Unlocking the black box: an in-depth review on interpretability, explainability, and reliability in deep learning
Deep learning models have revolutionized numerous fields, yet their decision-making
processes often remain opaque, earning them the characterization of “black-box” models …
processes often remain opaque, earning them the characterization of “black-box” models …
Enhancing Auto Insurance Risk Evaluation with Transformer and SHAP
The evaluation of auto insurance risks is a fundamental task for financial institutions, crucial
for setting equitable premiums and managing risks effectively. Traditional machine learning …
for setting equitable premiums and managing risks effectively. Traditional machine learning …
A high-precision and transparent step-wise diagnostic framework for hot-rolled strip crown
C Ding, J Sun, X Li, W Peng, D Zhang - Journal of Manufacturing Systems, 2023 - Elsevier
The strip crown plays a crucial role in determining the quality of products in strip hot rolling.
Machine learning (ML) methods have shown promise in crown prediction by effectively …
Machine learning (ML) methods have shown promise in crown prediction by effectively …
Potential Applications of Explainable Artificial Intelligence to Actuarial Problems
C Lozano-Murcia, FP Romero, J Serrano-Guerrero… - Mathematics, 2024 - mdpi.com
Explainable artificial intelligence (XAI) is a group of techniques and evaluations that allows
users to understand artificial intelligence knowledge and increase the reliability of the results …
users to understand artificial intelligence knowledge and increase the reliability of the results …
[HTML][HTML] Towards specific cutting energy analysis in the machining of Inconel 601 alloy under sustainable cooling conditions
ME Korkmaz, MK Gupta, H Yilmaz, NS Ross… - Journal of Materials …, 2023 - Elsevier
Currently, the research efforts on machining indices such as tool wear, surface roughness,
power consumption etc. is well reported in literature, but energy analysis based on material …
power consumption etc. is well reported in literature, but energy analysis based on material …
[HTML][HTML] A novel Bayesian Pay-As-You-Drive insurance model with risk prediction and causal mapping
The modern vehicle insurance industry is increasingly adopting Pay-As-You-Drive (PAYD)
insurance models, aligning premium costs with driving behavior. Our study introduces a …
insurance models, aligning premium costs with driving behavior. Our study introduces a …
The Implementation of Machine Learning In The Insurance Industry With Big Data Analytics
This study demonstrates how Machine Learning techniques and Big Data Analytics can be
used in the insurance sector. Due to various web technologies, mobile devices, and sensor …
used in the insurance sector. Due to various web technologies, mobile devices, and sensor …
Spatial mapping of land susceptibility to dust emissions using optimization of attentive Interpretable Tabular Learning (TabNet) model
SV Razavi-Termeh, A Sadeghi-Niaraki… - Journal of …, 2024 - Elsevier
Dust pollution poses significant risks to human health, air quality, and food safety,
necessitating the identification of dust occurrence and the development of dust susceptibility …
necessitating the identification of dust occurrence and the development of dust susceptibility …
An ensemble learning approach based on TabNet and machine learning models for cheating detection in educational tests
Y Zhen, X Zhu - Educational and Psychological …, 2024 - journals.sagepub.com
The pervasive issue of cheating in educational tests has emerged as a paramount concern
within the realm of education, prompting scholars to explore diverse methodologies for …
within the realm of education, prompting scholars to explore diverse methodologies for …
Sampling-Based Machine Learning Models for Intrusion Detection in Imbalanced Dataset
Cybersecurity is one of the important considerations when adopting IoT devices in smart
applications. Even though a huge volume of data is available, data related to attacks are …
applications. Even though a huge volume of data is available, data related to attacks are …