Breast cancer is a widespread and serious condition that poses a significant threat to women's health globally, contributing significantly to mortality rates. Machine learning tools play a critical role in both th...
详细信息
Breast cancer is a widespread and serious condition that poses a significant threat to women's health globally, contributing significantly to mortality rates. Machine learning tools play a critical role in both the effective management and early detection of this disease. Feature selection (FS) methods are essential for identifying the most impactful features to improve breast cancer diagnosis. These methods reduce data dimensionality, eliminate irrelevant information, enhance learning accuracy, and improve the comprehensibility of results. However, the increasing complexity and dimensionality of cancer data pose substantial challenges to many existing FS methods, thereby reducing their efficiency and effectiveness. To overcome these challenges, numerous studies have demonstrated the success of nature-inspired optimization (NIO) algorithms across various domains. These algorithms excel in mimicking natural processes and efficiently solving complex optimization problems. Building on these advancements, we propose an innovative approach that combines powerful feature selection methods based on NIO techniques with a soft voting classifier. The NIO techniques employed include the Genetic Algorithm, Cuckoo Search, Salp Swarm, Jaya, Flower Pollination, Whale Optimization, Sine Cosine, Harris Hawks, and Grey Wolf Optimization algorithms. The Soft Voting Classifier integrates various machine learning models, including Support Vector Machines, Gaussian Naive Bayes, Logistic Regression, Decision Tree, and Gradient Boosting. These are used to improve the effectiveness and accuracy of breast cancer diagnosis. The proposed approach has been empirically evaluated using a variety of evaluation measures, such as F1 score, precision, recall, accuracy and Area Under the Curve (AUC), for performance comparison with individual machine learning techniques. The results demonstrate that the soft-voting ensemble technique, particularly when combined with feature selection based on the Jaya
To enhance the capability of classifying and localizing defects on the surface of hot-rolled strips, this paper proposed an algorithm based on YOLOv7 to improve defect detection. The BI-SPPFCSPC structure was incorpor...
详细信息
The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ...
详细信息
Matroid theory has been developed to be a mature branch of mathematics and has extensive applications in combinatorial optimization,algorithm design and so *** the other hand,quantum computing has attracted much atten...
详细信息
Matroid theory has been developed to be a mature branch of mathematics and has extensive applications in combinatorial optimization,algorithm design and so *** the other hand,quantum computing has attracted much attention and has been shown to surpass classical computing on solving some computational ***,crossover studies of the two fields seem to be missing in the *** paper initiates the study of quantum algorithms for matroid property *** is shown that quadratic quantum speedup is possible for the calculation problem of finding the girth or the number of circuits(bases,flats,hyperplanes)of a matroid,and for the decision problem of deciding whether a matroid is uniform or Eulerian,by giving a uniform lower boundΩ■on the query complexity of all these *** the other hand,for the uniform matroid decision problem,an asymptotically optimal quantum algorithm is proposed which achieves the lower bound,and for the girth problem,an almost optimal quantum algorithm is given with query complexityO■.In addition,for the paving matroid decision problem,a lower boundΩ■on the query complexity is obtained,and an O■ quantum algorithm is presented.
So far, the task of Scientific Query-Focused Summarization (Sci-QFS) has lagged in development when compared to other areas of Scientific Natural Language Processing because of the lack of data. In this work, we propo...
详细信息
Reduplication is a highly productive process in Bengali word formation, with significant implications for various natural language processing (NLP) applications, such as parts-of-speech tagging and sentiment analysis....
详细信息
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ...
详细信息
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering *** literature studies have proposed numerousmodels for the classification of security ***,adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning ***,most of the researchers focus only on the classification of requirements with security *** did not consider other nonfunctional requirements(NFR)directly or indirectly related to *** has been identified as a significant research gap in security requirements *** major objective of this study is to propose a security requirements classification model that categorizes security and other relevant security *** use PROMISE_exp and DOSSPRE,the two most commonly used datasets in the software engineering *** proposed methodology consists of two *** the first step,we analyze all the nonfunctional requirements and their relation with security *** found 10 NFRs that have a strong relationship with security *** the second step,we categorize those NFRs in the security requirements *** proposedmethodology is a hybridmodel based on the ConvolutionalNeural Network(CNN)and Extreme Gradient Boosting(XGBoost)***,we evaluate the model by updating the requirement type column with a binary classification column in the dataset to classify the requirements into security and non-security *** performance is evaluated using four metrics:recall,precision,accuracy,and F1 Score with 20 and 28 epochs number and batch size of 32 for PROMISE_exp and DOSSPRE datasets and achieved 87.3%and 85.3%accuracy,*** proposed study shows an enhancement in metrics
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
As one of the most popular technologies nowadays, cloud computing has a big demand in the distributed software space. It is highly difficult for CSPs to work together in a multi-cloud context, and contemporary literat...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap...
详细信息
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in *** model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection *** model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing *** results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities.
暂无评论