machine learning methods
Recently Published Documents


TOTAL DOCUMENTS

4225
(FIVE YEARS 3468)

H-INDEX

66
(FIVE YEARS 39)

2022 ◽  
Vol 54 (8) ◽  
pp. 1-34
Author(s):  
Fuqiang Gu ◽  
Mu-Huan Chung ◽  
Mark Chignell ◽  
Shahrokh Valaee ◽  
Baoding Zhou ◽  
...  

Human activity recognition is a key to a lot of applications such as healthcare and smart home. In this study, we provide a comprehensive survey on recent advances and challenges in human activity recognition (HAR) with deep learning. Although there are many surveys on HAR, they focused mainly on the taxonomy of HAR and reviewed the state-of-the-art HAR systems implemented with conventional machine learning methods. Recently, several works have also been done on reviewing studies that use deep models for HAR, whereas these works cover few deep models and their variants. There is still a need for a comprehensive and in-depth survey on HAR with recently developed deep learning methods.


2022 ◽  
Vol 73 ◽  
pp. 103414
Author(s):  
Alexander Chikov ◽  
Nikolay Egorov ◽  
Dmitry Medvedev ◽  
Svetlana Chikova ◽  
Evgeniy Pavlov ◽  
...  

2022 ◽  
Vol 307 ◽  
pp. 118251
Author(s):  
Peipei Chen ◽  
Yi Wu ◽  
Honglin Zhong ◽  
Yin Long ◽  
Jing Meng

Fuel ◽  
2022 ◽  
Vol 309 ◽  
pp. 122082
Author(s):  
Zhanshi Ni ◽  
Haobo Bi ◽  
Chunlong Jiang ◽  
Hao Sun ◽  
Wenliang Zhou ◽  
...  

2022 ◽  
Vol 14 (2) ◽  
pp. 399
Author(s):  
Xueyuan Tang ◽  
Sheng Dong ◽  
Kun Luo ◽  
Jingxue Guo ◽  
Lin Li ◽  
...  

The airborne ice-penetrating radar (IPR) is an effective method used for ice sheet exploration and is widely applied for detecting the internal structures of ice sheets and for understanding the mechanism of ice flow and the characteristics of the bottom of ice sheets. However, because of the ambient influence and the limitations of the instruments, IPR data are frequently overlaid with noise and interference, which further impedes the extraction of layer features and the interpretation of the physical characteristics of the ice sheet. In this paper, we first applied conventional filtering methods to remove the feature noise and interference in IPR data. Furthermore, machine learning methods were introduced in IPR data processing for noise removal and feature extraction. Inspired by a comparison of the filtering methods and machine learning methods, we propose a fusion method combining both filtering methods and machine-learning-based methods to optimize the feature extraction in IPR data. Field data tests indicated that, under different conditions of IPR data, the application of different methods and strategies can improve the layer feature extraction.


2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
Tzu-Chia Chen ◽  
Fouad Jameel Ibrahim Alazzawi ◽  
John William Grimaldo Guerrero ◽  
Paitoon Chetthamrongchai ◽  
Aleksei Dorofeev ◽  
...  

The hybrid energy storage systems are a practical tool to solve the issues in single energy storage systems in terms of specific power supply and high specific energy. These systems are especially applicable in electric and hybrid vehicles. Applying a dynamic and coherent strategy plays a key role in managing a hybrid energy storage system. The data obtained while driving and information collected from energy storage systems can be used to analyze the performance of the provided energy management method. Most existing energy management models follow predetermined rules that are unsuitable for vehicles moving in different modes and conditions. Therefore, it is so advantageous to provide an energy management system that can learn from the environment and the driving cycle and send the needed data to a control system for optimal management. In this research, the machine learning method and its application in increasing the efficiency of a hybrid energy storage management system are applied. In this regard, the energy management system is designed based on machine learning methods so that the system can learn to take the necessary actions in different situations directly and without the use of predicted select and run the predefined rules. The advantage of this method is accurate and effective control with high efficiency through direct interaction with the environment around the system. The numerical results show that the proposed machine learning method can achieve the least mean square error in all strategies.


2022 ◽  
Vol 14 (2) ◽  
pp. 394
Author(s):  
Dan Li ◽  
Yuxin Miao ◽  
Curtis J. Ransom ◽  
G. Mac Bean ◽  
Newell R. Kitchen ◽  
...  

Accurate nitrogen (N) diagnosis early in the growing season across diverse soil, weather, and management conditions is challenging. Strategies using multi-source data are hypothesized to perform significantly better than approaches using crop sensing information alone. The objective of this study was to evaluate, across diverse environments, the potential for integrating genetic (e.g., comparative relative maturity and growing degree units to key developmental growth stages), environmental (e.g., soil and weather), and management (e.g., seeding rate, irrigation, previous crop, and preplant N rate) information with active canopy sensor data for improved corn N nutrition index (NNI) prediction using machine learning methods. Thirteen site-year corn (Zea mays L.) N rate experiments involving eight N treatments conducted in four US Midwest states in 2015 and 2016 were used for this study. A proximal RapidSCAN CS-45 active canopy sensor was used to collect corn canopy reflectance data around the V9 developmental growth stage. The utility of vegetation indices and ancillary data for predicting corn aboveground biomass, plant N concentration, plant N uptake, and NNI was evaluated using singular variable regression and machine learning methods. The results indicated that when the genetic, environmental, and management data were used together with the active canopy sensor data, corn N status indicators could be more reliably predicted either using support vector regression (R2 = 0.74–0.90 for prediction) or random forest regression models (R2 = 0.84–0.93 for prediction), as compared with using the best-performing single vegetation index or using a normalized difference vegetation index (NDVI) and normalized difference red edge (NDRE) together (R2 < 0.30). The N diagnostic accuracy based on the NNI was 87% using the data fusion approach with random forest regression (kappa statistic = 0.75), which was better than the result of a support vector regression model using the same inputs. The NDRE index was consistently ranked as the most important variable for predicting all the four corn N status indicators, followed by the preplant N rate. It is concluded that incorporating genetic, environmental, and management information with canopy sensing data can significantly improve in-season corn N status prediction and diagnosis across diverse soil and weather conditions.


2022 ◽  
Vol 2 (14) ◽  
pp. 26-34
Author(s):  
Nguyen Manh Thang ◽  
Tran Thi Luong

Abstract—Almost developed applications tend to become as accessible as possible to the user on the Internet. Different applications often store their data in cyberspace for more effective work and entertainment, such as Google Docs, emails, cloud storage, maps, weather, news,... Attacks on Web resources most often occur at the application level, in the form of HTTP/HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks. To protect Web resources from attacks at the application level, there are special tools - Web Application Firewall (WAF). This article presents an anomaly detection algorithm, and how it works in the open-source web application firewall ModSecurity, which uses machine learning methods with 8 suggested features to detect attacks on web applications. Tóm tắt—Hầu hết các ứng dụng được phát triển có xu hướng trở nên dễ tiếp cận nhất có thể đối với người dùng qua Internet. Các ứng dụng khác nhau thường lưu trữ dữ liệu trên không gian mạng để làm việc và giải trí hiệu quả hơn, chẳng hạn như Google Docs, email, lưu trữ đám mây, bản đồ, thời tiết, tin tức,... Các cuộc tấn công vào tài nguyên Web thường xảy ra nhất ở tầng ứng dụng, dưới dạng các yêu cầu HTTP/HTTPS đến trang web, nơi tường lửa truyền thống có khả năng hạn chế trong việc phân tích và phát hiện các cuộc tấn công. Để bảo vệ tài nguyên Web khỏi các cuộc tấn công ở tầng ứng dụng, xuất hiện các công cụ đặc biệt - Tường lửa Ứng dụng Web (WAF). Bài viết này trình bày thuật toán phát hiện bất thường và cách thức hoạt động của tường lửa ứng dụng web mã nguồn mở ModSecurity khi sử dụng phương pháp học máy với 8 đặc trưng được đề xuất để phát hiện các cuộc tấn công vào các ứng dụng web.


Sign in / Sign up

Export Citation Format

Share Document