This study investigates credit card fraud detection using various machine learning techniques. It emphasizes handling the imbalanced nature of fraud data through a combination of oversampling (10%) and undersampling (...
详细信息
Video colorization is the process of assigning reasonable color values to gray videos. Most of the existing video colorization methods use an image colorization algorithm directly regardless of correlation between fra...
详细信息
As data becomes increasingly valuable, the importance of data privacy also grows. Governments and legislators worldwide have established regulations to safeguard users’ "Right to Be Forgotten", which allows...
详细信息
This paper presents a vehicle route planning method based on game theory principles and innovative utility functions. By addressing the complexities of real-Time traffic congestion, the proposed framework offers a dyn...
详细信息
Recently, evolutionary multitasking has been employed to generate a 'set of Pareto sets' (SOS) for machine learning models, addressing diverse task settings across heterogeneous environments. This involves cre...
详细信息
We analyze the well-posedness of an anisotropic,nonlocal diffusion *** an equivalence between weighted and unweighted anisotropic nonlocal diffusion operators in the vein of unified nonlocal vector calculus,we apply o...
详细信息
We analyze the well-posedness of an anisotropic,nonlocal diffusion *** an equivalence between weighted and unweighted anisotropic nonlocal diffusion operators in the vein of unified nonlocal vector calculus,we apply our analysis to a class of fractional-order operators and present rigorous estimates for the solution of the corresponding anisotropic anomalous diffusion ***,we extend our analysis to the anisotropic diffusion-advection equation and prove well-posedness for fractional orders s∈[0.5,1).We also present an application of the advection-diffusion equation to anomalous transport of solutes.
In business processes, the behavior, evolution and interactions of objects influence the outcome of process instances, and thus the value that a business user may assign to them. For example, in an order-to-cash proce...
详细信息
Existing autonomous vehicles have not utilized the cloud computing for execution of their deep learning-based driving tasks due to the long vehicle-to-cloud communication latency. Meanwhile, the vehicles are in genera...
详细信息
With the rapid development of artificial intelligence (AI) technology, its application in the field of clinical electroen-cephalography (EEG) diagnosis shows remarkable prospects. It has become an urgent need to assis...
详细信息
In general, monitoring wild animal behavior at reasonable outlay is necessary for both managing human wildlife conflicts and protecting wildlife thereby reliable method is needed to detect wild animals. On the other s...
详细信息
暂无评论