Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Feature selection using Tasmanian devil optimisation algorithm for software fault prediction
International Journal of Computational Science and Engineering (IJCSE), Volume 28, Issue 1Pages 32–55https://doi.org/10.1504/ijcse.2025.143468Software quality is improved through early software flaw identification, which is made possible by software fault prediction (SFP). Early software problem identification reduces the amount of money and work needed to fix those vulnerabilities. This paper ...
- research-articleDecember 2024
Improved classification of histopathological images with feature fusion of Thepade SBTC and Sauvola thresholding using machine learning
International Journal of Computational Vision and Robotics (IJCVR), Volume 15, Issue 1Pages 118–136https://doi.org/10.1504/ijcvr.2025.142925Histopathological images play a significant role in selecting effective therapeutics and identifying disorders like cancer. Digital histopathology is a crucial advancement in contemporary medicine. The growth and spread of cancer cells within the body ...
- research-articleApril 2024
Not All Bots are Created Equal: The Impact of Bots Classification Techniques on Identification of Discursive Behaviors Around the COVID-19 Vaccine and Climate Change
Social Science Computer Review (SSCR), Volume 42, Issue 2Pages 394–415https://doi.org/10.1177/08944393231188472As concerns about social bots online increase, studies have attempted to explore the discourse they produce, and its effects on individuals and the public at large. We argue that the common reliance on aggregated scores of binary classifiers for bot ...
- research-articleSeptember 2024
Towards hybrid approach based SVM and Radiomics features for COVID-19 classification and segmentation
International Journal of Hybrid Intelligent Systems (IJHIS), Volume 20, Issue 3Pages 223–242https://doi.org/10.3233/HIS-240027In the battle against the COVID-19 pneumonia outbreak, which is brought on by the coronavirus strain SARS-Cov-2, radiological chest exams, such as chest X-rays, are crucial. In order to understand the unique radiographic characteristics of COVID-19, this ...
- research-articleJune 2024
Development of optimised software fault prediction model using machine learning
Intelligent Decision Technologies (INTDTEC), Volume 18, Issue 2Pages 1355–1376https://doi.org/10.3233/IDT-230427Software fault prediction is a crucial task, especially with the rapid improvements in software technology and increasing complexity of software. As identifying and addressing bugs early in the development process can significantly minimize the costs and ...
-
- research-articleJanuary 2024
Academic performance forecasting model based on artificial intelligence at the Faculty of Engineering - Systems and Informatics of the Continental University
MICML '23: Proceedings of the 2023 International Conference on Mathematics, Intelligent Computing and Machine LearningPages 90–95https://doi.org/10.1145/3638264.3638283The research established a central objective to implement an academic performance forecasting model based on artificial intelligence to determine the level of incidence factors in the management of academic performance and design the predictive model ...
- ArticleDecember 2023
Application of Federated Learning to Prediction of Patient Mortality in Vasculitis Disease
AbstractIn this paper, we propose two methods of application of federated learning to the construction of classifiers for the analysis of data related to predicting the death of patients suffering from the vasculitis. The paper contains results of ...
- research-articleMay 2023
A New Amharic Speech Emotion Dataset and Classification Benchmark
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 22, Issue 1Article No.: 20, Pages 1–22https://doi.org/10.1145/3529759In this article we present the Amharic Speech Emotion Dataset (ASED), which covers four dialects (Gojjam, Wollo, Shewa, and Gonder) and five different emotions (neutral, fearful, happy, sad, and angry). We believe it is the first Speech Emotion ...
- research-articleMarch 2024
Random forests for change point detection
The Journal of Machine Learning Research (JMLR), Volume 24, Issue 1Article No.: 216, Pages 10294–10338We propose a novel multivariate nonparametric multiple change point detection method using classifiers. We construct a classifier log-likelihood ratio that uses class probability predictions to compare different change point configurations. We propose a ...
- research-articleJanuary 2023
Deep learning models used for accuracy and loss detection on twitter dataset by setting tuning parameters
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 44, Issue 5Pages 8329–8341https://doi.org/10.3233/JIFS-222431Hate speech on social media post is running now a days. Social media like YouTube, Twitter, and Facebook etc. are responsible for hated speech. Hated speech spreads through digital media, causing individuals to get confused and adopt prejudiced ...
- research-articleApril 2023
An evaluation of classifiers for reading resistor colors
AICCC '22: Proceedings of the 2022 5th Artificial Intelligence and Cloud Computing ConferencePages 171–174https://doi.org/10.1145/3582099.3582126A lot of effort has been devoted to reading resistor colors using image processing and pattern recognition techniques. It is not so clear which classifier or machine learning is effective for classifying colors in reading a resistance of a resistor. ...
- research-articleDecember 2022
Use of Neural Networks and Decision Trees in Compression of 2D and 3D Digital Signals
Optical Memory and Neural Networks (SPOMNN), Volume 31, Issue 4Pages 379–392https://doi.org/10.3103/S1060992X22040038AbstractThe article considers a compression framework for 2D/3D digital signals, including digital images and hyperspectral data. A compression framework is proposed that uses neural networks to exclude insignificant signal portions from the compression ...
- research-articleJanuary 2023
A Comprehensive Study on Machine Learning in Breast Cancer Detection and Classification
ICAAI '22: Proceedings of the 6th International Conference on Advances in Artificial IntelligencePages 81–87https://doi.org/10.1145/3571560.3571572Breast cancer is one of the diseases that led to a huge number of deaths in the recent decades. One of the major issues that affect the recovery procedure is the early detection of the disease. Thus, in this paper, several machine learning algorithms ...
- research-articleJune 2022
Through the Data Management Lens: Experimental Analysis and Evaluation of Fair Classification
SIGMOD '22: Proceedings of the 2022 International Conference on Management of DataPages 232–246https://doi.org/10.1145/3514221.3517841Classification, a heavily-studied data-driven machine learning task, drives an increasing number of prediction systems involving critical human decisions such as loan approval and criminal risk assessment. However, classifiers often demonstrate ...
- research-articleJanuary 2022
Detection of phishing websites using data mining tools and techniques
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 22, Issue 1-2Pages 167–183https://doi.org/10.1504/ijaip.2022.123021Phishing, a prevailing cyber-security issue, is one of the most common attacks to obtain user's sensitive information. To eradicate it, the users or software should detect it first. A popular approach to carry out phishing is through generating phishing ...
- research-articleJanuary 2022
Sequential pattern-based activity recognition model for ambient computing
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 21, Issue 1-2Pages 41–52https://doi.org/10.1504/ijaip.2022.121028In the recent years, the human activity recognition gain popularity in ambient computing. The human activity recognition is composed of identifying the daily activities of the users by observing their actions. Action identification is a more complex task ...
- research-articleJanuary 2022
Detection of data drift in a two-dimensional stream using the Kolmogorov-Smirnov test
Procedia Computer Science (PROCS), Volume 207, Issue CPages 168–175https://doi.org/10.1016/j.procs.2022.09.049AbstractIn recent years, there has been an increasing amount of streaming information coming from time series. Learning from data appearing in real time is quite a call, due in part to the speed at which new data appears. Hidden data changes that are not ...
- research-articleDecember 2021
Exploring the Model of Park Visual Quality Evaluation Using Image Analysis and Machine Learning
EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer EngineeringPages 333–337https://doi.org/10.1145/3501409.3501471Park visual quality evaluation is one of the contents of park environmental performance evaluation. The purpose of this study is to establish a model for park quality evaluation using image feature extraction and machine learning. We selected three areas ...
- research-articleNovember 2021
Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment
IC3-2021: Proceedings of the 2021 Thirteenth International Conference on Contemporary ComputingPages 349–354https://doi.org/10.1145/3474124.3474211In this work, we investigate whether malware understands the analysis environment. This analysis is carried out by executing a set of real malicious programs and benign samples on virtual and native machines. The result of execution is API sequence ...
- research-articleJanuary 2021
Directed adversarial sampling attacks on phishing detection
Journal of Computer Security (JOCS), Volume 29, Issue 1Pages 1–23https://doi.org/10.3233/JCS-191411Phishing websites trick honest users into believing that they interact with a legitimate website and capture sensitive information, such as user names, passwords, credit card numbers, and other personal information. Machine learning is a promising ...