|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Jianlei Qiao, Yonglu Lv, Yucai Feng, Chang Liu, Yi Zhang, Jinying Li, Shuang Liu and Xiaohui Weng
At present, the electronic nose has became a new technology for the rapid detection of pesticides. However, the technique may misidentify them for samples that have not been involved in training. Therefore, a hybrid model based on unsupervised and superv...
ver más
|
|
|
|
|
|
|
Navid Khalili Dizaji and Mustafa Dogan
Brain tumors are one of the deadliest types of cancer. Rapid and accurate identification of brain tumors, followed by appropriate surgical intervention or chemotherapy, increases the probability of survival. Accurate determination of brain tumors in MRI ...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jongwon Kim
Industrial control systems (ICSs) play a crucial role in managing and monitoring critical processes across various industries, such as manufacturing, energy, and water treatment. The connection of equipment from various manufacturers, complex communicati...
ver más
|
|
|
|
|
|
|
Jiarui Xia and Yongshou Dai
Ground roll noise suppression is a crucial step in processing deep pre-stack seismic data. Recently, supervised deep learning methods have gained popularity in this field due to their ability to adaptively learn and extract powerful features. However, th...
ver más
|
|
|
|
|
|
|
Shancheng Tang, Ying Zhang, Zicheng Jin, Jianhui Lu, Heng Li and Jiqing Yang
The number of defect samples on the surface of aluminum profiles is small, and the distribution of abnormal visual features is dispersed, such that the existing supervised detection methods cannot effectively detect undefined defects. At the same time, t...
ver más
|
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these a...
ver más
|
|
|
|
|
|
|
Samuel-Soma M. Ajibade, Festus Victor Bekun, Festus Fatai Adedoyin, Bright Akwasi Gyamfi and Anthonia Oluwatosin Adediran
This study examines the research climate on machine learning applications in renewable energy (MLARE). Therefore, the publication trends (PT) and bibliometric analysis (BA) on MLARE research published and indexed in the Elsevier Scopus database between 2...
ver más
|
|
|
|
|
|
|
Hilmil Pradana
Predicting traffic risk incidents in first-person helps to ensure a safety reaction can occur before the incident happens for a wide range of driving scenarios and conditions. One challenge to building advanced driver assistance systems is to create an e...
ver más
|
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as ...
ver más
|
|
|
|