies;ioT-Based Vehicle Class Detection for Smart Traffic Control;Domain Adaptation for NER Using mBERT;SQL Query Recommendation Based on Matrix Factorization;retenSure: Ensemble learning for Managing Employee Attrition;Subject–Verb Agreement Error Handling Using RNN Architectures;ad-Spend Analytics;an Efficient Real-Time Word-Level Recognition of Indian Sign Language;innovating Drug Design for Alzheimer’s Disease via Reinforcement learning for Enhanced Molecular Generation;an Efficient Real-Time Recognition of Static Kannada Sign Language;unveiling Diagnostic Clarity: A Machine learning Approach to Distinguish Borderline Personality Disorder and Bipolar Disorder for Enhanced Mental Health Diagnostics;DLSTM with Adam Waterwheel optimization for Groundwater Level Prediction in India;PhishGuard: Machine learning Model for Real-Time URL Detection;Improved Grasshopper optimization with Squeezenet (IGO-SNet)
As the transportation and information industries continue to advance, the increasing variety of application scenarios, devices with computing capabilities, and a growing number of open ports have heightened security r...
详细信息
ISBN:
(纸本)9798350375084;9798350375077
As the transportation and information industries continue to advance, the increasing variety of application scenarios, devices with computing capabilities, and a growing number of open ports have heightened security risks for vehicle networks. To improve the accuracy of detecting abnormal traffic in vehicle networks, we propose a model based on ensemble learning with a Stacking model integration approach. this method includes a meta-classifier composed of decision trees, extremely randomized trees, and extreme gradient boosting. the final classification prediction results are obtained by linearly stacking input features and weights into a SoftMax meta-learner. Additionally, the research enhances the classification accuracy of network flow data through parameter optimization. Testing results on the real automotive hacker attack dataset, Car-Hacking, show that this method achieves an accuracy rate of up to 99.2% in detecting denial of service, gear spoofing, and RPM spoofing attack types, and up to 97.5% accuracy in Fuzzy attack types. the study indicates that this model has a low false positive rate, high detection accuracy, and high detection rate, significantly outperforming traditional detection methods based on other machine learning technologies.
In the ever-evolving domain of cybersecurity, malware detection and classification are critical for safeguarding digital infrastructure. this study explores the application of various machine learningalgorithms, incl...
详细信息
ISBN:
(纸本)9798350367782;9798350367775
In the ever-evolving domain of cybersecurity, malware detection and classification are critical for safeguarding digital infrastructure. this study explores the application of various machine learningalgorithms, including K-Nearest Neighbors (KNN), Random Forest, Logistic Regression, and XGBoost, to classify malware using the Microsoft Malware Classification Challenge (BIG 2015) dataset. the dataset consists of diverse malware families, each exhibiting unique characteristics. A comprehensive preprocessing framework was applied, including data cleaning, feature extraction from binary and assembly files, and the creation of new features to improve model accuracy. Our experimental results indicate that Random Forest and XGBoost significantly outperform other models, achieving accuracies as high as 98%. Logistic Regression provided strong interpretability, making it suitable for applications where understanding model decisions is crucial. this study demonstrates the effectiveness of ensemble learning models in malware classification and highlights their potential for integration into real-world cybersecurity solutions, ensuring timely detection and prevention of cyber threats.
the Internet of things is an innovation that brings together an imagined space and the real world on one platform. Withthe rapid growth of IoT devices, the lack of standards has resulted in many unsecured devices con...
详细信息
ISBN:
(纸本)9798350354140;9798350354133
the Internet of things is an innovation that brings together an imagined space and the real world on one platform. Withthe rapid growth of IoT devices, the lack of standards has resulted in many unsecured devices connecting to networks, leading to an increase in cyberattacks on IoT, especially keylogging attacks. Intrusion detection systems (IDS) have traditionally relied on machine learning techniques, particularly deep learning, to detect attacks. However, these methods often require a large amount of labeled data to train, which is often unavailable for IoT networks. In this paper, we propose a transfer learning approach (TL) based on keylogging attacks where labeled data is sparse and unbalanced. We evaluated the proposed approach on the keylogger _detection dataset to show its effectiveness and compare it to current IDS approaches. the main findings of the experiments are as follows: the proposed approach has a high level of accuracy and a low level of false predictions (FPR). It performs better than traditional deep learning (DL) based IDS.
A photovoltaic (PV) system is highly sensitive to dynamic changes in environmental conditions. Improving the maximum power point tracking (MPPT) algorithm is one of the most cost-effective ways to enhance its performa...
详细信息
Rapid urban growth and industrial expansion in Indian cities have led to a 30% increase in vehicles over the past 5-10 years, causing a rise in air pollution and health risks. Existing methods to predict air quality f...
详细信息
Recently, the use of the Internet and computer networks in general, has increased exponentially, leading to a high demand for cybersecurity to protect against all kinds of network attacks that are constantly evolving....
详细信息
ISBN:
(纸本)9783031686528;9783031686535
Recently, the use of the Internet and computer networks in general, has increased exponentially, leading to a high demand for cybersecurity to protect against all kinds of network attacks that are constantly evolving. Nowadays, Machine learning (ML) is implemented in various cybersecurity tools, Intrusion Detection System-based ML brings more capabilities to improve the detection of cyber attacks. this study aims to perform a comparative analysis of a multiclass classification problem for cybersecurity attack detection. the comparative analysis is performed using six different machine learningalgorithms: Naive Bayes, Decision Tree, Random Forest, Support Vector Machine, eXtreme Gradient Boosting, and Multi-Layer Perceptron, which are applied to the full NSL-KDD dataset, and three other subsets of datasets to confirm and verify the findings in terms of precision, accuracy, training time, and testing time. In all dataset subsets we worked on in addition to the NSL-KDD dataset, eXtreme Gradient Boosting significantly beat the other algorithms. From all the experimental results, it is concluded that XGBoost is a plausible choice for an intrusion detection system in terms of all the metrics compared to the other ML algorithms discussed.
暂无评论