Showing 1,261 - 1,280 results of 8,285 for search '(pattern OR patterns) detection', query time: 0.18s Refine Results
  1. 1261

    Improved spectral clustering algorithm and its application in MCI detection by Jie XIANG, Dong-qin ZHAO

    Published 2015-04-01
    “…In order to detect mild cognitive impairment (MCI) using functional magnetic resonance imaging (fMRI),a method based on fMRI clustering was proposed fMRI data were clustered to obtain the blood oxygen level dependence( BOLD) change model of MCI patients,then abnormal patterns were used to detect disease.The traditional spectral clustering algorithm needs to calculate all of the eigenvalue and eigenvector,so time and space complexity is higher.An improved spectral clustering method was proposed which modified the similar matrix construction method and the setting method of σ and k,and then this method was applied to clustering and detection of MCI patients.To verify the performance of the proposed method,the comparison of the clustering result,classification accuracy using traditional algorithm and Nyström is also done.The comparative experimental results show that the proposed method can get BOLD pattern more accurately,the accuracy of MCI detection is higher than the other two algorithms,and the time and space complexity are less than the traditional algorithm.…”
    Get full text
    Article
  2. 1262

    Improved spectral clustering algorithm and its application in MCI detection by Jie XIANG, Dong-qin ZHAO

    Published 2015-04-01
    “…In order to detect mild cognitive impairment (MCI) using functional magnetic resonance imaging (fMRI),a method based on fMRI clustering was proposed fMRI data were clustered to obtain the blood oxygen level dependence( BOLD) change model of MCI patients,then abnormal patterns were used to detect disease.The traditional spectral clustering algorithm needs to calculate all of the eigenvalue and eigenvector,so time and space complexity is higher.An improved spectral clustering method was proposed which modified the similar matrix construction method and the setting method of σ and k,and then this method was applied to clustering and detection of MCI patients.To verify the performance of the proposed method,the comparison of the clustering result,classification accuracy using traditional algorithm and Nyström is also done.The comparative experimental results show that the proposed method can get BOLD pattern more accurately,the accuracy of MCI detection is higher than the other two algorithms,and the time and space complexity are less than the traditional algorithm.…”
    Get full text
    Article
  3. 1263

    Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers by S. B. G. Tilak Babu, Ch Srinivasa Rao

    Published 2023-09-01
    “…The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors, such as local ternary pattern, local phase quantization, local Gabor binary pattern histogram sequence, Weber local descriptor, and local monotonic pattern, and classifiers such as optimized support vector machine and optimized NBC. …”
    Get full text
    Article
  4. 1264

    Novel Multimodal Fusion Algorithm for Non-Intrusive Anxiety Detection by Mahir Shadid, Mushfiqus Salehin Afnan, Rashed Mustafa, M. Jamshed Alam Patwary

    Published 2025-03-01
    “…Early detection of anxiety disorders in a non-intrusive manner is crucial, as these conditions can profoundly impact an individual’s health and daily functioning. …”
    Get full text
    Article
  5. 1265

    Early detection of risky spatio-temporal congestion in urban traffic by Shaobo Sui, Dan Xu, Mingyang Bai, Xiaoke Zhang, Zhaojun Mao, Daqing Li

    Published 2025-01-01
    “…However, large-scale congestion in city exhibits an unique spatio-temporal growth pattern. In this article, we develop a detection method for risky congestion based on its spatio-temporal evolution feature, which can detect risky spatio-temporal congestion clusters (SCCs) when they are small. …”
    Get full text
    Article
  6. 1266

    Detecting clusters in spatially repetitive point event data sets by Allan Brimicombe

    Published 2007-07-01
    “…The analysis of point event patterns has a long tradition. The patterns of particular interest are patterns of clustering or ‘hot spots’ and such cluster detection lies at the heart of spatial data mining. …”
    Get full text
    Article
  7. 1267

    An influence of a modulating signal starting phase on the modulation detection by A. P. SĘK, E. B. SKRODZKA

    Published 2015-01-01
    “…Data shown in this paper are consistent with predictions of models based on excitation pattern changes and with a concept according to which AM/FM detection at low modulation rates depends mainly on maximum and minimum values of signal amplitude/frequency. …”
    Get full text
    Article
  8. 1268

    An optimal federated learning-based intrusion detection for IoT environment by A. Karunamurthy, K. Vijayan, Pravin R. Kshirsagar, Kuan Tak Tan

    Published 2025-03-01
    “…Analyzing and detecting intrusions by analyzing diverse attack patterns is complex for machine learning algorithms. …”
    Get full text
    Article
  9. 1269

    Detecting and Analysing Possible Outliers in Global Stock Market Returns by Ali A. Shehadeh, Sadam M. Alwadi, Mohammad I. Almaharmeh

    Published 2022-12-01
    “…We find a sequential pattern in outlier occurrence within individual return series, and a concurrent pattern across stock markets. …”
    Get full text
    Article
  10. 1270
  11. 1271

    MLAD: A Multi-Task Learning Framework for Anomaly Detection by Kunqi Li, Zhiqin Tang, Shuming Liang, Zhidong Li, Bin Liang

    Published 2025-07-01
    “…While existing methods often utilize sequence modeling or graph neural networks to capture global sensor relationships, they typically treat all sensors uniformly—potentially overlooking the benefit of grouping sensors with similar temporal patterns. To this end, we propose a novel framework called Multi-task Learning Anomaly Detection (MLAD), which leverages clustering techniques to group sensors based on their temporal characteristics, and employs a multi-task learning paradigm to jointly capture both shared patterns across all sensors and specialized patterns within each cluster. …”
    Get full text
    Article
  12. 1272

    An Artificial Intelligence QRS Detection Algorithm for Wearable Electrocardiogram Devices by Zihao Li, Wenliang Zhu, Yiheng Xu, Yunbo Guo, Junbo Li, Peng Song, Ying Liang, Binquan You, Lirong Wang

    Published 2025-05-01
    “…It achieves an excellent F1 score of 99.83 on the MITBIHA database and 99.77 on the INCART database, specifically in the inter-patient pattern. In the cross-database pattern, our approach maintains a strong performance with an F1 score of 99.22 on the INCART database and an F1 score of 99.09 on the MITBIHA database. …”
    Get full text
    Article
  13. 1273

    The application and research of machine learning in malicious encrypted traffic detection by Tian Rui, Zhang Yaqin, Dong Wei, Li Zhicheng, Feng Zhi

    Published 2025-04-01
    “…The findings indicate that machine learning significantly improves the accuracy of malicious behavior detection, particularly in complex feature extraction and the identification of new attack patterns.…”
    Get full text
    Article
  14. 1274

    Cooperator and Defector-Based Dynamic Community Detection in Social Networks by Hui Jiang, Chenlin Zhao, Zhexi Guo, Tangyu Wang

    Published 2025-01-01
    “…Dynamic community detection in social networks requires advanced methods to capture the intricate patterns of user interactions. …”
    Get full text
    Article
  15. 1275
  16. 1276

    Financial phishing detection method based on sensitive characteristics of webpage by Xiang-dong HU, Ke LIU, Feng ZHANG, Jia-fu LIN, Jun FU, Zhi-hui GUO

    Published 2017-02-01
    “…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). …”
    Get full text
    Article
  17. 1277

    Enhancing Federated Intrusion Detection with Class-Specific Dynamic Sampling by Sungkwan Youm, Taeyoon Kim

    Published 2025-05-01
    “…Notably, DS-FedIDS excels in detecting minority attack classes and adapting to client-specific normal traffic patterns, making it ideal for real-world intrusion detection scenarios with inherently imbalanced and heterogeneous data distributions.…”
    Get full text
    Article
  18. 1278

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
    Get full text
    Article
  19. 1279

    Research on intrusion detection model based on improved MLP algorithm by Qihao Zhao, Fuwei Wang, Weimin Wang, Tianxin Zhang, Haodong Wu, Weijun Ning

    Published 2025-02-01
    “…The multi-layer perceptron (MLP) offers distinct advantages for intrusion detection, as attack patterns often follow complex, nonlinear relationships. …”
    Get full text
    Article
  20. 1280

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…Anomaly detection methods can identify patterns that are unusual, an indication of malicious activity, or a data security breach. …”
    Get full text
    Article