Showing 1,281 - 1,300 results of 8,285 for search '(pattern OR patterns) detection', query time: 0.19s Refine Results
  1. 1281

    Temporal variation in the detection of endangered birds in the Northern Atlantic Forest by Diego M. Lima, Antônio E.B. Alves de Sousa, Helder F. Pereira de Araujo

    Published 2025-03-01
    “…We identified distinct patterns of variation in bird detection. While 10 bird taxa were detected throughout the year, others were detected more frequently during the dry season, or at the onset of the rainy season. …”
    Get full text
    Article
  2. 1282

    XGBoost-Based Detection of DDoS Attacks in Named Data Networking by Liang Liu, Weiqing Yu, Zhijun Wu, Silin Peng

    Published 2025-05-01
    “…In this paper, an attack detection method based on an improved XGBoost is proposed and applied to the hybrid attack pattern of IFA and CPA. …”
    Get full text
    Article
  3. 1283

    EFFECT OF VIEWING ANGLE OF IR THERMOGRAPHY CAMERA FOR THE DETECTION OF LANDMINE by Moustafa M. Kurdi

    Published 2018-10-01
    “…In recent years, a number of studies have tried to overcome these limitations and improve the reliability of this method, using filtering and automatic pattern recognition techniques, specific for the detection of buried objects. …”
    Get full text
    Article
  4. 1284

    Detection-Oriented Evaluation of SAR Dexterous Barrage Jamming Effectiveness by Hai Zhu, Sinong Quan, Shiqi Xing, Haoyu Zhang, Yun Ren

    Published 2025-03-01
    “…The assessment of the jamming effect of Synthetic Aperture Radar (SAR) is the primary means to measure the reliability of the jamming, which can provide important guidance for the use of jamming strategies and patterns. This paper proposes a detection-oriented evaluation of the effect of SAR dexterous barrage jamming. …”
    Get full text
    Article
  5. 1285

    Smart deep learning model for enhanced IoT intrusion detection by Faisal S. Alsubaei

    Published 2025-07-01
    “…This paper addresses these limitations with large preprocessing steps followed by hyperparameter tuning of machine learning XGBoost and deep learning Sequential Neural Network (OSNN) algorithms through Grid Search for their best values to improve multiclass intrusion detection across varied datasets. These deep models were then augmented with a variety of various filters, kernels, activation functions, and regularization techniques in an attempt to boost them in detecting complex, multiclass intrusion patterns. …”
    Get full text
    Article
  6. 1286

    Review of artificial intelligence-based applications for money laundering detection by Seyedmohammad Mousavian, Shah J Miah

    Published 2025-09-01
    “…Since studies of pattern recognition for detecting money laundering have overflowed with various outcomes, effective applications of artificial intelligence (AI) for delivering précised outcomes are still emerging. …”
    Get full text
    Article
  7. 1287

    Sleep Spindles as an Electrographic Element: Description and Automatic Detection Methods by Dorothée Coppieters ’t Wallant, Pierre Maquet, Christophe Phillips

    Published 2016-01-01
    “…Sleep spindle is a peculiar oscillatory brain pattern which has been associated with a number of sleep (isolation from exteroceptive stimuli, memory consolidation) and individual characteristics (intellectual quotient). …”
    Get full text
    Article
  8. 1288

    Metric-based learning approach to botnet detection with small samples by Honggang LIN, Junjing ZHU, Lin CHEN

    Published 2023-10-01
    “…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
    Get full text
    Article
  9. 1289
  10. 1290

    Exploring NAS for anomaly detection in superconducting cavities of particle accelerators by Lynda Boukela, Julien Branlard, Annika Eichler, Annika Eichler

    Published 2025-05-01
    “…This paper presents the solution in which neural architecture search is applied, and elaborates on how visualizing and analyzing the anomaly detection results can provide critical insights for both short-term diagnostics and long-term pattern identification.…”
    Get full text
    Article
  11. 1291

    Defect detection based on extreme edge of defective region histogram by Zouhir Wakaf, Hamid A. Jalab

    Published 2018-01-01
    “…Automatic thresholding has been used by many applications in image processing and pattern recognition systems. Specific attention was given during inspection for quality control purposes in various industries like steel processing and textile manufacturing. …”
    Get full text
    Article
  12. 1292

    Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection by Kenan Kiliç, Kazım Kiliç, İbrahim Alper Doğru, Uğur Özcan

    Published 2025-01-01
    “…The findings show that the most effective features in detecting defective wood are extracted by the Local Binary Pattern (LBP) method and the most effective classifier is the Random Forest Algorithm. …”
    Get full text
    Article
  13. 1293

    Detecting Phantom Data Usage on Smartphones with Analysis of Contextual Information by Shiqi Jiang, Pengfei Zhou, Mo Li

    Published 2015-11-01
    “…Based on the observations that each user preserves specific data usage patterns under particular environmental context, we present PDS, a PDU detection system, which automatically detects whether the current data usage is consumed as expected. …”
    Get full text
    Article
  14. 1294

    Sentinel‐1 Detects Firn Aquifers in the Greenland Ice Sheet by I. Brangers, H. Lievens, C. Miège, M. Demuzere, L. Brucker, G. J. M. De Lannoy

    Published 2020-02-01
    “…Here, we show the ability of satellite radar measurements from Sentinel‐1 to map firn aquifers across all of Greenland at 1 km 2 resolution. The detection of aquifers relies on a delay in the freezing of meltwater within the firn above the water table, causing a distinctive pattern in the radar backscatter. …”
    Get full text
    Article
  15. 1295

    The Extreme Value Support Measure Machine for Group Anomaly Detection by Lixuan An, Bernard De Baets, Stijn Luca

    Published 2025-05-01
    “…Group anomaly detection is a subfield of pattern recognition that aims at detecting anomalous groups rather than individual anomalous points. …”
    Get full text
    Article
  16. 1296

    Modeling an Image Clustering Algorithm For Detecting Overheated Railway Axle by Oleksandr Gertsiy, Serhii Karnatov, Vitaliy Gladish, Valentyna Tkachenko

    Published 2025-07-01
    “…The principles of the proposed algorithm are described in the context of image segmentation and compression, as well as pattern recognition in the transportation domain. …”
    Get full text
    Article
  17. 1297

    Detection Of Sentence Modality On French Automatic Speech-to-text Transcriptions by Luisa Orosanu, Denis Jouvet

    Published 2016-05-01
    “… This article analyzes the detection of sentence modality in French when it is applied on automatic speech-to-text transcriptions. …”
    Get full text
    Article
  18. 1298

    Transforming Weakness into Strength: Improving Unreliable Malware Detection Methods by Pavel Novak, Vaclav Oujezsky

    Published 2024-12-01
    “…Unlike traditional methods reliant on predefined signatures or behavior analysis, this approach dynamically assesses system behaviors, focusing on suspicious actions and interaction patterns. Key contributions include a novel combination of unreliable IoCs with sequence alignment methods, an extensive mapping study of detection techniques, and initial experiments on a dataset of over 19,000 malware samples. …”
    Get full text
    Article
  19. 1299

    A SVM Approach of Aircraft Conflict Detection in Free Flight by Xu-rui Jiang, Xiang-xi Wen, Ming-gong Wu, Ze-kun Wang, Xi Qiu

    Published 2018-01-01
    “…In this article, aircraft conflict detection is considered as a binary classification problem; therefore, it can be solved by a pattern recognition method. …”
    Get full text
    Article
  20. 1300

    A Novel Vision Sensing System for Tomato Quality Detection by Satyam Srivastava, Sachin Boyat, Shashikant Sadistap

    Published 2014-01-01
    “…Various pattern recognition and soft computing techniques have been implemented for data analysis as well as different parameters prediction like shelf life of the tomato, quality index based on disease detection and classification, freshness detection, maturity index detection, and different suggestions for detected diseases. …”
    Get full text
    Article