As the manufacturing industry develops towards high precision and intelligence, CNC machine tools play an important role in production. The occurrence of failures not only reduces production efficiency but also increa...
详细信息
CEPST algorithm is an important step in image processing, which is widely used in computer vision, pattern recognition, andmachinelearning. In order to improve the efficiency and performance of CEPST algorithm, more...
详细信息
We demonstrate an improved deep residual network model that can recover the distorted chirp signals of the microwave photonic receiving systems. The method can achieve high-precision recovery of distorted signals by l...
详细信息
The proceedings contain 82 papers. The topics discussed include: comparative analysis of various machinelearning techniques for intrusion detection system;influence of assorted back barriers on AlGaN/GaN HEMT for 5G ...
ISBN:
(纸本)9781728118499
The proceedings contain 82 papers. The topics discussed include: comparative analysis of various machinelearning techniques for intrusion detection system;influence of assorted back barriers on AlGaN/GaN HEMT for 5G K-band applications;a low-cost Arduino based automatic irrigation system using soil moisture sensor: design and analysis;sequential segmentation of EEG signals for epileptic seizure detection using machinelearning;classification of lung images using deep convolutional neural network;a four grade brain tumor classification system using deep neural network;feature selection and classification for analysis of breast thermograms;multi-frame image super-resolution by interpolation and iterative backward projection;state of art of network on chip;and a hybrid secure and energy efficient cluster based intrusion detection system for wireless sensing environment.
Mitigating image defocus blur induced by the limited depth of field in imaging systems and reconstructing the three-dimensional depth of scenes represents a significant hurdle. In this paper, a method for enhancing de...
详细信息
The PROCESS Challenge aims to detect cognitive decline, including early stages like mild cognitive impairment, through spontaneous speech. This paper describes TalTech’s systems prepared for the challenge that applie...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
The PROCESS Challenge aims to detect cognitive decline, including early stages like mild cognitive impairment, through spontaneous speech. This paper describes TalTech’s systems prepared for the challenge that applied machinelearning models incorporating multimodal features to address both regression and classification tasks. For regression, the Lasso model achieved an RMSE of 2.54 on the test set, achieving 2nd place in the challenge. For classification, the XGBoost model achieved a macro F1 score of 0.61, placing 6th. These results demonstrate the potential of integrating diverse speech-based features and predictive modeling for scalable, early detection of cognitive decline.
Ultraviolet (UV) photodetector (PD) is a device that converts optical signal into electrical signal, serving as a critical component in optoelectronic systems. Due to the leakage effect caused by defects of substrate ...
详细信息
The proceedings contain 36 papers. The special focus in this conference is on machine Intelligence andsignalprocessing. The topics include: Real-time RADAR and LIDAR sensor fusion for automated driving;generalizing ...
ISBN:
(纸本)9789811513657
The proceedings contain 36 papers. The special focus in this conference is on machine Intelligence andsignalprocessing. The topics include: Real-time RADAR and LIDAR sensor fusion for automated driving;generalizing streaming pipeline design for big data;Adaptive fast composite splitting algorithm for MR image reconstruction;extraction of technical and non-technical skills for optimal project-team allocation;modified flower pollination algorithm for optimal power flow in transmission congestion;Intelligent condition monitoring of a CI engine using machinelearning and artificial neural networks;bacterial foraging optimization in non-identical parallel batch processingmachines;healthcare information retrieval based on neutrosophic logic;Convolutional neural network long short-term memory (CNN + LSTM) for histopathology cancer image classification;a novel approach for music recommendation system using matrix factorization technique;forecasting with multivariate fuzzy time series: A statistical approach;nature-inspired algorithm-based feature optimization for epilepsy detection;a combined machine-learning approach for accurate screening and early detection of chronic kidney disease;backpropagation and self-organizing map neural network methods for identifying types of eggplant fruit;head pose prediction while tracking lost in a head-mounted display;recommendation to group of users using the relevance concept;ACA: Attention-based context-aware answer selection system;dense and partial correspondence in non-parametric scene parsing;audio surveillance system;mopsa: Multiple output prediction for scalability and accuracy;Generation of image captions using VGG and resnet CNN models cascaded with RNN approach;impact of cluster sampling on the classification of landsat 8 remote sensing imagery;deep neural networks for out-of-sample classification of nonlinear manifolds;FPGA implementation of LDPC decoder.
The proceedings contain 60 papers. The topics discussed include: modeling a H-H neuron based spiking neural network incorporating multiple pre-synaptic inputs;design of memristor - CMOS based logic gates and logic cir...
ISBN:
(纸本)9781728107448
The proceedings contain 60 papers. The topics discussed include: modeling a H-H neuron based spiking neural network incorporating multiple pre-synaptic inputs;design of memristor - CMOS based logic gates and logic circuits;voltage controlled stimulator for nerve conduction study;a review on artifacts removal techniques for electroencephalogram signals;a non-intrusive opto-mechanical technique for the measurement of liquid level;and improved shuf?ed frog leaping algorithm for path planning of multiple mobile-robot.
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ...
详细信息
ISBN:
(数字)9798331530389
ISBN:
(纸本)9798331530396
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and the government causing financial losses. Additionally, prolonged DDoS attacks can spoil user experience and degrade company reputation. The recent literature reveals various techniques for detecting DDoS attacks, including pre-trained machinelearning and deep learning algorithms. This research paper addresses this challenge by tweaking random forest algorithms for maximum accuracy using CICDDoS2019 dataset. The methodology includes collecting of dataset, data processing, feature scaling and training multiple machinelearning algorithms to identify maximum accuracy for detecting DDoS attacks. The result shows improvement of accuracy and precision of machinelearning models used. Future work may include training the model for other types of attacks, real time implementation of the model developed, developing a hybrid approach for detection and protection from DDoS attack.
暂无评论