期刊文献+
共找到531篇文章
< 1 2 27 >
每页显示 20 50 100
The 2024 Compendium of Physical Activities and its expansion
1
作者 Stephen D.Herrmann Erik A.Willis Barbara E.Ainsworth 《Journal of Sport and Health Science》 SCIE CSCD 2024年第1期1-2,F0003,共3页
First developed 30 years ago,the Compendium of Physical Activities(Compendium)was created to provide a standardized way of measuring and classifying specific physical activities(PAs),allowing researchers and health pr... First developed 30 years ago,the Compendium of Physical Activities(Compendium)was created to provide a standardized way of measuring and classifying specific physical activities(PAs),allowing researchers and health professionals to assess the energy expenditure and health benefits associated with different PA.1Since its inception,the Compendium has been widely utilized and recognized as a fundamental PA and health resource. 展开更多
关键词 HAS utilized classify
下载PDF
Exploring the Core-shell Structure of BaTiO3-based Dielectric Ceramics Using Machine Learning Models and Interpretability Analysis
2
作者 孙家乐 XIONG Peifeng +1 位作者 郝华 LIU Hanxing 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2024年第3期561-569,共9页
A machine learning(ML)-based random forest(RF)classification model algorithm was employed to investigate the main factors affecting the formation of the core-shell structure of BaTiO_(3)-based ceramics and their inter... A machine learning(ML)-based random forest(RF)classification model algorithm was employed to investigate the main factors affecting the formation of the core-shell structure of BaTiO_(3)-based ceramics and their interpretability was analyzed by using Shapley additive explanations(SHAP).An F1-score changed from 0.8795 to 0.9310,accuracy from 0.8450 to 0.9070,precision from 0.8714 to 0.9000,recall from 0.8929 to 0.9643,and ROC/AUC value of 0.97±0.03 was achieved by the RF classification with the optimal set of features containing only 5 features,demonstrating the high accuracy of our model and its high robustness.During the interpretability analysis of the model,it was found that the electronegativity,melting point,and sintering temperature of the dopant contribute highly to the formation of the core-shell structure,and based on these characteristics,specific ranges were delineated and twelve elements were finally obtained that met all the requirements,namely Si,Sc,Mn,Fe,Co,Ni,Pd,Er,Tm,Lu,Pa,and Cm.In the process of exploring the structure of the core-shell,the doping elements can be effectively localized to be selected by choosing the range of features. 展开更多
关键词 machine learning BaTiO_(3) core-shell structure random forest classifier
下载PDF
Robust Machine Learning Technique to Classify COVID-19 Using Fusion of Texture and Vesselness of X-Ray Images
3
作者 Shaik Mahaboob Basha Victor Hugo Cde Albuquerque +3 位作者 Samia Allaoua Chelloug Mohamed Abd Elaziz Shaik Hashmitha Mohisin Suhail Parvaze Pathan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1981-2004,共24页
Manual investigation of chest radiography(CXR)images by physicians is crucial for effective decision-making in COVID-19 diagnosis.However,the high demand during the pandemic necessitates auxiliary help through image a... Manual investigation of chest radiography(CXR)images by physicians is crucial for effective decision-making in COVID-19 diagnosis.However,the high demand during the pandemic necessitates auxiliary help through image analysis and machine learning techniques.This study presents a multi-threshold-based segmentation technique to probe high pixel intensity regions in CXR images of various pathologies,including normal cases.Texture information is extracted using gray co-occurrence matrix(GLCM)-based features,while vessel-like features are obtained using Frangi,Sato,and Meijering filters.Machine learning models employing Decision Tree(DT)and RandomForest(RF)approaches are designed to categorize CXR images into common lung infections,lung opacity(LO),COVID-19,and viral pneumonia(VP).The results demonstrate that the fusion of texture and vesselbased features provides an effective ML model for aiding diagnosis.The ML model validation using performance measures,including an accuracy of approximately 91.8%with an RF-based classifier,supports the usefulness of the feature set and classifier model in categorizing the four different pathologies.Furthermore,the study investigates the importance of the devised features in identifying the underlying pathology and incorporates histogrambased analysis.This analysis reveals varying natural pixel distributions in CXR images belonging to the normal,COVID-19,LO,and VP groups,motivating the incorporation of additional features such as mean,standard deviation,skewness,and percentile based on the filtered images.Notably,the study achieves a considerable improvement in categorizing COVID-19 from LO,with a true positive rate of 97%,further substantiating the effectiveness of the methodology implemented. 展开更多
关键词 Chest radiography(CXR)image COVID-19 CLASSIFIER machine learning random forest texture analysis
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis
4
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework
5
作者 Simona-Vasilica Oprea Adela Bara 《Computers, Materials & Continua》 SCIE EI 2024年第6期3827-3853,共27页
The potential of text analytics is revealed by Machine Learning(ML)and Natural Language Processing(NLP)techniques.In this paper,we propose an NLP framework that is applied to multiple datasets to detect malicious Unif... The potential of text analytics is revealed by Machine Learning(ML)and Natural Language Processing(NLP)techniques.In this paper,we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators(URLs).Three categories of features,both ML and Deep Learning(DL)algorithms and a ranking schema are included in the proposed framework.We apply frequency and prediction-based embeddings,such as hash vectorizer,Term Frequency-Inverse Dense Frequency(TF-IDF)and predictors,word to vector-word2vec(continuous bag of words,skip-gram)from Google,to extract features from text.Further,we apply more state-of-the-art methods to create vectorized features,such as GloVe.Additionally,feature engineering that is specific to URL structure is deployed to detect scams and other threats.For framework assessment,four ranking indicators are weighted:computational time and performance as accuracy,F1 score and type error II.For the computational time,we propose a new metric-Feature Building Time(FBT)as the cutting-edge feature builders(like doc2vec or GloVe)require more time.By applying the proposed assessment step,the skip-gram algorithm of word2vec surpasses other feature builders in performance.Additionally,eXtreme Gradient Boost(XGB)outperforms other classifiers.With this setup,we attain an accuracy of 99.5%and an F1 score of 0.99. 展开更多
关键词 Detecting malicious URL CLASSIFIERS text to feature deep learning ranking algorithms feature building time
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
6
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
7
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 Security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
下载PDF
Forecasting the Academic Performance by Leveraging Educational Data Mining
8
作者 Mozamel M.Saeed 《Intelligent Automation & Soft Computing》 2024年第2期213-231,共19页
The study aims to recognize how efficiently Educational DataMining(EDM)integrates into Artificial Intelligence(AI)to develop skills for predicting students’performance.The study used a survey questionnaire and collec... The study aims to recognize how efficiently Educational DataMining(EDM)integrates into Artificial Intelligence(AI)to develop skills for predicting students’performance.The study used a survey questionnaire and collected data from 300 undergraduate students of Al Neelain University.The first step’s initial population placements were created using Particle Swarm Optimization(PSO).Then,using adaptive feature space search,Educational Grey Wolf Optimization(EGWO)was employed to choose the optimal attribute combination.The second stage uses the SVMclassifier to forecast classification accuracy.Different classifiers were utilized to evaluate the performance of students.According to the results,it was revealed that AI could forecast the final grades of students with an accuracy rate of 97%on the test dataset.Furthermore,the present study showed that successful students could be selected by the Decision Tree model with an efficiency rate of 87.50%and could be categorized as having equal information ratio gain after the semester.While the random forest provided an accuracy of 28%.These findings indicate the higher accuracy rate in the results when these models were implemented on the data set which provides significantly accurate results as compared to a linear regression model with accuracy(12%).The study concluded that the methodology used in this study can prove to be helpful for students and teachers in upgrading academic performance,reducing chances of failure,and taking appropriate steps at the right time to raise the standards of education.The study also motivates academics to assess and discover EDM at several other universities. 展开更多
关键词 Academic achievement AI algorithms CLASSIFIERS data mining deep learning
下载PDF
Using Cross Entropy as a Performance Metric for Quantifying Uncertainty in DNN Image Classifiers: An Application to Classification of Lung Cancer on CT Images
9
作者 Eri Matsuyama Masayuki Nishiki +1 位作者 Noriyuki Takahashi Haruyuki Watanabe 《Journal of Biomedical Science and Engineering》 2024年第1期1-12,共12页
Cross entropy is a measure in machine learning and deep learning that assesses the difference between predicted and actual probability distributions. In this study, we propose cross entropy as a performance evaluation... Cross entropy is a measure in machine learning and deep learning that assesses the difference between predicted and actual probability distributions. In this study, we propose cross entropy as a performance evaluation metric for image classifier models and apply it to the CT image classification of lung cancer. A convolutional neural network is employed as the deep neural network (DNN) image classifier, with the residual network (ResNet) 50 chosen as the DNN archi-tecture. The image data used comprise a lung CT image set. Two classification models are built from datasets with varying amounts of data, and lung cancer is categorized into four classes using 10-fold cross-validation. Furthermore, we employ t-distributed stochastic neighbor embedding to visually explain the data distribution after classification. Experimental results demonstrate that cross en-tropy is a highly useful metric for evaluating the reliability of image classifier models. It is noted that for a more comprehensive evaluation of model perfor-mance, combining with other evaluation metrics is considered essential. . 展开更多
关键词 Cross Entropy Performance Metrics DNN Image Classifiers Lung Cancer Prediction Uncertainty
下载PDF
Mammogram Classification with HanmanNets Using Hanman Transform Classifier
10
作者 Jyoti Dabass Madasu Hanmandlu +1 位作者 Rekha Vig Shantaram Vasikarla 《Journal of Modern Physics》 2024年第7期1045-1067,共23页
Breast cancer is a deadly disease and radiologists recommend mammography to detect it at the early stages. This paper presents two types of HanmanNets using the information set concept for the derivation of deep infor... Breast cancer is a deadly disease and radiologists recommend mammography to detect it at the early stages. This paper presents two types of HanmanNets using the information set concept for the derivation of deep information set features from ResNet by modifying its kernel functions to yield Type-1 HanmanNets and then AlexNet, GoogLeNet and VGG-16 by changing their feature maps to yield Type-2 HanmanNets. The two types of HanmanNets exploit the final feature maps of these architectures in the generation of deep information set features from mammograms for their classification using the Hanman Transform Classifier. In this work, the characteristics of the abnormality present in the mammograms are captured using the above network architectures that help derive the features of HanmanNets based on information set concept and their performance is compared via the classification accuracies. The highest accuracy of 100% is achieved for the multi-class classifications on the mini-MIAS database thus surpassing the results in the literature. Validation of the results is done by the expert radiologists to show their clinical relevance. 展开更多
关键词 MAMMOGRAMS ResNet 18 Hanman Transform Classifier ABNORMALITY DIAGNOSIS VGG-16 AlexNet GoogleNet HanmanNets
下载PDF
Teaching Reform of “Probability Theory and Mathematical Statistics” Under the Background of New Engineering
11
作者 Jianxin Wang 《Journal of Contemporary Educational Research》 2024年第3期32-37,共6页
Probability theory and mathematical statistics are fundamental courses for various majors in science and engineering.In response to the current teaching situation,we should integrate theory with practice,implement tea... Probability theory and mathematical statistics are fundamental courses for various majors in science and engineering.In response to the current teaching situation,we should integrate theory with practice,implement teaching reform,and carry out teaching innovation.The article carries out blended teaching with deep integration of online and offline modes and within and outside of class,constructing innovative measures of“four integrations and four reshaping.”The article conducts diversified evaluations to stimulate learning motivation and help achieve talent cultivation goals.Through the close integration of probability theory and mathematical statistics course teaching with professional education and practical application,the“three-in-one”teaching goal of value shaping,ability cultivation,and knowledge exploration is achieved.The fundamental task of“cultivating morality and talents”is implemented. 展开更多
关键词 “Four integrations and four reshaping” BOPPPS blended teaching Classified and layered teaching Interdisciplinary integration Full nested evaluation system
下载PDF
Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance 被引量:2
12
作者 Sandeep Kumar MohdAnul Haq +4 位作者 Arpit Jain C.Andy Jason Nageswara Rao Moparthi Nitin Mittal Zamil S.Alzamil 《Computers, Materials & Continua》 SCIE EI 2023年第1期1523-1540,共18页
Day by day,biometric-based systems play a vital role in our daily lives.This paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect huma... Day by day,biometric-based systems play a vital role in our daily lives.This paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emotions based on voice recognition and control a few electronic peripherals for alert actions.This proposed smart assistant aims to provide a support to the people through buzzer and light emitting diodes(LED)alert signals and it also keep track of the places like households,hospitals and remote areas,etc.The proposed approach is able to detect seven emotions:worry,surprise,neutral,sadness,happiness,hate and love.The key elements for the implementation of speech emotion recognition are voice processing,and once the emotion is recognized,the machine interface automatically detects the actions by buzzer and LED.The proposed system is trained and tested on various benchmark datasets,i.e.,Ryerson Audio-Visual Database of Emotional Speech and Song(RAVDESS)database,Acoustic-Phonetic Continuous Speech Corpus(TIMIT)database,Emotional Speech database(Emo-DB)database and evaluated based on various parameters,i.e.,accuracy,error rate,and time.While comparing with existing technologies,the proposed algorithm gave a better error rate and less time.Error rate and time is decreased by 19.79%,5.13 s.for the RAVDEES dataset,15.77%,0.01 s for the Emo-DB dataset and 14.88%,3.62 for the TIMIT database.The proposed model shows better accuracy of 81.02%for the RAVDEES dataset,84.23%for the TIMIT dataset and 85.12%for the Emo-DB dataset compared to Gaussian Mixture Modeling(GMM)and Support Vector Machine(SVM)Model. 展开更多
关键词 Speech emotion recognition classifier implementation feature extraction and selection smart assistance
下载PDF
A novel molecular classification method for osteosarcoma based on tumor cell differentiation trajectories 被引量:1
13
作者 Hao Zhang Ting Wang +16 位作者 Haiyi Gong Runyi Jiang Wang Zhou Haitao Sun Runzhi Huang Yao Wang Zhipeng Wu Wei Xu Zhenxi Li Quan Huang Xiaopan Cai Zaijun Lin Jinbo Hu Qi Jia Chen Ye Haifeng Wei Jianru Xiao 《Bone Research》 SCIE CAS CSCD 2023年第1期148-162,共15页
Subclassification of tumors based on molecular features may facilitate therapeutic choice and increase the response rate of cancer patients.However,the highly complex cell origin involved in osteosarcoma(OS)limits the... Subclassification of tumors based on molecular features may facilitate therapeutic choice and increase the response rate of cancer patients.However,the highly complex cell origin involved in osteosarcoma(OS)limits the utility of traditional bulk RNA sequencing for OS subclassification.Single-cell RNA sequencing(sc RNA-seq)holds great promise for identifying cell heterogeneity.However,this technique has rarely been used in the study of tumor subclassification.By analyzing sc RNA-seq data for six conventional OS and nine cancellous bone(CB)samples,we identified 29 clusters in OS and CB samples and discovered three differentiation trajectories from the cancer stem cell(CSC)-like subset,which allowed us to classify OS samples into three groups.The classification model was further examined using the TARGET dataset.Each subgroup of OS had different prognoses and possible drug sensitivities,and OS cells in the three differentiation branches showed distinct interactions with other clusters in the OS microenvironment.In addition,we verified the classification model through IHC staining in 138 OS samples,revealing a worse prognosis for Group B patients.Furthermore,we describe the novel transcriptional program of CSCs and highlight the activation of EZH2 in CSCs of OS.These findings provide a novel subclassification method based on sc RNA-seq and shed new light on the molecular features of CSCs in OS and may serve as valuable references for precision treatment for and therapeutic development in OS. 展开更多
关键词 OSTEOSARCOMA holds classify
下载PDF
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection 被引量:1
14
作者 Deris Stiawan Ali Bardadi +7 位作者 Nurul Afifah Lisa Melinda Ahmad Heryanto Tri Wanda Septian Mohd Yazid Idris Imam Much Ibnu Subroto Lukman Rahmat Budiarto 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1759-1774,共16页
The Repository Mahasiswa(RAMA)is a national repository of research reports in the form of final assignments,student projects,theses,dissertations,and research reports of lecturers or researchers that have not yet been... The Repository Mahasiswa(RAMA)is a national repository of research reports in the form of final assignments,student projects,theses,dissertations,and research reports of lecturers or researchers that have not yet been published in journals,conferences,or integrated books from the scientific repository of universities and research institutes in Indonesia.The increasing popularity of the RAMA Repository leads to security issues,including the two most widespread,vulnerable attacks i.e.,Structured Query Language(SQL)injection and cross-site scripting(XSS)attacks.An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous.This paper aims to provide an attack detection system for securing the repository portal from the abovementioned attacks.The proposed system combines a Long Short–Term Memory and Principal Component Analysis(LSTM-PCA)model as a classifier.This model can effectively solve the vanishing gradient problem caused by excessive positive samples.The experiment results show that the proposed system achieves an accuracy of 96.85%using an 80%:20%ratio of training data and testing data.The rationale for this best achievement is that the LSTM’s Forget Gate works very well as the PCA supplies only selected features that are significantly relevant to the attacks’patterns.The Forget Gate in LSTM is responsible for deciding which information should be kept for computing the cell state and which one is not relevant and can be discarded.In addition,the LSTM’s Input Gate assists in finding out crucial information and stores specific relevant data in the memory. 展开更多
关键词 LSTM PCA ensemble classifier SQL injection XSS
下载PDF
Observation points classifier ensemble for high-dimensional imbalanced classification 被引量:1
15
作者 Yulin He Xu Li +3 位作者 Philippe Fournier‐Viger Joshua Zhexue Huang Mianjie Li Salman Salloum 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期500-517,共18页
In this paper,an Observation Points Classifier Ensemble(OPCE)algorithm is proposed to deal with High-Dimensional Imbalanced Classification(HDIC)problems based on data processed using the Multi-Dimensional Scaling(MDS)... In this paper,an Observation Points Classifier Ensemble(OPCE)algorithm is proposed to deal with High-Dimensional Imbalanced Classification(HDIC)problems based on data processed using the Multi-Dimensional Scaling(MDS)feature extraction technique.First,dimensionality of the original imbalanced data is reduced using MDS so that distances between any two different samples are preserved as well as possible.Second,a novel OPCE algorithm is applied to classify imbalanced samples by placing optimised observation points in a low-dimensional data space.Third,optimization of the observation point mappings is carried out to obtain a reliable assessment of the unknown samples.Exhaustive experiments have been conducted to evaluate the feasibility,rationality,and effectiveness of the proposed OPCE algorithm using seven benchmark HDIC data sets.Experimental results show that(1)the OPCE algorithm can be trained faster on low-dimensional imbalanced data than on high-dimensional data;(2)the OPCE algorithm can correctly identify samples as the number of optimised observation points is increased;and(3)statistical analysis reveals that OPCE yields better HDIC performances on the selected data sets in comparison with eight other HDIC algorithms.This demonstrates that OPCE is a viable algorithm to deal with HDIC problems. 展开更多
关键词 classifier ensemble feature transformation high-dimensional data classification imbalanced learning observation point mechanism
下载PDF
BS-SC Model:A Novel Method for Predicting Child Abuse Using Borderline-SMOTE Enabled Stacking Classifier 被引量:1
16
作者 Saravanan Parthasarathy Arun Raj Lakshminarayanan 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1311-1336,共26页
For a long time,legal entities have developed and used crime prediction methodologies.The techniques are frequently updated based on crime evaluations and responses from scientific communities.There is a need to devel... For a long time,legal entities have developed and used crime prediction methodologies.The techniques are frequently updated based on crime evaluations and responses from scientific communities.There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level.Child maltreatment is not adequately addressed because children are voiceless.As a result,the possibility of developing a model for predicting child abuse was investigated in this study.Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events.The data set was balanced using the Borderline-SMOTE technique,and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse.The proposed approach successfully predicted crime types with 93%of accuracy,precision,recall,and F1-Score.The AUC value of the same was 0.989.However,when compared to the Extra Trees model(17.55),which is the second best,the proposed model’s execution time was significantly longer(476.63).We discovered that Machine Learning methods effectively evaluate the demographic and spatial-temporal characteristics of the crimes and predict the occurrences of various subtypes of child abuse.The results indicated that the proposed Borderline-SMOTE enabled Stacking Classifier model(BS-SC Model)would be effective in the real-time child abuse prediction and prevention process. 展开更多
关键词 Child abuse sexual offending DECISION-MAKING machine learning stacking classifier
下载PDF
Ensemble Classifier Design Based on Perturbation Binary Salp Swarm Algorithm for Classification
17
作者 Xuhui Zhu Pingfan Xia +2 位作者 Qizhi He Zhiwei Ni Liping Ni 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期653-671,共19页
Multiple classifier system exhibits strong classification capacity compared with single classifiers,but they require significant computational resources.Selective ensemble system aims to attain equivalent or better cl... Multiple classifier system exhibits strong classification capacity compared with single classifiers,but they require significant computational resources.Selective ensemble system aims to attain equivalent or better classification accuracy with fewer classifiers.However,current methods fail to identify precise solutions for constructing an ensemble classifier.In this study,we propose an ensemble classifier design technique based on the perturbation binary salp swarm algorithm(ECDPB).Considering that extreme learning machines(ELMs)have rapid learning rates and good generalization ability,they can serve as the basic classifier for creating multiple candidates while using fewer computational resources.Meanwhile,we introduce a combined diversity measure by taking the complementarity and accuracy of ELMs into account;it is used to identify the ELMs that have good diversity and low error.In addition,we propose an ECDPB with powerful optimizing ability;it is employed to find the optimal subset of ELMs.The selected ELMs can then be used to forman ensemble classifier.Experiments on 10 benchmark datasets have been conducted,and the results demonstrate that the proposed ECDPB delivers superior classification capacity when compared with alternative methods. 展开更多
关键词 Ensemble classifier salp swarmalgorithm diversity measure multiple classifiers system extreme learning machine
下载PDF
Age and Gender Classification Using Backpropagation and Bagging Algorithms
18
作者 Ammar Almomani Mohammed Alweshah +6 位作者 Waleed Alomoush Mohammad Alauthman Aseel Jabai Anwar Abbass Ghufran Hamad Meral Abdalla Brij B.Gupta 《Computers, Materials & Continua》 SCIE EI 2023年第2期3045-3062,共18页
Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and ... Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and classify gender,age,and accent.So,a newsystem calledClassifyingVoice Gender,Age,and Accent(CVGAA)is proposed.Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories.It has high precision compared to other algorithms used in this problem,as the adaptive backpropagation algorithm had an accuracy of 98%and the Bagging algorithm had an accuracy of 98.10%in the gender identification data.Bagging has the best accuracy among all algorithms,with 55.39%accuracy in the voice common dataset and age classification and accent accuracy in a speech accent of 78.94%. 展开更多
关键词 Classify voice gender ACCENT age bagging algorithms back propagation algorithms AI classifiers
下载PDF
EsECC_SDN:Attack Detection and Classification Model for MANET
19
作者 Veera Ankalu Vuyyuru Youseef Alotaibi +2 位作者 Neenavath Veeraiah Saleh Alghamdi Korimilli Sirisha 《Computers, Materials & Continua》 SCIE EI 2023年第3期6665-6688,共24页
Mobile Ad Hoc Networks(MANET)is the framework for social networking with a realistic framework.In theMANETenvironment,based on the query,information is transmitted between the sender and receiver.In the MANET network,... Mobile Ad Hoc Networks(MANET)is the framework for social networking with a realistic framework.In theMANETenvironment,based on the query,information is transmitted between the sender and receiver.In the MANET network,the nodes within the communication range are involved in data transmission.Even the nodes that lie outside of the communication range are involved in the transmission of relay messages.However,due to the openness and frequent mobility of nodes,they are subjected to the vast range of security threats inMANET.Hence,it is necessary to develop an appropriate security mechanism for the dataMANET environment for data transmission.This paper proposed a security framework for the MANET network signature escrow scheme.The proposed framework uses the centralised Software Defined Network(SDN)with an ECC cryptographic technique.The developed security framework is stated as Escrow Elliptical Curve Cryptography SDN(EsECC_SDN)for attack detection and classification.The developed EsECC-SDN was adopted in two stages for attack classification and detection:(1)to perform secure data transmission between nodes SDN performs encryption and decryption of the data;and(2)to detect and classifies the attack in theMANET hyper alert based HiddenMarkovModel Transductive Deep Learning.Furthermore,the EsECC_SDN is involved in the assignment of labels in the transmitted data in the database(DB).The escrow handles these processes,and attacks are evaluated using the hyper alert.The labels are assigned based on the k-medoids attack clustering through label assignment through a transductive deep learning model.The proposed model uses the CICIDS dataset for attack detection and classification.The developed framework EsECC_SDN’s performance is compared to that of other classifiers such as AdaBoost,Regression,and Decision Tree.The performance of the proposed EsECC_SDN exhibits∼3%improved performance compared with conventional techniques. 展开更多
关键词 MANET security CLASSIFIER CRYPTOGRAPHY ATTACK escrow ECC
下载PDF
Real and Altered Fingerprint Classification Based on Various Features and Classifiers
20
作者 Saif Saad Hameed Ismail Taha Ahmed Omar Munthir Al Okashi 《Computers, Materials & Continua》 SCIE EI 2023年第1期327-340,共14页
Biometric recognition refers to the identification of individuals through their unique behavioral features(e.g.,fingerprint,face,and iris).We need distinguishing characteristics to identify people,such as fingerprints... Biometric recognition refers to the identification of individuals through their unique behavioral features(e.g.,fingerprint,face,and iris).We need distinguishing characteristics to identify people,such as fingerprints,which are world-renowned as the most reliablemethod to identify people.The recognition of fingerprints has become a standard procedure in forensics,and different techniques are available for this purpose.Most current techniques lack interest in image enhancement and rely on high-dimensional features to generate classification models.Therefore,we proposed an effective fingerprint classification method for classifying the fingerprint image as authentic or altered since criminals and hackers routinely change their fingerprints to generate fake ones.In order to improve fingerprint classification accuracy,our proposed method used the most effective texture features and classifiers.Discriminant Analysis(DCA)and Gaussian Discriminant Analysis(GDA)are employed as classifiers,along with Histogram of Oriented Gradient(HOG)and Segmentation-based Feature Texture Analysis(SFTA)feature vectors as inputs.The performance of the classifiers is determined by assessing a range of feature sets,and the most accurate results are obtained.The proposed method is tested using a Sokoto Coventry Fingerprint Dataset(SOCOFing).The SOCOFing project includes 6,000 fingerprint images collected from 600 African people whose fingerprints were taken ten times.Three distinct degrees of obliteration,central rotation,and z-cut have been performed to obtain synthetically altered replicas of the genuine fingerprints.The proposal achieved massive success with a classification accuracy reaching 99%.The experimental results indicate that the proposed method for fingerprint classification is feasible and effective.The experiments also showed that the proposed SFTA-based GDA method outperformed state-of-art approaches in feature dimension and classification accuracy. 展开更多
关键词 Fingerprint classification HOG SFTA discriminant analysis(DCA)classifier gaussian discriminant analysis(GDA)classifier SOCOFing
下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部