Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate *** learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier ...
详细信息
Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate *** learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier algorithms to identify CKD *** study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California,UC Irvine Machine Learning *** research introduces TrioNet,an ensemble model combining extreme gradient boosting,random forest,and extra tree classifier,which excels in providing highly accurate predictions for ***,K nearest neighbor(KNN)imputer is utilized to deal withmissing values while synthetic minority oversampling(SMOTE)is used for class-imbalance *** ascertain the efficacy of the proposed model,a comprehensive comparative analysis is conducted with various machine learning *** proposed TrioNet using KNN imputer and SMOTE outperformed other models with 98.97%accuracy for *** in-depth analysis demonstrates the model’s capabilities and underscores its potential as a valuable tool in the diagnosis of CKD.
Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
Alzheimer's disease (AD) is the most well-known cause of dementia that affects memory. Alzheimer's patients have a neurodegenerative disorder that results in the loss of many brain functions. Today’s research...
详细信息
This paper introduces a new approach to switch authentication within a network environment, addressing the challenges associated with multiple switch configurations. The proposed continuous authentication process is s...
详细信息
The rapid development of unmanned aerial vehicle(UAV) swarm, a new type of aerial threat target, has brought great pressure to the air defense early warning system. At present, most of the track correlation algorithms...
详细信息
The rapid development of unmanned aerial vehicle(UAV) swarm, a new type of aerial threat target, has brought great pressure to the air defense early warning system. At present, most of the track correlation algorithms only use part of the target location, speed, and other information for *** this paper, the artificial neural network method is used to establish the corresponding intelligent track correlation model and method according to the characteristics of swarm ***, a route correlation method based on convolutional neural networks (CNN) and long short-term memory (LSTM)Neural network is designed. In this model, the CNN is used to extract the formation characteristics of UAV swarm and the spatial position characteristics of single UAV track in the formation,while the LSTM is used to extract the time characteristics of UAV swarm. Experimental results show that compared with the traditional algorithms, the algorithm based on CNN-LSTM neural network can make full use of multiple feature information of the target, and has better robustness and accuracy for swarm targets.
The discriminative correlation filter (DCF) is commonly utilized in UAV tracking because of its high tracking accuracy and computing speed. However, in aerial tracking scenarios, challenges such as target occlusion an...
详细信息
The discriminative correlation filter (DCF) is commonly utilized in UAV tracking because of its high tracking accuracy and computing speed. However, in aerial tracking scenarios, challenges such as target occlusion and similar object interference are likely to cause the predicted object position to deviate from the correct motion trajectory. To alleviate this issue, this paper proposes a correlation filter algorithm based on trajectory correction and context interference suppression for real-time aerial tracking. First, a tracking quality evaluation metric is proposed to determine the confidence of the current tracking results. When the object is in a low confidence status, the state matrices of the object position and velocity are constructed, and the Kalman filter strategy is utilized to correct the tracking trajectory automatically. In addition, temporal context-response regularization is designed to fully exploit previous temporal information in order to suppress background interference. Extensive experimental results on four mainstream datasets demonstrate that the proposed algorithm has high tracking performance while achieving a real-time tracking speed of 32 fps on a single CPU. IEEE
Dear Editor,This letter presents a multi-automated guided vehicles(AGV) routing planning method based on deep reinforcement learning(DRL)and recurrent neural network(RNN), specifically utilizing proximal policy optimi...
详细信息
Dear Editor,This letter presents a multi-automated guided vehicles(AGV) routing planning method based on deep reinforcement learning(DRL)and recurrent neural network(RNN), specifically utilizing proximal policy optimization(PPO) and long short-term memory(LSTM).
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two p...
详细信息
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two perspectives: feature selection and distance-weight instance transfer. We reduce the differences between projects from the perspective of feature engineering and introduce the transfer learning technology to construct a cross-project defect prediction model WCM-WTrA and multi-source model Multi-WCM-WTrA. We have tested on AEEEM and ReLink datasets, and the results show that our method has an average improvement of 23%compared with TCA+ algorithm on AEEEM datasets,and an average improvement of 5% on ReLink datasets.
暂无评论