Results 41 to 50 of about 22,279 (217)

An interpretable machine learning model for predicting forest fire danger based on Bayesian optimization

open access: yesEmergency Management Science and Technology
As global warming increases forest fire frequency, early prevention and effective management become crucial. This requires models that are both accurate and easily understood.
Zhiyang Liu   +3 more
doaj   +1 more source

Three Synchronized, Miniaturized, Wireless Inertial Measurement Unit Sensors for Automated Gait and Balance Analysis System

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a compact, three IMU wearable system that enables accurate motion capture and robust gait‐feature extraction, thereby supporting reliable machine learning‐based balance evaluation. Accurate assessment of balance is critical for fall prevention and targeted rehabilitation, particularly in older adults and individuals with ...
Seok‐Hoon Choi   +8 more
wiley   +1 more source

Assessment of Stable Slopes Through BPSO-Driven Ensemble Models

open access: yesSlovak Journal of Civil Engineering
This study explores a hybrid approach that combines BPSO with ensemble machine learning techniques to improve predictive accuracy in assessments of slope stability.
Anuragi Saurabh Kumar, Kishan D.
doaj   +1 more source

Analysis of Ruddlesden‐Popper and Dion‐Jacobson 2D Lead Halide Perovskites Through Integrated Experimental and Computational Analysis

open access: yesBattery Energy, Volume 4, Issue 2, March 2025.
Optimized ML framework for predicting RP and Dj phases in perovskite solar cells. ABSTRACT Two‐dimensional (2D) lead halide perovskites (LHPs) have captured a range of interest for the advancement of state‐of‐the‐art optoelectronic devices, highly efficient solar cells, next‐generation energy harvesting technologies owing to their hydrophobic nature ...
Basir Akbar, Kil To Chong, Hilal Tayara
wiley   +1 more source

Will they repay their debt? Identification of borrowers likely to be charged off

open access: yesManagement şi Marketing, 2020
Recent increase in peer-to-peer lending prompted for development of models to separate good and bad clients to mitigate risks both for lenders and for the platforms.
Caplescu Raluca Dana   +3 more
doaj   +1 more source

Economic and Technical Assessment of Wind Potential Using SARIMAX Time Series Models: Wind Speed Forecasting and Analysis

open access: yesEnergy Science &Engineering, EarlyView.
The wind energy potential of Khaf was evaluated for 2025 using 15 years of wind data combined with advanced forecasting models, SARIMAX and Prophet. This integrated framework enables precise estimation of wind power density and optimal turbine selection, paving the way for the efficient and sustainable development of wind farms in the region.
Mohammad Amin Valizadeh   +3 more
wiley   +1 more source

Assessment and Prediction of Typhoon-Related Direct Economic Loss in Fujian Province Based on LightGBM

open access: yesRedai dili
Typhoons are among the most destructive natural disasters affecting China's coastal regions, often resulting in substantial economic loss and casualties.
Zhang Zhixia   +3 more
doaj   +1 more source

Performance Monitoring of Photovoltaic Modules Using Machine‐Learning‐Based Solutions: A Survey of Current Trends

open access: yesEnergy Science &Engineering, EarlyView.
The graphical abstract presents the concept of applying machine‐learning algorithms to assess the performance of photovoltaic modules. Data from solar panels are fed to surrogates of intelligent models, to assess the following performance metrics: identifying faults, quantifying energy production and trend degradation over time. The combination of data
Nangamso Nathaniel Nyangiwe   +3 more
wiley   +1 more source

A lightweight IoT intrusion detection method based on two-stage feature selection and Bayesian optimization

open access: yesAIMS Electronics and Electrical Engineering
With the widespread application of the Internet of Things (IoT), security risks are becoming increasingly severe. However, due to the limitations in computing resources and energy consumption of IoT devices, traditional intrusion detection models are ...
Dainan Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy