-
441
Online Face Detection and Recognition in a Video Stream
Published 2013-12-01“…In this work a system is designed for Online Face Detection and Recognition depending on multiple algorithms that are: AdaBoost algorithm for the face detection and the two algorithms Principle Component Analysis (PCA) and Linear Discriminate Analysis (LDA) to extract features and use back propagation neural network in recognition. …”
Get full text
Article -
442
Compositional transformations can reasonably introduce phenotype-associated values into sparse features
Published 2025-05-01“…Many transformations, including CLR and other batch-correction methods, are likewise multivariate, and, as these issues demonstrate, each individual feature should be interpreted with caution.IMPORTANCEGihawi et al. claim that finding that a transformation turned highly sparse (mostly zero) features into features that are associated with a phenotype is sufficient to conclude that there is information leakage and to invalidate an analysis. …”
Get full text
Article -
443
Acoustic analysis of voice for detection of speech disorder for amyotrophic lateral sclerosis
Published 2019-06-01“…A method of acoustic signal analysis with sustain vowel phonation for detection of amyotrophic lateral sclerosis (ALS) is considered. …”
Get full text
Article -
444
-
445
Analysis of Facial Cues for Cognitive Decline Detection Using In-the-Wild Data
Published 2025-06-01“…Video-based analysis offers a promising, low-cost alternative to resource-intensive clinical assessments. …”
Get full text
Article -
446
Independent component analysis of oddball EEG recordings to detect Parkinson’s disease
Published 2025-07-01Get full text
Article -
447
Automated Seizure Detection through EEG Analysis and Deep Learning Technique
Published 2024-06-01“…However, one of the challenges of automatic seizure detection using EEG analysis is extracting optimal features that can distinguish between different states of epilepsy. …”
Get full text
Article -
448
Time-frequency analysis and autoencoder approach for network traffic anomaly detection
Published 2025-06-01“…It conducts time- frequency analysis of pre-processed network traffic data such as packet size and duration, extracting meaningful features fed into an autoencoder. …”
Get full text
Article -
449
GNSS-Based Multi-Target RDM Simulation and Detection Performance Analysis
Published 2025-07-01Get full text
Article -
450
Community Detection Framework Using Deep Learning in Social Media Analysis
Published 2024-12-01“…This paper proposes the application of deep learning methods for community detection. Our main idea is to utilize social network topology and social network communication content to construct user features. …”
Get full text
Article -
451
Comparative Analysis of Machine Learning Based Approaches for Face Detection and Recognition
Published 2021-01-01Get full text
Article -
452
Enhancing surface detection: A comprehensive analysis of various YOLO models
Published 2025-02-01“…Complex backgrounds and variations in steel surface images often hinder productivity and quality in industrial environments. Accurate defect detection becomes difficult due to small target size and unclear features. …”
Get full text
Article -
453
Multi-Modal Deep Learning for Lung Cancer Detection Using Attention-Based Inception-ResNet
Published 2025-01-01“…Nevertheless, existing DL models for lung cancer detection suffer from critical limitations, including reliance on single imaging modalities, insufficient datasets, suboptimal feature extraction techniques and constrained generalizability. …”
Get full text
Article -
454
A Distributed Detection Method for Quality-related Faults in Complex Non-stationary Industrial Processes
Published 2024-11-01“…Therefore, this study proposes a new distributed quality-related fault detection method for complex non-stationary industrial processes based on dynamic and static feature fusion. …”
Get full text
Article -
455
Advances in intelligent identification of fiber-optic vibration signals in oil and gas pipelines
Published 2024-12-01Subjects: Get full text
Article -
456
Automatic detection method of software upgrade vulnerability based on network traffic analysis
Published 2020-02-01“…During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.…”
Get full text
Article -
457
Detection of insect-damaged sunflower seeds using near-infrared hyperspectral imaging and machine learning
Published 2025-12-01“…Machine learning techniques, specifically multilayer perceptron (MLP), support vector machine (SVM), random forest (RF), light gradient boosting machine (LGBM), extreme gradient boosting (XGB), gradient boosting (GB), and partial least squares discriminant analysis (PLS-DA), were trained and evaluated based on the spectral features. …”
Get full text
Article -
458
Anomaly distribution acquisition method for probabilistic damage tolerance assessment of hole features
Published 2024-12-01“…The default anomaly distribution of hole features has been established and published in airworthiness advisory circular 33.70-2 based on historical anomaly data collected from cracked or ruptured parts recorded in laboratory analysis reports of the special industries before 2005. …”
Get full text
Article -
459
Multilevel Feature Interaction Network for Remote Sensing Images Semantic Segmentation
Published 2024-01-01“…Notably, this study is the first to address ways to enhance the performance for HSR remote sensing image analysis by iteratively refining features at multilevels for different tasks. …”
Get full text
Article -
460
A Novel Long Short-Term Memory-Based Approach for Microgrid Fault Detection and Classification Using the Wavelet Scattering Transform
Published 2025-01-01“…To address this gap, this study proposes a novel fault detection and classification approach that combines the Wavelet Scattering Transform (WST) for robust feature extraction with a Long Short-Term Memory (LSTM) network for accurate temporal pattern recognition and classification. …”
Get full text
Article