-
1521
PD Detection and Analysis Triggered by Metal Protrusion in GIS Through Various Methods
Published 2025-07-01“…The PRPD patterns, maximum discharge amplitude of different defects and PD inception voltage (PDIV) detected by the three methods were analyzed. …”
Get full text
Article -
1522
A multimodal functional structure-based graph neural network for fatigue detection
Published 2025-10-01“…Fatigue detection remains a critical research focus in the field. …”
Get full text
Article -
1523
Financial Fraud Detection on Social Networks Based on a Data Mining Approach
Published 2022-12-01Get full text
Article -
1524
Opioid Crisis Detection in Social Media Discourse Using Deep Learning Approach
Published 2025-06-01Get full text
Article -
1525
Machine learning algorithms to detect patient–ventilator asynchrony: a feasibility study
Published 2025-05-01“…We explored the feasibility of using machine learning algorithms to replicate the assessment of breathing patterns by experienced clinicians, based on airway flow and pressure signals. …”
Get full text
Article -
1526
Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm
Published 2014-01-01Get full text
Article -
1527
Research on Detection Technology of Wind Turbine Blade AnomalyBased on Audio Data
Published 2021-01-01“…By installing a pickup on the wind turbine, analyzing and mining the collected wind turbine audio data, and based on the multi classification machine learning model, it explores a set of audio data feature analysis and pattern recognition methods. Simulation and practical application results show that this method can identify whether the blade is damaged and whether the cooling fan works, so as to eliminate the interference by the operation of cooling fan on the blade anomaly detection and realize the abnormal detection of blade whistle, so as to form a feasible blade anomaly detection method based on the audio data of wind turbine.…”
Get full text
Article -
1528
Multilevel Feature Fusion-Based GCN for Rumor Detection with Topic Relevance Mining
Published 2023-01-01“…However, existing methods for detecting rumors generally only learn pattern features or text content features from the whole propagation process, which fall short in capturing multilevel features with topic relevance of text content from social media data. …”
Get full text
Article -
1529
Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms
Published 2021-01-01“…We have taken part in this effort, and we proposed an approach mainly based on pattern recognition techniques. The novelty of this approach is that we do not directly tackle the social networks to find these communities. …”
Get full text
Article -
1530
Automatic Detection and Correction of Detuned Singing System for Use With Query-By-Humming Applications
Published 2008-12-01“…The common approach to searching for a requested song basing on the melody retrieved from hummed pattern usually employs the so-called Parsons code or melody contour. …”
Get full text
Article -
1531
Long short‐term memory on abstract syntax tree for SQL injection detection
Published 2021-04-01“…Abstract SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc. are frequently used to prevent such attack. …”
Get full text
Article -
1532
Entropy difference-based EEG channel selection technique for automated detection of ADHD.
Published 2025-01-01“…This paper presents an automated approach for ADHD detection using the proposed entropy difference (EnD)-based encephalogram (EEG) channel selection approach. …”
Get full text
Article -
1533
Database anomaly detection model based on mining object-condition association rules
Published 2009-01-01“…A database anomaly detection model based on mining object-condition association rules(OCAR) was proposed.Through analyzing and formalizing the only maximum conditional expression of SQL statements with WHERE clause, the object-condition association rule sets(OCARS) are mined, which represent normal user patterns.And the OCARS are used in anomaly detection.Additionally, OCARS mining algorithm and anomaly detection algorithm were given, and they could be easily used in anomaly transaction detection mechanism.In the end, the experiments about detecting SQL injection were given, and the performance and application were also analyzed.…”
Get full text
Article -
1534
OUTLIER DETECTION ON HIGH DIMENSIONAL DATA USING MINIMUM VECTOR VARIANCE (MVV)
Published 2022-09-01“…Outliers are part of observations that do not follow the data distribution pattern and are located far from the data center. …”
Get full text
Article -
1535
Of Women, Wine and Salt: Revisioning the Home in Harriet Prescott Spofford’s Detective Fiction
Published 2019-11-01“…The patterns of convergence that can be traced between these three tales highlight Spofford’s vision of the home as a highly unstable ground whose shaky foundations are best reflected through the metaphor of the cellar.…”
Get full text
Article -
1536
Detecting ADHD through natural language processing and stylometric analysis of adolescent narratives
Published 2025-05-01“…This study explores, for the first time, the potential of Natural Language Processing (NLP) and stylometry to identify linguistic markers within Self-Defining Memories (SDMs) of adolescents with ADHD and to evaluate their utility in detecting the disorder. A further novel aspect of this research is the use of SDMs as a linguistic dataset, which reveals meaningful patterns while engaging psychological processes related to identity and memory.MethodOur objectives were to: (1) characterize linguistic features of SDMs in ADHD and control groups; (2) assess the predictive power of stylometry in classifying participants' narratives as belonging to either the ADHD or control group; and (3) conduct a qualitative analysis of key linguistic markers of each group. …”
Get full text
Article -
1537
Integrated Sensor System for Real-Time Monitoring and Detection of Fish Quality and Spoilage
Published 2024-05-01“…The data acquisition system collects and processes information from the sensor array, while the data processing system extracts relevant features for subsequent analysis. A pattern recognition system, employing a robust LDA-XGBoost model, was employed to differentiate between fresh and spoiled fish. …”
Get full text
Article -
1538
Detecting expert’s eye using a multiple-kernel Relevance Vector Machine
Published 2014-04-01“…Decoding mental states from the pattern of neural activity or overt behavior is an intensely pursued goal. …”
Get full text
Article -
1539
CHANGEPOINTS DETECTION OF PANDEMIC WAVE IN REAL-TIME: APPLICATIONS TO THE TRANSMISSION OF COVID-19
Published 2024-10-01“…This article uses two methods to detect changepoints: the Pruned Exact Linear Time (PELT) and the interpolation method. …”
Get full text
Article -
1540
Optimized SPR-PCF sensor for sucrose detection inspired by vertical pupil geometry
Published 2025-08-01“…Abstract In this article, a surface plasmon resonance (SPR) sensor based on photonic crystal fiber (PCF) has been presented for use in detecting the concentration of sucrose solution. This sensor is expertly designed, drawing on the vertical pupil pattern found in the eyes of certain animals to optimize the concentration of the electromagnetic field at the center of the structure. …”
Get full text
Article