Autonomising industrial robots is the main goal in this paper;imagine humanoid robots that have several degrees of freedom (DOF) mechanisms as their arms. What if the humanoid's arms could be programmed to be resp...
详细信息
Cellular automata can simulate many complex physical phenomena using the power of simple rules. The presented methodological platform expresses the concept of programmable matter in which Newton’s laws of motion are ...
详细信息
By analyzing large amounts of animal behavior data, humans can assess cattle’s condition. It leads to research and development a field using accelerometers and machine learning algorithms to ‘study’ behavior from a...
详细信息
Myelin damage and a wide range of symptoms are caused by the immune system targeting the central nervous system in Multiple Sclerosis(MS),a chronic autoimmune neurological *** disrupts signals between the brain and bo...
详细信息
Myelin damage and a wide range of symptoms are caused by the immune system targeting the central nervous system in Multiple Sclerosis(MS),a chronic autoimmune neurological *** disrupts signals between the brain and body,causing symptoms including tiredness,muscle weakness,and difficulty with memory and *** methods for detecting MS are less precise and time-consuming,which is a major gap in addressing this *** gap has motivated the investigation of new methods to improve MS detection consistency and *** paper proposed a novel approach named FAD consisting of Deep Neural Network(DNN)fused with an Artificial Neural Network(ANN)to detect MS with more efficiency and accuracy,utilizing regularization and combat *** use gene expression data for MS research in the GEO GSE17048 *** dataset is preprocessed by performing encoding,standardization using min-max-scaler,and feature selection using Recursive Feature Elimination with Cross-Validation(RFECV)to optimize and refine the ***,for experimenting with the dataset,another deep-learning hybrid model is integrated with different ML models,including Random Forest(RF),Gradient Boosting(GB),XGBoost(XGB),K-Nearest Neighbors(KNN)and Decision Tree(DT).Results reveal that FAD performed exceptionally well on the dataset,which was evident with an accuracy of 96.55%and an F1-score of 96.71%.The use of the proposed FAD approach helps in achieving remarkable results with better accuracy than previous studies.
Traffic congestion in urban areas presents a major challenge to efficient transportation systems. Recent advancements in traffic management provide promising solutions, with perimeter control emerging as a technique t...
详细信息
Home hand rehabilitation for stroke is becoming increasingly important due to logistic and financial challenges. Developing Daily-life Integrated Hand-rehabilitation Products (DIHP) aims to enable the application of a...
详细信息
Federated learning (FL) is an emerging privacy preserving machine learning protocol that allows multiple devices to collaboratively train a shared global model without revealing their private local data. Nonparametric...
详细信息
In this research we aim to develop a computer-aided diagnostic system (CAD) for breast ultrasound imaging to enhance the early detection of breast cancer. CAD tools aid physicians in the diagnostic process leading to ...
详细信息
The Selective Laser Melting (SLM) of the powder bed fusion is a method of laminating metal powder that are selectively melted and solidified by laser beam to build a three-dimensional object. In recent years, its use ...
详细信息
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of informati...
详细信息
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident *** research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour *** applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data *** single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident *** data analysis did not support threat severity relationship with conscious care *** findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.
暂无评论