We extracted four key metrics from the "Wimbledon_featured_***" dataset: scoring variance, cumulative winning serves, unforced errors, and physical *** first assigned reasonable weights to these four indicat...
详细信息
ISBN:
(纸本)9798400712647
We extracted four key metrics from the "Wimbledon_featured_***" dataset: scoring variance, cumulative winning serves, unforced errors, and physical *** first assigned reasonable weights to these four indicators through AHP-CRITIC, and then summed them up to obtain a momentum calculation model, which was used to calculate the momentum value of each scoring point. Momentum magnitudes of athletes and opponents were then compared, setting fluctuations as binary variables (“0” for defense and “1” for offense). Streaks were quantified using differences in scoring data. The chi-square test was then used to confirm this significant relationship between streaks and momentum fluctuations (p<0.05). The prediction model we developed used the scoring data as the input variable and the magnitude of momentum as the output variable. We first compared the accuracy of the four models, neural network, Markov chain and GBDT, and found that GBDT has 99.8% accuracy and neural network has only 69.9% accuracy, so we chose GBDT as the prediction *** model reflects the cumulative score and service opportunity are important indicators. When our model is used for the dataset “2023-wimbledon-1701”, the accuracy of the model is very high. The sensitivity analysis shows that the model has 68.6% accuracy after excluding key scoring data. A women's tennis tournament data is applied to our model with 95.4% accuracy, which shows the strong generalization ability of our model.
Let k≥2. A generalization of the well-known Lucas sequence is the k-Lucas sequences. For this sequence, the first k terms are 0,…,0,2,1 and each term afterwards is the sum of the preceding k terms. In this paper, we...
详细信息
The estimation of the absorption coefficients of the boundary surfaces in a room is important in room acoustic engineering. This research presents a machine learning method learns from simulated data to estimate the r...
详细信息
In late-stage type 2 diabetes, automated titration algorithms provide a promising alternative to the current standard-of-care. Many published methods rely on personalized dose-response models to predict a safe and eff...
详细信息
Low Power Wide Area Networks (LPWANs) plat-forms (LoRa, NB-IoT, Sigfox) came to add a missing piece to the Internet of Things (IoT) ecosystem, namely long range communication in low power. LPWAN platforms are characte...
Low Power Wide Area Networks (LPWANs) plat-forms (LoRa, NB-IoT, Sigfox) came to add a missing piece to the Internet of Things (IoT) ecosystem, namely long range communication in low power. LPWAN platforms are characterized by low data rate and long transmission time. LoRa specifically, has a data rate from 27 to 0.3 kbps and the transmission time of a single packet might be more than 1.5 seconds for some cases. These characteristics render LPWANs vulnerable to jamming attacks as a malicious user can perform a jamming attack from long range and the long transmission time is allowing a large time window to perform the attack. Moreover, if the jamming node is mobile (i.e., attached on a vehicle or an Unmanned Aerial Vehicle (UAV)), the current countermeasures proposed by the literature will not be relevant anymore. In this paper we investigate if it is possible to detect a mobile LoRa jammer based on the impact of the Doppler effect and based on a combination of signal strength and the entropy of the transmitted data. The results, obtained by utilizing commercial hardware, reveal that we could detect a potential mobile jammer that follows a deceptive jamming strategy with random payload, but further investigation is required for more sophisticated jamming attacks.
Even though accurate detection of dangerous malignancies from mammogram images is mostly dependent on radiologists' experience, specialists occasionally differ in their assessments. computer-aided diagnosis provid...
Even though accurate detection of dangerous malignancies from mammogram images is mostly dependent on radiologists' experience, specialists occasionally differ in their assessments. computer-aided diagnosis provides a better solution for image diagnosis that can help experts make more reliable decisions. In medical applications for diagnosing cancerous growths from mammogram images, computerized and accurate classification of breast cancer mammogram images is critical. The deep learning approach has been widely applied in medical image processing and has had considerable success in biological image classification. The Convolutional Neural Network (CNN), Inception, and EfficientNet are proposed in this paper. The proposed models attain better performance compared to the conventional CNN. The models are used to automatically classify breast cancer mammogram images from Kaggle into benign and malignant. Simulation results demonstrated that EfficientNet, with an accuracy between 97.13 and 99.27%, and overall accuracy of 98.29%, perform better than the other models in this paper.
In human sleep staging models, augmenting the temporal context of the input to the range of tens of minutes has recently demonstrated performance improvement. In contrast, the temporal context of mouse sleep staging m...
详细信息
ISBN:
(数字)9798350371499
ISBN:
(纸本)9798350371505
In human sleep staging models, augmenting the temporal context of the input to the range of tens of minutes has recently demonstrated performance improvement. In contrast, the temporal context of mouse sleep staging models is typically in the order of tens of seconds. While long-term time patterns are less clear in mouse sleep, increasing the temporal context further than that of the current mouse sleep staging models might still result in a performance increase, given that the current methods only model very short term patterns. In this study, we examine the influence of increasing the temporal context in mouse sleep staging up to 15 minutes in three mouse cohorts using two recent and high-performing human sleep staging models that account for long-term dependencies. These are compared to two prominent mouse sleep staging models that use a local context of 12 s and 20 s, respectively. An increase in context up to 28 s is observed to have a positive impact on sleep stage classification performance, especially in REM sleep. However, the impact is limited for longer context windows. One of the human sleep scoring models, L-SeqSleepNet, outperforms both mouse models in all cohorts. This suggests that mouse sleep staging can benefit from more temporal context than currently used.
This paper introduces an alternative technique for diagnosing Acute Ischemic Stroke within the IoMT environment. In the proposed approach, the collected data is transmitted to a cloud-based center where the technique ...
详细信息
Data is always a crucial issue of concern especially during its prediction and computation in digital *** paper exactly helps in providing efficient learning mechanism for accurate predictability and reducing redundan...
详细信息
Data is always a crucial issue of concern especially during its prediction and computation in digital *** paper exactly helps in providing efficient learning mechanism for accurate predictability and reducing redundant data *** also discusses the Bayesian analysis that finds the conditional probability of at least two parametric based predictions for the *** paper presents a method for improving the performance of Bayesian classification using the combination of Kalman Filter and *** method is applied on a small dataset just for establishing the fact that the proposed algorithm can reduce the time for computing the clusters from *** proposed Bayesian learning probabilistic model is used to check the statistical noise and other inaccuracies using unknown *** scenario is being implemented using efficient machine learning algorithm to perpetuate the Bayesian probabilistic *** also demonstrates the generative function forKalman-filer based prediction model and its *** paper implements the algorithm using open source platform of Python and efficiently integrates all different modules to piece of code via Common Platform Enumeration(CPE)for Python.
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative fea...
详细信息
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware *** an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware *** technique optimizes the model’s performance and reduces computational *** proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature *** the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate *** evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced *** demonstrates the method’s ability to classify malware samples accurately while minimizing processing *** method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and *** new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and *** research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained *** and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures.
暂无评论