Artificial Intelligence (AI) has made huge enhancements in colon cancer research through its methods for diagnosis, treatment, and custom detection of one of the most common and fatal cancers suffered globally. Throug...
详细信息
Recent developments in electronic payment and e-commerce have led to a rise in digital fraud cases, including credit card fraud. Within the financial services industry, identifying credit card fraud is still a difficu...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
Recent developments in electronic payment and e-commerce have led to a rise in digital fraud cases, including credit card fraud. Within the financial services industry, identifying credit card fraud is still a difficult task that can have significant effects on consumers' and financial institutions' reputations. Therefore, it is crucial to implement systems capable of detecting credit card fraud. This research utilizes the European Cardholder Data Collection to assess the efficacy of ensemble machine learning techniques in identifying credit card fraud. The European cardholder data set is subjected to a rigorous assessment and evaluation of series of machine learning models, such as Gradient Boosting, Random Forest and CAT Boost, to detect fraudulent transactions. It has been noted that the dataset is unbalanced, which may indicate that the models' performance is not very ideal. The study suggests using data sampling strategies to achieve a balanced distribution of data across various algorithms that yield optimal outcomes. The main goal is to identify the model that performs best for machine learning classification problems by comparing the performance of different models. The results of this study will support further initiatives to improve credit card transaction security and lower financial losses brought on by fraud.
This research studies the role of advanced image processing and graphology at a higher level of complexity, that is, predicting grief by interpreting handwriting. The aim of this study is to establish a reliable model...
详细信息
In the agricultural sector, smallholder farmers in India face significant challenges with post-harvest losses, fluctuating market prices, and unsustainable practices. This research proposes a mobile-based application ...
详细信息
ISBN:
(数字)9798350353648
ISBN:
(纸本)9798350353655
In the agricultural sector, smallholder farmers in India face significant challenges with post-harvest losses, fluctuating market prices, and unsustainable practices. This research proposes a mobile-based application designed specifically for farmers in region of India, focusing on specific crops. To reduce agricultural waste, the app features an optimal storage location based on crop type. To improve farmer income, the app includes a crop recommendation module that integrates historical yield data, weather forecasts, soil characteristics, and real-time market prices. Machine learning models, validated with field data, suggest high-yield, profitable crops and optimal sales timing. A market information hub provides real-time mandi prices and demand forecasts. With a user-friendly interface and visual explanations, the app addresses the technological constraints of smallholder farmers. This research aims to reduce agricultural waste, improve farmer income, and promote sustainable agriculture practices.
Music mashups integrate elements from different songs to create surprising and engaging listening experiences. Typically, a mashup combines the vocal track of a base song with the instrumental tracks of complementary ...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Music mashups integrate elements from different songs to create surprising and engaging listening experiences. Typically, a mashup combines the vocal track of a base song with the instrumental tracks of complementary songs. Automating the production of mashups has been an area of research for decades. Traditional approaches utilize rule-based methods, such as matching tempo and harmonic similarity, to select optimal segments for mashup generation. More recent techniques leverage neural networks to classify segment compatibility. However, both approaches primarily focus on layering segments that are generally compatible, without ensuring their detailed integration and alignment with the vocal track. In contrast, we introduce a novel approach using Graph Neural Networks (GNNs) that learns to rearrange instrumental segments to better align with the base vocal track, resulting in more surprising and accurate music blends for mashup generation. Additionally, we conducted subjective listening tests to evaluate our generated mashups against a baseline model using the same song pairs and the original base songs, assessing our model’s performance. Generated mashups used for evaluation can be found in https://***/***/.
Tremendous amount of meteorological data is being generated on a daily basis from a number of sources such as weather stations, balloons, satellites, sensors etc. Timely weather prediction helps people plan everyday l...
Tremendous amount of meteorological data is being generated on a daily basis from a number of sources such as weather stations, balloons, satellites, sensors etc. Timely weather prediction helps people plan everyday life events. Long Short Term Memory (LSTM) networks perform extremely well for capturing dependencies in time series datasets. Number of neurons in hidden layer highly impacts the performance of the LSTM network. The hit and Trial method for selecting the neurons consumes a lot of time and resources and might not lead to a global optimum solution. In this research work, two techniques, i.e. Genetic Algorithm optimized LSTM (LSTM_GA) and Artificial Bee Colony optimized LSTM (LSTM_ABC) have been proposed and implemented to automate the selection of the hidden layer’s neurons for improved weather prediction. Proposed techniques have been implemented using DeepLearning4j library making the techniques scalable on clusters of machines. For evaluating the performance of proposed techniques, 15 years Brazil’s weather dataset has been used. The experimental results proved that the proposed LSTM_GA and LSTM_ABC techniques have the reduced MAE value of 0.0074 and 0.0075 respectively while the LSTM network without any optimization has a relatively higher MAE value of 0.0086.
Culture represents a society with human values and ethics. Without civilization there can be no culture. Thus it is very important to preserve our culture as it represents our values and ethics. Each region has its ow...
详细信息
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis o...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis of various machine learning methods, assessing their effectiveness in detecting and predicting malicious activities associated with IoT botnets. This paper meticulously examines initial identification methods for IoT botnet operations using advanced machine learning (ML) prediction techniques. To achieve this, we utilize the CICIoT2023 Dataset, a real-world IoT dataset obtained from networks that captures diverse device interactions and communication patterns. This dataset acts as the framework for constructing and evaluating numerous machine learning techniques, including support vector machines (SVM), k-nearest neighbours (k-NN), Naive Bayes, random forest (RF), logistic regression (LR), and decision trees (DT) approaches. Performance metrics such as accuracy, precision, F1-score, ROC curve, confusion matrix, and recall are employed to gain insights into the algorithms’ capabilities in botnet detection. Furthermore, this paper delves into an examination of the trade-offs between computational complexity and detection accuracy. This analysis aids in selecting the most suitable ML techniques tailored to specific IoT security scenarios. This comparative analysis lays the groundwork for the advancement of IoT botnet discovery strategies, providing essential insights to researchers, practitioners, and industry experts working to strengthen IoT ecosystems against growing cyber threats. We anticipate that our findings will spark more conversations and developments in the sector, promoting the establishment of more robust and adaptable security measures across the IoT landscape.
Lexical resemblances among a group of languages indicate that the languages could be genetically related, i.e., they could have descended from a common ancestral language. However, such resemblances can arise by chanc...
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-...
详细信息
ISBN:
(数字)9798350365337
ISBN:
(纸本)9798350365344
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-step process: strategic data augmentation with rotation limitations for realistic variations, feature extraction using parallel atrous convolution layers with varying dilation rates to capture multi-scale information, and robust feature map generation through output concatenation. This approach achieves a remarkable accuracy of 94.65%, surpassing the performance of established pre-trained models like VGG-16, ResNet-50, and AlexNet. This research contributes a significant advancement in real-world traffic sign classification in autonomous vehicles.
暂无评论