Zobrazeno 1 - 10
of 4 735
pro vyhledávání: '"Information gain"'
Publikováno v:
Frontiers in Energy Research, Vol 12 (2024)
With the increasing variation of the network topology and the high complexity of the processing measurement data, the transient voltage stability assessment of the new power system is facing significant challenges in low accuracy and high time costs.
Externí odkaz:
https://doaj.org/article/b258f6613c25459f8021dcfc7dd19b7e
Autor:
Zhi-Feng Gu, Yu-Duo Hao, Tian-Yu Wang, Pei-Ling Cai, Yang Zhang, Ke-Jun Deng, Hao Lin, Hao Lv
Publikováno v:
BMC Biology, Vol 22, Iss 1, Pp 1-17 (2024)
Abstract Background The blood–brain barrier serves as a critical interface between the bloodstream and brain tissue, mainly composed of pericytes, neurons, endothelial cells, and tightly connected basal membranes. It plays a pivotal role in safegua
Externí odkaz:
https://doaj.org/article/43d56a358be640beac61303377da84e4
Autor:
Farkhanda Abbas, Feng Zhang, Muhammad Afaq Hussain, Hasnain Abbas, Abdulwahed Fahad Alrefaei, Muhammed Fahad Albeshr, Javed Iqbal, Junaid Ghani, Ismail shah
Publikováno v:
Science of Remote Sensing, Vol 9, Iss , Pp 100132- (2024)
This study addressed the complex challenges associated with landslide detection along the Karakoram Highway (KKH), where tectonic events and data availability limitations posed significant obstacles. To overcome these hurdles, the research framework
Externí odkaz:
https://doaj.org/article/7ffc679a15ae42f9ad1b7f46c53825f6
Publikováno v:
IEEE Access, Vol 12, Pp 4925-4937 (2024)
Unmanned aerial vehicles (UAVs) are increasingly being deployed in crucial missions for the armed forces, law enforcement, industrial control monitoring, and other sectors. However, these hostile operating circumstances, along with the UAVs’ depend
Externí odkaz:
https://doaj.org/article/de4aeefb7db84bdc83c5e890b2342087
Autor:
Nurissaidah Ulinnuha, Aris Fanani
Publikováno v:
Techno.Com, Vol 22, Iss 4, Pp 1014-1025 (2023)
Salah satu masalah dalam perguruan tinggi adalah kasus drop out. Banyaknya mahasiswa yang mengalami drop out merupakan salah satu indikator yang mempengaruhi kualitas pembelajaran dan akreditasi yang sangat penting untuk keberlangsungan suatu institu
Externí odkaz:
https://doaj.org/article/e73b3f81a2e74aea8f686bbc161e3b17
Publikováno v:
Entropy, Vol 26, Iss 9, p 767 (2024)
This study harnesses RNA sequencing data from the Cancer Genome Atlas to unearth pivotal genetic markers linked to the progression of liver hepatocellular carcinoma (LIHC), a major contributor to cancer-related deaths worldwide, characterized by a di
Externí odkaz:
https://doaj.org/article/3b6a9b0f4d564a65b0debcdcbe738865
Publikováno v:
Energies, Vol 17, Iss 16, p 4098 (2024)
Renewable energy accommodation in power grids leads to frequent load changes in power plants. Sensitive turbine fault monitoring technology is critical to ensure the stable operation of the power system. Existing techniques do not use information suf
Externí odkaz:
https://doaj.org/article/c4dccab0c4c6440f9b27607498479373
Autor:
Jerry Gibson
Publikováno v:
Information, Vol 15, Iss 8, p 497 (2024)
Information theoretic quantities such as entropy, entropy rate, information gain, and relative entropy are often used to understand the performance of intelligent agents in learning applications. Mean squared error has not played a role in these anal
Externí odkaz:
https://doaj.org/article/2600787cce524bb5881f49dbd74fdaf6
Publikováno v:
Sensors, Vol 24, Iss 16, p 5223 (2024)
With the rapid advancement of the Internet of Things, network security has garnered increasing attention from researchers. Applying deep learning (DL) has significantly enhanced the performance of Network Intrusion Detection Systems (NIDSs). However,
Externí odkaz:
https://doaj.org/article/b1ecd32586e64e6bb17d683f475a8653
Autor:
Md Ashikur Rahman, Syful Islam, Yusuf Sulistyo Nugroho, Fatah Yasin Al Irsyadi, Md Javed Hossain
Publikováno v:
Journal of Communications Software and Systems, Vol 19, Iss 3, Pp 207-219 (2023)
Computers have become increasingly vulnerable to malicious attacks with an increase in popularity and the proliferation of open system architectures. There are numerous malware detection technologies available to protect the computer operating system
Externí odkaz:
https://doaj.org/article/1484602714a74c11978c91fefdc5b775