Intelligent technologies for construction machinery using data-driven methods

Z Zheng, F Wang, G Gong, H Yang, D Han - Automation in Construction, 2023 - Elsevier
Along with the rapid development of infrastructure worldwide, traditional manual operations
have been a concern that restricts the high efficiency, safety, and quality of construction …

Machine learning-based detection for cyber security attacks on connected and autonomous vehicles

Q He, X Meng, R Qu, R Xi - Mathematics, 2020 - mdpi.com
Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the
fastest expanding in recent years, and have started to affect the daily lives of people. More …

Web-based new student admission information system using waterfall method

F Aldi - Sinkron: jurnal dan penelitian teknik informatika, 2021 - jurnal.polgan.ac.id
The current development of information technology on the activities of people's daily lives is
very influential. Where in doing an activity that takes a lot of time can be shortened to …

A semi-boosted nested model with sensitivity-based weighted binarization for multi-domain network intrusion detection

JW Mikhail, JM Fossaceca, R Iammartino - ACM Transactions on …, 2019 - dl.acm.org
Effective network intrusion detection techniques are required to thwart evolving
cybersecurity threats. Historically, traditional enterprise networks have been researched …

Selecting the most suitable classification algorithm for supporting assistive technology adoption for people with dementia: a multicriteria framework

M Ortiz‐Barrios, C Nugent, I Cleland… - Journal of Multi …, 2020 - Wiley Online Library
The number of people with dementia (PwD) is increasing dramatically. PwD exhibit
impairments of reasoning, memory, and thought that require some form of self‐management …

New approaches in metaheuristic to classify medical data using artificial neural network

S Das, S Mishra, MR Senapati - Arabian Journal for Science and …, 2020 - Springer
Abstract Artificial Neural Networks have been applied as a useful technique for
classification. Based on the above, we propose a method called Velocity-Enhanced Whale …

[图书][B] Implementing Machine Learning to Achieve Dynamic Zero-Trust Intrusion Detection Systems (ZT-IDS) in 5G Based IoT Networks

MG Nour - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) pertains to devices that link to a network to gather and
exchange data. With the increasing quantity of such devices, so do the associated security …

Comparison of the performance results of c4. 5 and random forest algorithm in data mining to predict childbirth process

M Muhasshanah, M Tohir, DA Ningsih… - CommIT …, 2023 - journal.binus.ac.id
Technology advancements in the world of information have made it easier for many people
to process data. Data mining is a process of mining more valuable information from large …

An Illustration of Rheumatoid Arthritis Disease Using Decision Tree Algorithm

U Ramasamy, S Sundar - Informatica, 2022 - informatica.si
Data Mining domain integrates several partitions of the computer science and analytics field.
Data mining focuses on mine data from a repository of datasets, to identify patterns, discover …

Student adaptivity classification in online education through stacked ensemble learning

M Sharif, S Buyrukoglu, A Akbas - Multimedia Tools and Applications, 2024 - Springer
Online and e-learning have become indispensable components of the educational process.
Enhancing students' adaptation to this form of education is crucial for achieving optimal …