-
1501
Preliminary analysis of acoustic detection of the Red-throated Caracara in northern Costa Rica
Published 2024-09-01“…Advances in automatic acoustic detection have transformed bird ecology, allowing researchers to analyze bird populations using pattern matching algorithms, machine learning, and random forest models. …”
Get full text
Article -
1502
Cyber–Physical System Attack Detection and Isolation: A Takagi–Sugeno Approach
Published 2025-01-01“…This paper presents an approach for designing a generalized dynamic observer (GDO) aimed at detecting and isolating attack patterns that compromise the functionality of cyber–physical systems. …”
Get full text
Article -
1503
An Efficient Algorithm for Small Livestock Object Detection in Unmanned Aerial Vehicle Imagery
Published 2025-06-01Get full text
Article -
1504
Beat-aligned motor synergies and kinematic beat detection in street dance movements
Published 2025-05-01“…Unlike existing methods, our technique accounts for the temporal variability induced by music beats, enabling an accurate representation of dance motion patterns. The extracted motor synergies, capturing both spatial and temporal patterns across motion segments and beat durations, were analyzed to gain insights into motor coordination, consistency, similarity, and variability across different dance genres. …”
Get full text
Article -
1505
Novel Approach in Vegetation Detection Using Multi-Scale Convolutional Neural Network
Published 2024-11-01“…This study explores the potential of a multi-scale convolutional neural network (MSCNN) design for object classification, specifically focusing on vegetation detection. The MSCNN is designed to integrate multi-scale feature extraction and attention mechanisms, enabling the model to capture both fine and coarse vegetation patterns effectively. …”
Get full text
Article -
1506
AI Driven Fraud Detection Models in Financial Networks: A Comprehensive Systematic Review
Published 2025-01-01“…By analyzing vast datasets, AI can uncover hidden fraud patterns and dynamically adapt to emerging threats. …”
Get full text
Article -
1507
Harnessing Large Language Models and Deep Neural Networks for Fake News Detection
Published 2025-04-01“…The spread of fake news threatens trust in both traditional and digital media. Early detection methods, based on linguistic patterns and handcrafted features, struggle to identify more sophisticated misinformation. …”
Get full text
Article -
1508
Detection of Soybean Pod Formation Stage Using Sentinel-1 SAR Data
Published 2025-01-01“…Previous five year data over the same fields showed same pattern of growth and dip, with more accuracy for those years having enough dataset. …”
Get full text
Article -
1509
Novel Spatiotemporal Filter for Dim Point Targets Detection in Infrared Image Sequences
Published 2015-01-01“…Dim point target detection is of great importance in both civil and military fields. …”
Get full text
Article -
1510
A Novel Approach to Detect Malware Based on API Call Sequence Analysis
Published 2015-06-01“…From checking the existence of certain functions or API call sequence patterns matched, we can even detect new unknown malware. …”
Get full text
Article -
1511
Anomaly detection of smart grid stealing network attacks based on deep autoencoder
Published 2024-02-01“…Existing anomaly detectors in AMIs suffer from shallow architectures, which impede their ability to capture temporal correlations and complex patterns in electricity consumption data, thus impact detection performance adversely. …”
Get full text
Article -
1512
Smart Contract Security in Decentralized Finance: Enhancing Vulnerability Detection with Reinforcement Learning
Published 2025-05-01“…The PPO model exhibits more stable and consistent learning patterns and achieves higher overall rewards. This research introduces a machine learning method for enhancing smart contract security, reducing financial risks for users, and contributing to future developments in reinforcement learning applications.…”
Get full text
Article -
1513
Evaluating Robotic Walker Performance: Stability, Responsiveness, and Accuracy in User Movement Detection
Published 2025-05-01“…Findings reveal that the walker successfully distinguishes individual gait patterns and adapts its behavior accordingly, demonstrating its potential for personalized mobility support.…”
Get full text
Article -
1514
Adaptive Toeplitz convolution- enhanced classifier for anomaly detection in ECG big data
Published 2025-03-01“…Abstract The anomaly detection of electrocardiogram (ECG) data is crucial for identifying deviations from normal heart rhythm patterns and providing timely interventions for high-risk patients. …”
Get full text
Article -
1515
Unobtrusive stress detection using wearables: application and challenges in a university setting
Published 2025-08-01“…We identify potential stress patterns by observing elevated waking heart rate (HR) and maximum waking HR, supported by related metrics such as sleep HR, sleep heart rate variability (HRV), activity patterns, and sleep phases.ResultsThe physiological changes align with significant academic and societal events, indicating a strong link to stress.DiscussionOur findings demonstrate the potential of consumer wearables to detect collective changes in stress biomarkers within a cohort using in-the-wild data, i.e., data that is noisy and has gaps. …”
Get full text
Article -
1516
An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion
Published 2025-01-01“…Key metrics such as precision, recall, F1-score, and high ROC-AUC values validate its effectiveness in detecting diverse intrusion patterns and handling various attack scenarios. …”
Get full text
Article -
1517
Graph neural network approach with spatial structure to anomaly detection of network data
Published 2025-04-01“…Abstract Network anomaly detection using graph-structured data is a critical task in data mining and cybersecurity, involving the identification of unusual patterns within a network by analyzing its structure as a graph. …”
Get full text
Article -
1518
Temporal Logical Attention Network for Log-Based Anomaly Detection in Distributed Systems
Published 2024-12-01“…This paper introduces a TLAN (Temporal Logical Attention Network), a novel deep learning framework that integrates temporal sequence modeling with logical dependency analysis for robust anomaly detection in distributed system logs. Our approach makes three key contributions: (1) a temporal logical attention mechanism that explicitly models both time-series patterns and logical dependencies between log events across distributed components, (2) a multi-scale feature extraction module that captures system behaviors at different temporal granularities while preserving causal relationships, and (3) an adaptive threshold strategy that dynamically adjusts detection sensitivity based on system load and component interactions. …”
Get full text
Article -
1519
Data augmentation based multi-view contrastive learning graph anomaly detection
Published 2024-10-01“…However, most existing contrast-based graph anomaly detection methods focused only on node-subgraph contrast patterns, ignoring the fact that the sampled node-subgraph instance pairs contained only the local information of the target node, and at the same time did not take into account the importance of each subgraph to the target node, which led to the lack of global information about the node and the emergence of the problem that the contrast patterns were too generalized. …”
Get full text
Article -
1520
Detecting Keratoconus by Using SVM and Decision Tree Classifiers with the Aid of Image Processing
Published 2019-12-01“…This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. …”
Get full text
Article