Six anomaly detection techniques – Pros and Cons
Anomaly detection finds extensive use in various applications such as intrusion detection for cyber-security, fraud detection for credit cards, insurance, or health care, fault...
Top 15 machine learning startups to watch in 2023 [Updated]
The acceleration of Artificial Intelligence (AI), led by new machine learning techniques, has led to a boom in the startup world, especially when the...
Strengths and weaknesses of ML methods in marketing
In the last two decades, artificial intelligence (AI) and machine learning (ML) have significantly transformed fields such as biology, education, engineering, finance, and healthcare....
Wearables in sports – Injury prediction and tracking for athletes
Personal injuries are too common for both amateur and professional athletes worldwide. Yet, according to studies, a staggering $33B was spent treating sports injuries...
Machine Learning in Physics – The power and promise
Our ability to generate and analyze large data sets has increased dramatically over the last three decades. This “big data” revolution, spurred by an...
Machine learning in everyday life – Six common applications
The term 'machine learning' is not one with high salience for the public. According to research by the Royal Society of London, only 9%...
Machine Learning applications: How to think about AI and your business
We hear two common questions when talking with users who are new to the artificial intelligence (AI) space and looking to leverage AI in...
Artificial intelligence in cancer imaging – Current trends
The exponential growth and availability of healthcare data coupled with the increasing computational power have enabled the development of AI systems and machine learning...
AI-based tools and databases for Drug Discovery
The development of a new drug is a very complex, expensive, and long process, broadly divided into four major stages: target selection and validation;...
Battery life estimation using machine learning techniques
Battery life estimation or state of health (SOH) estimation deals with accurately assessing the percentage value of the State of Charge (SoC), which is...
Pros and cons of anomaly detection techniques
Our recent post about data anomaly detection explored various supervised and unsupervised techniques commonly used to identify intrusions and non-authorized activities. This post will...
Supervised and unsupervised anomaly detection techniques
Even after 20 years of research and development, anomaly detection still confronts difficult and unresolved challenges, including reducing many false alerts during the process...