Coronary artery disease (CAD) is one of the most common causes of sudden cardiac arrest and is responsible for a high percentage of global mortality. Early diagnosis of CAD in patients with chest pain is challenging. ...
详细信息
Automatic ROI extraction from hand images is a critical step in palmprint recognition. Traditional methods involve steps such as identifying the region of the hand, finding the valleys between the fingers and marking ...
详细信息
Adversarial generative neural networks (GANs) have received increased research interest in recent years, and they have been applied in various fields, such as image generation, transformation, and restoration. Pix2Pix...
详细信息
The field of human activity recognition has evolved significantly, driven largely by advancements in Internet of Things (IoT) device technology, particularly in personal devices. This study investigates the use of ult...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The amalgamation of information technologies and progressive wireless communication systems has profoundly impacted various facets of everyday life, encompassing communication mediums, occupational procedures, and liv...
详细信息
Due to the recently increased requirements of e-learning systems,multiple educational institutes such as kindergarten have transformed their learning towards virtual *** student health exercise is a difficult task but...
详细信息
Due to the recently increased requirements of e-learning systems,multiple educational institutes such as kindergarten have transformed their learning towards virtual *** student health exercise is a difficult task but an important one due to the physical education needs especially in young *** proposed system focuses on the necessary implementation of student health exercise recognition(SHER)using a modified Quaternion-basedfilter for inertial data refining and data fusion as the pre-processing ***,cleansed data has been segmented using an overlapping windowing approach followed by patterns identification in the form of static and kinematic signal ***,these patterns have been utilized to extract cues for both patterned signals,which are further optimized using Fisher’s linear discriminant analysis(FLDA)***,the physical exercise activities have been categorized using extended Kalmanfilter(EKF)-based neural *** system can be implemented in multiple educational establishments including intelligent training systems,virtual mentors,smart simulations,and interactive learning management methods.
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much ***,detecting anomalies is very difficult due to data imbalance,temporal dependence,and ***,m...
详细信息
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much ***,detecting anomalies is very difficult due to data imbalance,temporal dependence,and ***,methodologies for data augmentation and conversion of time series data into images for analysis have been *** paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance,temporal dependence,and robustness to *** method of data augmentation is set as the addition of *** involves adding Gaussian noise,with the noise level set to 0.002,to maximize the generalization performance of the *** addition,we use the Markov Transition Field(MTF)method to effectively visualize the dynamic transitions of the data while converting the time series data into *** enables the identification of patterns in time series data and assists in capturing the sequential dependencies of the *** anomaly detection,the PatchCore model is applied to show excellent performance,and the detected anomaly areas are represented as heat *** allows for the detection of anomalies,and by applying an anomaly map to the original image,it is possible to capture the areas where anomalies *** performance evaluation shows that both F1-score and Accuracy are high when time series data is converted to ***,when processed as images rather than as time series data,there was a significant reduction in both the size of the data and the training *** proposed method can provide an important springboard for research in the field of anomaly detection using time series ***,it helps solve problems such as analyzing complex patterns in data lightweight.
Recent researches highlight a rapid increase in mental health issues, signaling a concerning rise in stress-related conditions such as high blood pressure, psoriasis, polycystic ovary syndrome (PCOS), etc., and these ...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
暂无评论