|
|
|
Lowri Williams, Eirini Anthi and Pete Burnap
The performance of emotive text classification using affective hierarchical schemes (e.g., WordNet-Affect) is often evaluated using the same traditional measures used to evaluate the performance of when a finite set of isolated classes are used. However,...
ver más
|
|
|
|
|
|
|
Alper Taner, Mahtem Teweldemedhin Mengstu, Kemal Çagatay Selvi, Hüseyin Duran, Ibrahim Gür and Nicoleta Ungureanu
Having the advantages of speed, suitability and high accuracy, computer vision has been effectively utilized as a non-destructive approach to automatically recognize and classify fruits and vegetables, to meet the increased demand for food quality-sensin...
ver más
|
|
|
|
|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|
|
|
|
|
Haoyu Lin, Pengkun Quan, Zhuo Liang, Dongbo Wei and Shichun Di
In the context of automatic charging for electric vehicles, collision localization for the end-effector of robots not only serves as a crucial visual complement but also provides essential foundations for subsequent response design. In this scenario, dat...
ver más
|
|
|
|
|
|
|
Aquib Raza, Thien-Luan Phan, Hung-Chung Li, Nguyen Van Hieu, Tran Trung Nghia and Congo Tak Shing Ching
Knee osteoarthritis (KOA) is a leading cause of disability, particularly affecting older adults due to the deterioration of articular cartilage within the knee joint. This condition is characterized by pain, stiffness, and impaired movement, posing a sig...
ver más
|
|
|
|
|
|
|
Bao She, Jiating Hu, Linsheng Huang, Mengqi Zhu and Qishuo Yin
To grasp the spatial distribution of soybean planting areas in time is the prerequisite for the work of growth monitoring, crop damage assessment and yield estimation. The research on remote sensing identification of soybean conducted in China mainly foc...
ver más
|
|
|
|
|
|
|
Ashokkumar Palanivinayagam and Robertas Dama?evicius
The existence of missing values reduces the amount of knowledge learned by the machine learning models in the training stage thus affecting the classification accuracy negatively. To address this challenge, we introduce the use of Support Vector Machine ...
ver más
|
|
|
|
|
|
|
Sikha S. Bagui, Dustin Mink, Subhash C. Bagui and Sakthivel Subramaniam
Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training Machi...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Lukas Wiku Kuswidiyanto, Dong Eok Kim, Teng Fu, Kyoung Su Kim and Xiongzhe Han
The cultivation of kimchi cabbage in South Korea has always faced significant challenges due to the looming presence of Alternaria leaf spot (ALS), which is a fungal disease mainly caused by Alternaria alternata. The emergence of black spots resulting fr...
ver más
|
|
|
|