Results 181 to 190 of about 353,439 (278)
Point cloud generation adversarial network based on self-attention and curvature. [PDF]
Sun F +5 more
europepmc +1 more source
A multiscale framework integrating electronic, mechanical, and thermal analysis with machine learning to optimize carbon nanotube interconnects. As the component dimensions in integrated circuits shrink to extreme scales, the complexity of interconnect systems is increasing significantly, necessitating an urgent and comprehensive upgrade of ...
Changhong Zhang +11 more
wiley +1 more source
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness. [PDF]
Samy H, Bahaa-Eldin AM, Sobh MA, Taha A.
europepmc +1 more source
ABSTRACT Despite South Korea's extensive forest coverage, which accounts for approximately 63% of its total land area, the country imports over 83% of its timber needs and has shown a gradual decline in forest carbon sequestration capacity. The Circular Forest Management Policy (CFMP) addresses these challenges through systematic forest resource ...
Seoryeon Son +4 more
wiley +1 more source
Privacy-preserving cyberthreat detection in decentralized social media with federated cross-modal graph transformers. [PDF]
Premkumar D, Nachimuthu SK.
europepmc +1 more source
AI‐based localization of the epileptogenic zone using intracranial EEG
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida +5 more
wiley +1 more source
Blockchain-enabled identity management for IoT: a multi-layered defense against adversarial AI. [PDF]
Usama M +5 more
europepmc +1 more source
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan +4 more
wiley +1 more source
Generalization bounds for a generator-regularized InfoGAN-inspired adversarial objective. [PDF]
Hasan M, Muia MN, Islam MM.
europepmc +1 more source
Prediction of Pipeline Defect Depth and Classification Based on CatBoost
Obtaining detection data using in‐line pipeline inspection, the synthetic minority oversampling technique (SMOTE) is applied to expand the sample set, thereby increasing the number of minority‐class samples. This approach effectively improves minority‐class detection and enhances pipeline safety assessment. ABSTRACT Magnetic flux leakage detection is a
Cong Chen +3 more
wiley +1 more source

