Customer churn is a situation that receives extensive analysis using a variety of techniques from data mining or machine learning. Data mining techniques may be used to anticipate customer churn. A data mining algorit...
详细信息
Customer churn is a situation that receives extensive analysis using a variety of techniques from data mining or machine learning. Data mining techniques may be used to anticipate customer churn. A data mining algorithm was used in this study to forecast client turnover. Logistic Regression and gradient boosting models were employed as one of the data mining techniques for implementing customer churn forecasts. The gradient boosting model could be said to perform better in predicting customer churn when compared to the logistic regression model, which produced accuracy training 87% and testing 88%. The results showed that the gradient boosting model was able to carry out the training and testing process with a training accuracy of 93% and a testing accuracy of 91%.
Despite the abundance of subphenotype clustering studies on sepsis and acute kidney injury (AKI), few models consider the real-time information of clinical features. The lack of supervision may lead to patient subgrou...
详细信息
Monitoring a tributary's water depth and velocity can provide a wealth of information for ecological systems. Typically, tributaries are located deep within the jungle, and manual measurement is the norm. The rese...
详细信息
Recently, single image super-resolution (SR) under large scaling factors has witnessed impressive progress by introducing pre-trained generative adversarial networks (GANs) as priors. However, most GAN-Priors based SR...
详细信息
WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this art...
WI-FI-6/6E is now commercialized and the WI-FI community is currently developing the IEEE 802.11be standard, namely WI-FI-7, which will offer enhanced throughput and higher data rate than its predecessors. In this article, a compact triple-band printed inverted-F (IF) antenna operating at 2.4 GHz, 5 GHz, and 6 GHz frequency bands is designed for WI-FI-7 applications. We design a novel antenna structure that is well-suited for triple-band operation. The core idea is to use a stripline as a feeder that also couples two modified IF designs. A nature-inspired optimization method, namely the artificial hummingbird algorithm (AHA), is used to achieve an optimal design solution for the triple-band IF antenna. Computed results demonstrate that the proposed antenna achieves satisfactory results regarding the reflection coefficient and the realized gain in all the frequency bands of interest.
Cooperative, Connected and Automated Mobility will enable the close coordination of actions between vehicles, road users and traffic infrastructures, resulting in profound socioeconomic impacts. In this context, locat...
详细信息
ISBN:
(数字)9781665406734
ISBN:
(纸本)9781665406741
Cooperative, Connected and Automated Mobility will enable the close coordination of actions between vehicles, road users and traffic infrastructures, resulting in profound socioeconomic impacts. In this context, location and yaw angle of vehicles is considered vital for safe, secured and efficient driving. Motivated by this fact, we formulated a multimodal sensor fusion problem which provides more accurate localization and yaw information than the original sources. Simultaneously estimating location and yaw parameters of vehicles can be treated as the task of cooperative odometry or awareness. To do so, V2V communication as well as multimodal self and inter-vehicular measurements from various sensors are considered for the problem formulation. The solution strategy is based on the maximum likelihood criterion as well as a novel alternating gradient descent approach. To simulate realistic traffic conditions, CARLA autonomous driving simulator has been used. The detailed evaluation study has shown that each vehicle, relying only on its neighborhood, is able to accurately re-estimate both its own and neighboring states (comprised of locations and yaws), effectively realising the vision of 360 ◦ awareness.
Bone Age Assessment (BAA) is crucial for the biological maturity evaluation of children. Developing automated techniques of BAA has gained a lot of attention from both academia and medicine. This paper presents a nove...
Bone Age Assessment (BAA) is crucial for the biological maturity evaluation of children. Developing automated techniques of BAA has gained a lot of attention from both academia and medicine. This paper presents a novel deep-learning-based BAA method including refining and multi-scale processing of hand X-ray images. The refining step removes unnecessary background and noises in the images, resulting in a high-quality dataset. Such image refinement is beneficial for Region of Interest (ROI) localization step with self-attention mechanism. The localization model is trained with multiscale hand X-ray images separately to obtain multiple ROIs for each image. Eventually, the multiscale ROIs are used as complementary features of an image in training a regression model for BAA. We evaluate the performance of the proposed method using 2017 RSNA pediatric bone age challenge dataset. The results show mean absolute error of 3.52, which is 24.9% lower than state-of-the-art results.
The use of sensors in smart vehicles brings benefits and vulnerabilities. Different kinds of sensors in smart vehicles are vulnerable to cyber-attack. Until now, the investigation of challenges and solutions for in-ve...
The use of sensors in smart vehicles brings benefits and vulnerabilities. Different kinds of sensors in smart vehicles are vulnerable to cyber-attack. Until now, the investigation of challenges and solutions for in-vehicle cybersecurity hasn't discussed various sensor objects and their correlation. In this study, we studied the cyber security problems of sensors in smart vehicles and how to overcome them. The research was designed as Systematic Literature Review (SLR) using the Kitchenham methodology with modification in the filtering phase using the artificial intelligence application, Elicit, to identify the problems, conclusions, and methodology description. Seventeen publications from 2016 until 2023 were gained from five databases. As a result, we find that the most discussed object related to cybersecurity sensors on smart vehicles are Electronic Control Units. Spoofing and jamming is still the most addressed threat, and machine learning is the most utilized solution to be implemented in detection systems. Advanced detection systems are incorporating updated attack models. We also suggest using updated attack models and machine learning algorithms to ensure the safety and security of smart vehicle technology. All identified sensor technology correlated using mind maps under the Intelligent Transport System theory.
This study explored the application of CNN-Transfer Learning for nondestructive chicken egg fertility detection for precise poultry hatchery practices. Four models, VGG16, ResNet50, InceptionNet, and MobileNet, were t...
详细信息
The escalating integration of Artificial Intelligence (AI) in various domains, especially Project Management (PM), has brought to light the imperative need for inclusivity in AI systems. This paper investigates the ro...
The escalating integration of Artificial Intelligence (AI) in various domains, especially Project Management (PM), has brought to light the imperative need for inclusivity in AI systems. This paper investigates the role of AI software in augmenting both the inclusiveness and efficiency within the realm of PM. The research pivots around specific criteria that define and measure the inclusiveness of AI in PM, highlighting how AI, when developed with inclusiveness in mind, can significantly enhance project outcomes. However, there are inherent challenges in achieving this inclusiveness, primarily due to biases embedded in AI learning databases and the design and development processes of AI systems. The study offers a comprehensive examination of AI's potential to revolutionize PM by enabling managers to concentrate more on people-centric aspects of their work. This is achieved through AI’s ability to perform tasks such as data collection, reporting, and predictive analysis more consistently and efficiently than human counterparts. However, the incorporation of AI in PM extends beyond mere efficiency; it represents a paradigm shift in the epistemology of PM, calling for a deeper understanding of AI's role and impact on society. Despite these advantages, the adoption of AI comes with significant challenges, particularly in terms of bias and inclusiveness. Biased AI learning databases, which use shared and reusable datasets, often perpetuate initially discriminatory algorithms. Moreover, unconscious biases and stereotypes of AI designers, developers, and trainers can inadvertently influence the behavior of the AI systems they create. This necessitates a paradigmatic shift in how AI systems are developed and governed to ensure they do not replicate or exacerbate existing social inequalities. The research proposes a methodological approach involving the development of criteria for inclusion and exclusion, alongside data extraction, to evaluate the inclusiveness and efficien
暂无评论