-
1261
Improved spectral clustering algorithm and its application in MCI detection
Published 2015-04-01“…In order to detect mild cognitive impairment (MCI) using functional magnetic resonance imaging (fMRI),a method based on fMRI clustering was proposed fMRI data were clustered to obtain the blood oxygen level dependence( BOLD) change model of MCI patients,then abnormal patterns were used to detect disease.The traditional spectral clustering algorithm needs to calculate all of the eigenvalue and eigenvector,so time and space complexity is higher.An improved spectral clustering method was proposed which modified the similar matrix construction method and the setting method of σ and k,and then this method was applied to clustering and detection of MCI patients.To verify the performance of the proposed method,the comparison of the clustering result,classification accuracy using traditional algorithm and Nyström is also done.The comparative experimental results show that the proposed method can get BOLD pattern more accurately,the accuracy of MCI detection is higher than the other two algorithms,and the time and space complexity are less than the traditional algorithm.…”
Get full text
Article -
1262
Improved spectral clustering algorithm and its application in MCI detection
Published 2015-04-01“…In order to detect mild cognitive impairment (MCI) using functional magnetic resonance imaging (fMRI),a method based on fMRI clustering was proposed fMRI data were clustered to obtain the blood oxygen level dependence( BOLD) change model of MCI patients,then abnormal patterns were used to detect disease.The traditional spectral clustering algorithm needs to calculate all of the eigenvalue and eigenvector,so time and space complexity is higher.An improved spectral clustering method was proposed which modified the similar matrix construction method and the setting method of σ and k,and then this method was applied to clustering and detection of MCI patients.To verify the performance of the proposed method,the comparison of the clustering result,classification accuracy using traditional algorithm and Nyström is also done.The comparative experimental results show that the proposed method can get BOLD pattern more accurately,the accuracy of MCI detection is higher than the other two algorithms,and the time and space complexity are less than the traditional algorithm.…”
Get full text
Article -
1263
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01“…The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors, such as local ternary pattern, local phase quantization, local Gabor binary pattern histogram sequence, Weber local descriptor, and local monotonic pattern, and classifiers such as optimized support vector machine and optimized NBC. …”
Get full text
Article -
1264
Novel Multimodal Fusion Algorithm for Non-Intrusive Anxiety Detection
Published 2025-03-01“…Early detection of anxiety disorders in a non-intrusive manner is crucial, as these conditions can profoundly impact an individual’s health and daily functioning. …”
Get full text
Article -
1265
Early detection of risky spatio-temporal congestion in urban traffic
Published 2025-01-01“…However, large-scale congestion in city exhibits an unique spatio-temporal growth pattern. In this article, we develop a detection method for risky congestion based on its spatio-temporal evolution feature, which can detect risky spatio-temporal congestion clusters (SCCs) when they are small. …”
Get full text
Article -
1266
Detecting clusters in spatially repetitive point event data sets
Published 2007-07-01“…The analysis of point event patterns has a long tradition. The patterns of particular interest are patterns of clustering or ‘hot spots’ and such cluster detection lies at the heart of spatial data mining. …”
Get full text
Article -
1267
An influence of a modulating signal starting phase on the modulation detection
Published 2015-01-01“…Data shown in this paper are consistent with predictions of models based on excitation pattern changes and with a concept according to which AM/FM detection at low modulation rates depends mainly on maximum and minimum values of signal amplitude/frequency. …”
Get full text
Article -
1268
An optimal federated learning-based intrusion detection for IoT environment
Published 2025-03-01“…Analyzing and detecting intrusions by analyzing diverse attack patterns is complex for machine learning algorithms. …”
Get full text
Article -
1269
Detecting and Analysing Possible Outliers in Global Stock Market Returns
Published 2022-12-01“…We find a sequential pattern in outlier occurrence within individual return series, and a concurrent pattern across stock markets. …”
Get full text
Article -
1270
Detection of Gene Localization in a Large Concomitant Strabismus Family
Published 2013-12-01Get full text
Article -
1271
MLAD: A Multi-Task Learning Framework for Anomaly Detection
Published 2025-07-01“…While existing methods often utilize sequence modeling or graph neural networks to capture global sensor relationships, they typically treat all sensors uniformly—potentially overlooking the benefit of grouping sensors with similar temporal patterns. To this end, we propose a novel framework called Multi-task Learning Anomaly Detection (MLAD), which leverages clustering techniques to group sensors based on their temporal characteristics, and employs a multi-task learning paradigm to jointly capture both shared patterns across all sensors and specialized patterns within each cluster. …”
Get full text
Article -
1272
An Artificial Intelligence QRS Detection Algorithm for Wearable Electrocardiogram Devices
Published 2025-05-01“…It achieves an excellent F1 score of 99.83 on the MITBIHA database and 99.77 on the INCART database, specifically in the inter-patient pattern. In the cross-database pattern, our approach maintains a strong performance with an F1 score of 99.22 on the INCART database and an F1 score of 99.09 on the MITBIHA database. …”
Get full text
Article -
1273
The application and research of machine learning in malicious encrypted traffic detection
Published 2025-04-01“…The findings indicate that machine learning significantly improves the accuracy of malicious behavior detection, particularly in complex feature extraction and the identification of new attack patterns.…”
Get full text
Article -
1274
Cooperator and Defector-Based Dynamic Community Detection in Social Networks
Published 2025-01-01“…Dynamic community detection in social networks requires advanced methods to capture the intricate patterns of user interactions. …”
Get full text
Article -
1275
No genetic structure detected in multiple Brazilian marine fish species
Published 2025-06-01Get full text
Article -
1276
Financial phishing detection method based on sensitive characteristics of webpage
Published 2017-02-01“…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). …”
Get full text
Article -
1277
Enhancing Federated Intrusion Detection with Class-Specific Dynamic Sampling
Published 2025-05-01“…Notably, DS-FedIDS excels in detecting minority attack classes and adapting to client-specific normal traffic patterns, making it ideal for real-world intrusion detection scenarios with inherently imbalanced and heterogeneous data distributions.…”
Get full text
Article -
1278
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
Get full text
Article -
1279
Research on intrusion detection model based on improved MLP algorithm
Published 2025-02-01“…The multi-layer perceptron (MLP) offers distinct advantages for intrusion detection, as attack patterns often follow complex, nonlinear relationships. …”
Get full text
Article -
1280
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
Get full text
Article