|
|
|
Tatyana Aksenovich and Vasiliy Selivanov
During geomagnetic storms, which are a result of solar wind?s interaction with the Earth?s magnetosphere, geomagnetically induced currents (GICs) begin to flow in the long, high-voltage electrical networks on the Earth?s surface. It causes a number of ne...
ver más
|
|
|
|
|
|
|
Marco Leo, Pierluigi Carcagnì, Luca Signore, Francesco Corcione, Giulio Benincasa, Mikko O. Laukkanen and Cosimo Distante
Colorectal cancer is one of the most lethal cancers because of late diagnosis and challenges in the selection of therapy options. The histopathological diagnosis of colon adenocarcinoma is hindered by poor reproducibility and a lack of standard examinati...
ver más
|
|
|
|
|
|
|
Darian M. Onchis, Flavia Costi, Codruta Istin, Ciprian Cosmin Secasan and Gabriel V. Cozma
(1) Background: Lung cancers are the most common cancers worldwide, and prostate cancers are among the second in terms of the frequency of cancers diagnosed in men. Automatic ranking of the risk groups of such diseases is highly in demand, but the clinic...
ver más
|
|
|
|
|
|
|
Nirmal Acharya, Padmaja Kar, Mustafa Ally and Jeffrey Soar
Significant clinical overlap exists between mental health and substance use disorders, especially among women. The purpose of this research is to leverage an AutoML (Automated Machine Learning) interface to predict and distinguish co-occurring mental hea...
ver más
|
|
|
|
|
|
|
Lisa Pierotti, Cristiano Fidani, Gianluca Facca and Fabrizio Gherardi
Variations in the CO2 dissolved in water springs have long been observed near the epicenters of moderate and strong earthquakes. In a recent work focused on data collected during the 2017?2021 period from a monitoring site in the Northern Apennines, Ital...
ver más
|
|
|
|
|
|
|
George Tzougas and Konstantin Kutzkov
We developed a methodology for the neural network boosting of logistic regression aimed at learning an additional model structure from the data. In particular, we constructed two classes of neural network-based models: shallow?dense neural networks with ...
ver más
|
|
|
|
|
|
|
Mantas Bacevicius and Agne Paulauskaite-Taraseviciene
Various machine learning algorithms have been applied to network intrusion classification problems, including both binary and multi-class classifications. Despite the existence of numerous studies involving unbalanced network intrusion datasets, such as ...
ver más
|
|
|
|
|
|
|
Francesco Mercaldo, Luca Brunese, Fabio Martinelli, Antonella Santone and Mario Cesarelli
Currently, deep learning networks, with particular regard to convolutional neural network models, are typically exploited for biomedical image classification. One of the disadvantages of deep learning is that is extremely expensive to train due to comple...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
|
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu...
ver más
|
|
|
|