Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)t...
详细信息
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)techniques have played an important role in early diagnosis and help physicians make *** study evaluated the performance of Machine Learning(ML)algorithms on the hepatitis data *** dataset contains missing values that have been processed and outliers *** dataset was counterbalanced by the Synthetic Minority Over-sampling Technique(SMOTE).The features of the data set were processed in two ways:first,the application of the Recursive Feature Elimination(RFE)algorithm to arrange the percentage of contribution of each feature to the diagnosis of hepatitis,then selection of important features using the t-distributed Stochastic Neighbor Embedding(t-SNE)and Principal Component Analysis(PCA)***,the SelectKBest function was applied to give scores for each attribute,followed by the t-SNE and PCA ***,the classification algorithms K-Nearest Neighbors(KNN),Support Vector Machine(SVM),Artificial Neural Network(ANN),Decision Tree(DT),and Random Forest(RF)were fed by the dataset after processing the features in different methods are RFE with t-SNE and PCA and SelectKBest with t-SNE and PCA).All algorithms yielded promising results for diagnosing hepatitis data *** RF with RFE and PCA methods achieved accuracy,Precision,Recall,and AUC of 97.18%,96.72%,97.29%,and 94.2%,respectively,during the training *** the testing phase,it reached accuracy,Precision,Recall,and AUC by 96.31%,95.23%,97.11%,and 92.67%,respectively.
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua...
详细信息
The thyroid gland, a pivotal regulator of essential physiological functions, orchestrates the production and release of thyroid hormones, playing a vital role in metabolism, growth, development, and overall bodily fun...
详细信息
In recent years, various companies have started to shift their data services from traditional data centers to the cloud. One of the major motivations is to save on operational costs with the aid of cloud elasticity. T...
详细信息
In recent years, various companies have started to shift their data services from traditional data centers to the cloud. One of the major motivations is to save on operational costs with the aid of cloud elasticity. This paper discusses an emerging need from financial services to reduce the incidence of idle servers retaining very few user connections, without disconnecting them from the server side. This paper considers this need as a bi-objective online load balancing problem. A neural network based scalable policy is designed to route user requests to varied numbers of servers for the required elasticity. An evolutionary multi-objective training framework is proposed to optimize the weights of the policy. Not only is the new objective of idleness reduced by over 130% more than traditional industrial solutions, but the original load balancing objective itself is also slightly improved. Extensive simulations with both synthetic and real-world data help reveal the detailed applicability of the proposed method to the emergent problem of reducing idleness in financial services.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
In agriculture, crop yield estimation is essential;producers, industrialists, and consumers all benefit from knowing the early yield. Manual mango counting typically involves the utilization of human labor. Experts vi...
详细信息
This paper examines the convergence of cloud computing, facts science, and facts engineering, providing a primer for college kids getting into those fields. The examine highlights the synergistic courting among those ...
详细信息
Point clouds can capture the precise geometric information of objects and scenes, which are an important source of 3-D data and one of the most popular 3-D geometric data structures for cognitions in many real-world a...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,*** recent times,these systems have suffered from cyber attacks numer-ous *** have been developing cyber security solutions for Cls to avoid lasting *** to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these *** of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the ***,anomaly detection in physical dynamics proves an effective means to implement *** is one example of anomaly detection in the sensor/actuator data,representing such systems physical *** present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to *** method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions *** validate EPASAD using the dataset produced by the TE-process simulator and the C-town *** results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively.
Question-answering(QA)models find answers to a given *** necessity of automatically finding answers is increasing because it is very important and challenging from the large-scale QA data *** this paper,we deal with t...
详细信息
Question-answering(QA)models find answers to a given *** necessity of automatically finding answers is increasing because it is very important and challenging from the large-scale QA data *** this paper,we deal with the QA pair matching approach in QA models,which finds the most relevant question and its recommended answer for a given *** studies for the approach performed on the entire dataset or datasets within a category that the question writer manually *** contrast,we aim to automatically find the category to which the question belongs by employing the text classification model and to find the answer corresponding to the question within the *** to the text classification model,we can effectively reduce the search space for finding the answers to a given ***,the proposed model improves the accuracy of the QA matching model and significantly reduces the model inference ***,to improve the performance of finding similar sentences in each category,we present an ensemble embedding model for sentences,improving the performance compared to the individual embedding *** real-world QA data sets,we evaluate the performance of the proposed QA matching *** a result,the accuracy of our final ensemble embedding model based on the text classification model is 81.18%,which outperforms the existing models by 9.81%∼14.16%***,in terms of the model inference speed,our model is faster than the existing models by 2.61∼5.07 times due to the effective reduction of search spaces by the text classification model.
暂无评论