The wireless power transfer (WPT) technology has gained significant attention in recent years due to its potential to provide a convenient and efficient method to charging electronic devices without the need for physi...
详细信息
Central Serous Retinopathy (CSR) is an important health concern affecting millions of people worldwide, leading to vision loss and blindness. This condition is identified by abnormalities in retinal layers and fluid l...
详细信息
Mathematical model of the inductive power transfer (IPT) systems is essential for stability analysis and control design. Conventional modeling approaches for IPT systems result in high-order models, as each resonant v...
详细信息
Background: The fluid flow and nanofluid heat transfer are studied in this research through porous microchannels with different flow path arrangements in single-phase and two-phase modes (Mode I and Mode II). In Mode ...
详细信息
Road mishaps are more likely to be caused by tired drivers. Driving for extended periods of time, driving while sleep deprived, and driving while under the influence of drugs, alcohol, or medication are just a few of ...
Road mishaps are more likely to be caused by tired drivers. Driving for extended periods of time, driving while sleep deprived, and driving while under the influence of drugs, alcohol, or medication are just a few of the factors that contribute to driver fatigue. In developing nations, where the death rate from traffic injuries is above 85% and the disability-adjusted life expectancy is above 90%, traffic injuries and fatalities are a major public health concern. One of the safeguards to avoid accidents is drowsiness detection. Based on the parameters each method uses, drowsiness detection techniques created for defence purposes are divided into four groups. These groups are: Subjective-based, Vehicle-based, Behavioral or Visual-based, Mouth Tracking, Physiological or Non visual-based. The remote healthcare monitoring and drowsiness alert system is a network of interconnected vehicles that communicate with each other and with the surrounding environment using advanced communication technologies. It leverages this network to collect and transmit vital health data from drivers to healthcare professionals who can then use the information's to monitor their health status and provide timely medical interventions when necessary.
This comprehensive review starts with diving into the progress and real-world applications of combining multi-omics data analysis with machine learning techniques in cancer research. Multi-omics involves examining var...
This comprehensive review starts with diving into the progress and real-world applications of combining multi-omics data analysis with machine learning techniques in cancer research. Multi-omics involves examining various biological data types like genomics, transcriptomics, proteomics, and metabolomics together to enhance our understanding of complex biological systems. By merging machine learning with multiomics data, we highlight the advantages for cancer studies, the deeper insights they yield and increased performance and results. Furthermore, we explore existing literature that showcases the integration of multi-omics and machine learning in cancer research. As part of our study, we conduct an experiment utilizing a multiomics dataset to predict the survival of breast cancer patients. We compare three distinct machine learning methods-ensemble, DeepProg, and DCAP-for survival prediction and conclude that despite the ensemble method that increased the prediction results of DeepProg over DCAP in multi-model setting, but the primitive capacity for DCAP is better in single model setting and achieves higher accuracy than DeepProg with noticeable margin 0.628 to 0.57 on C-Index metric, which strongly recommends using Denoising Autoencoder as the base for dimensionality reduction over the vanilla Autoencoder. Another empirical results conclude that using gaussian mixture model with diagonal covariance matrix for Clustering, which is used in DeepProg, might hinder the process for identifying reasonable clusters due to the assumption of no or zero correlation between different features which might not hold true in our problem.
Technology and the revolution in communication have increased the popularity of digital money usage. Most of the monetary transactions currently take place digitally. It is more convenient and increases the ease for t...
详细信息
Technology and the revolution in communication have increased the popularity of digital money usage. Most of the monetary transactions currently take place digitally. It is more convenient and increases the ease for the user. But one major problem in digital money and credit card usage is security. With the increase in credit card usage, security issues increase correspondingly. Many studies and research work are going on to avoid and prevent such practices from taking place. Moreover, various studies on real-international credit scorecard statistics are attributable to confidentiality issues. This paper focuses on current credit card fraud practices and fraud detection methods implemented in real time. Different ML algorithms like fuzzy-based SVM (FSVM), random forest (RF), logistic regression (LR), and support vector machine (SVM) for fraudulent transaction detection on the dataset collected from credit card users have been used to classify legitimate and fraudulent transactions. The comparative analysis of the credit card fraud detection scheme using these classification models was performed with precision, accuracy, sensitivity, and specificity. The comparative analysis outcomes showed that the highest performance was given by the FS VM over other algorithms with an accuracy of 98.61%.
Coronaviruses are a type of virus that can cause a variety of disorders and exist in different types. COVID-19 is derived from a special type of a respiratory illness caused by the SARS-CoV-2 virus, discovered in 2019...
详细信息
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unautho...
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unauthorized access to sensitive data, or from vulnerabilities within the systems themselves. It is increasingly important that smart grid companies invest in cyber security solutions, such as strong passwords, two-factor authentication, encryption, and regular software updates, to counteract these threats. Additionally, it is beneficial for organizations to create incident response plans that are tailored to their specific needs, and which define the chain of command and actions to take in the case of an incident. To details the usage of smart grids in various domains and places in an effective way and explains the efficient way of consuming power for smart ventilators by monitoring and providing cyber security against cyber-attacks. The distributed power from various regions is collected from the less predominant places and supplied to the smart ventilators through smart inverters.
Deformable image registration is inherently challenging, but when applied to lung images, it becomes even more challenging due to the significant deformations because of extreme inhalation and extreme exhalation phase...
详细信息
暂无评论