|
|
|
Jianjing Deng, Xiangfeng Yang, Liwen Liu, Lei Shi, Yongsheng Li and Yunchuan Yang
Underwater acoustic homing weapons (UAHWs) are formidable underwater weapons with the capability to detect, identify, and rapidly engage targets. Swift and precise target identification is crucial for the successful engagement of targets via UAHWs. This ...
ver más
|
|
|
|
|
|
Giovanni Ceccarelli, Guido Cantelmo, Marialisa Nigro and Constantinos Antoniou
In bike-sharing systems, the inventory level is defined as the daily number of bicycles required to optimally meet the demand. Estimating these values is a major challenge for bike-sharing operators, as biased inventory levels lead to a reduced quality o...
ver más
|
|
|
|
|
|
Mantas Bacevicius and Agne Paulauskaite-Taraseviciene
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications. Despite the existence of numerous studies involving unbalanced network intrusion datasets, such as ...
ver más
|
|
|
|
|
|
Xibin Wang, Qiong Zhou, Hui Li and Mei Chen
Imbalanced learning problems often occur in application scenarios and are additionally an important research direction in the field of machine learning. Traditional classifiers are substantially less effective for datasets with an imbalanced distribution...
ver más
|
|
|
|
|
|
Samuel Ndichu, Tao Ban, Takeshi Takahashi and Daisuke Inoue
Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of false alerts issued by security appliances can prove to be a considerable hurdle. Machine learning algorithms can automate a task known as security alert data a...
ver más
|
|
|