Medical notes contain valuable information about patient conditions, treatments, and progress. Extracting symptoms from these unstructured notes is crucial for clinical research, population health analysis, and decisi...
Medical notes contain valuable information about patient conditions, treatments, and progress. Extracting symptoms from these unstructured notes is crucial for clinical research, population health analysis, and decision support systems. Traditional manual methods are time-consuming, but recent advances in natural language processing (NLP) and machine learning offer automated solutions. This article presents a novel approach that combines NLP techniques, such as conditional random fields (CRF) and transformer-based architectures. The proposed method demonstrates effective symptom extraction from medical notes, overcoming challenges such as varied terminologies and linguistic nuances. The study utilizes a dataset of Russian medical records, transforming it into a tabular format for training and employing unique tokenization algorithms for different models. Among the evaluated models, RuBERT achieved the highest accuracy of 91%, indicating its strong performance on the test dataset. SBERT exhibited the highest precision and F1 score, suggesting its effectiveness in accurately identifying specific sequence labels.
Automated exercise repetition counting has applications across the physical fitness realm, from personal health to rehabilitation. Motivated by the ubiquity of mobile phones and the benefits of tracking physical activ...
详细信息
Real-time CPSs using Artificial Neural Networks (ANNs) are traditionally developed as monolithic black-boxes. This results in designs that are often difficult to formally verify against safety specifications and imple...
详细信息
ISBN:
(数字)9798350378023
ISBN:
(纸本)9798350378030
Real-time CPSs using Artificial Neural Networks (ANNs) are traditionally developed as monolithic black-boxes. This results in designs that are often difficult to formally verify against safety specifications and implement on hardware for formal timing analysis. Consequently, their implementation as a composition of smaller ANNs has received recent interest. These are easier to implement, parallelise and validate. Despite this, the question of how to produce hardware-implementable compositional designs from existing monolithic ones remains largely unanswered. This work develops a novel procedure to replace large ANN monolithic designs with smaller compositional designs and implement them on a Field Programmable Gate Array (FPGA) for timing analysis using synchronous compositional semantics. To illustrate our approach, we develop regression and classification ANN designs for multiple real-life datasets. Using various design and model architecture variations, we show that using a compositional design instead of a monolithic design can achieve an $\mathbf{8 5 \%}$ reduction in WCET, around a $\mathbf{53 \%}$ reduction in hardware resources and around a 40% reduction in computations and neuron connections for a minor reduction in performance.
software requirements are the expectation of stakeholders which are identified and modeled by various requirements elicitation and modeling techniques like traditional methods, goal oriented methods, and unified model...
详细信息
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion ***...
详细信息
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion *** addition,IoT devices generate a high volume of unstructured *** intrusion detection systems often struggle to cope with the unique characteristics of IoT networks,such as resource constraints and heterogeneous data *** the unpredictable nature of network technologies and diverse intrusion methods,conventional machine-learning approaches seem to lack *** numerous research domains,deep learning techniques have demonstrated their capability to precisely detect *** study designs and enhances a novel anomaly-based intrusion detection system(AIDS)for IoT ***,a Sparse Autoencoder(SAE)is applied to reduce the high dimension and get a significant data representation by calculating the reconstructed ***,the Convolutional Neural Network(CNN)technique is employed to create a binary classification *** proposed SAE-CNN approach is validated using the Bot-IoT *** proposed models exceed the performance of the existing deep learning approach in the literature with an accuracy of 99.9%,precision of 99.9%,recall of 100%,F1 of 99.9%,False Positive Rate(FPR)of 0.0003,and True Positive Rate(TPR)of *** addition,alternative metrics,such as training and testing durations,indicated that SAE-CNN performs better.
Indeed, successful phishing website attempts could result in catastrophic data loss, login credential compromise, ransomware infection, and financial loss. It also significantly hampers the competitiveness and product...
详细信息
Indeed, successful phishing website attempts could result in catastrophic data loss, login credential compromise, ransomware infection, and financial loss. It also significantly hampers the competitiveness and productivity of online users and internet-dependent organizations unless an intelligent anti-phishing solution is devised. Due to detecting fresh phishing website attacks with maximum accuracy by discovering hidden patterns from complex datasets is shown to be an intrinsic property of M- Learning approaches, the study conducted rigorous experiments on four purposely selected efficient supervised M-Learning algorithms before and after applying five widely used proper feature selection techniques such as Recursive Feature Elimination, Pierson Correlation Coefficient, Principal Component Analysis, Uni-variate Feature Selection, and Mutual Information. The proposed study was conducted to balance the research gaps and scientific disputes in the rigorously reviewed studies. The study’s final outcome is a proposal for an intelligent phishing website model that yields higher accuracy, faster response times, and fewer average misclassification rates. The study also explored the feature selection techniques that had more, less, and no contributions to enhancing each classifier's accuracy. As compared to the remaining classifiers, the Cat-Boost Classifier attained superior phishing website detection accuracy (97.46%), F1-score (97.49%), a lower average misclassification rate (2.54%), and acceptable train-test computational time (7 s) after using the UFS technique. On the other hand, the PCA technique failed to enhance the accuracy of the Cat-Boost, Gradient-Boost, and Random Forest Classifiers due to scoring less accuracy than the accuracy reached before using proper feature selection techniques. To obtain more promising results, in future work, phishing website detection is expected to be carried out using a Hybrid proper feature selection technique, huge datasets, prop
High dropout rates globally perpetuate educational disparities with various underlying causes. Despite numerous strategies to address this issue, more attention should be given to understanding and addressing student ...
详细信息
The COVID-19 pandemic has expedited the shift in education to online learning, which has exposed shortcomings in virtual learning environments' personalization and engagement. This research addresses these issues ...
详细信息
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa...
详细信息
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per...
详细信息
暂无评论