-
561
Framework for Mapping Sublimation Features on Mars’ South Polar Cap Using Object-Based Image Analysis
Published 2025-07-01“…This study applies object-based image analysis (OBIA) to automate the detection and measurement of SCFs using High-Resolution Imaging Science Experiment (HiRISE) images spanning five Martian years. …”
Get full text
Article -
562
Electrogastrogram-based detection of cybersickness with the application of wavelet transformation and machine learning: A case study
Published 2025-01-01“…The feature selection demonstrates that the root mean square of the amplitude as well as the maximum and mean values of the power spectral density (PSD) calculated on all DWT coefficients, are effective for CS detection while the dominant EGG scale could not indicate CS for any level of decomposition. …”
Get full text
Article -
563
The Problem of Detecting Incitement in Extremist Content (Using Examples from the Internet)
Published 2019-10-01Get full text
Article -
564
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01“…The analysis revealed vital features significantly impacting malware detection, such as process services, active services, file handles, registry keys, and callback functions. …”
Get full text
Article -
565
Comparative analysis of data transformation methods for detecting non-technical losses in electricity grids
Published 2025-09-01“…This study explores various methods for transforming energy consumption patterns into two-dimensional (2D) representations to enhance feature extraction and NTL detection. Six encoding techniques for time series data were evaluated: Markov transition fields (MTF), Gramian angular summation field (GASF), Gramian angular difference field (GADF), Recurrence plots (RP), and time–frequency analysis methods, including short-time Fourier transform (STFT) and continuous wavelet transform (CWT). …”
Get full text
Article -
566
Abnormal events detection using spatio-temporal saliency descriptor and fuzzy representation analysis
Published 2024-11-01Get full text
Article -
567
ALGORITHM FOR complex SMOKE AND FLAME detection based on video surveillance systems data analysis
Published 2019-06-01Get full text
Article -
568
Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm
Published 2024-12-01“…Principal Component Analysis (PCA) has proven to be a helpful feature selection technique for dimensionality reduction. …”
Get full text
Article -
569
Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets
Published 2024-12-01“…This study examines the keypoint extraction of three well-known SIFT libraries, i.e., David Lowe's implementation, OpenSIFT, and vlSIFT in vlfeat. Performance analysis was conducted on multiclass small-scale image datasets to capture the sensitivity of keypoint detection. …”
Get full text
Article -
570
Research on insider threat detection based on personalized federated learning and behavior log analysis
Published 2025-06-01“…Traditional methods for detecting insider threats, such as Random Forest and Isolation Forest, suffer from high computational resource consumption, poor feature representation, and sensitivity to noise. …”
Get full text
Article -
571
Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection
Published 2024-12-01“…Such entropy metrics can be included within feature subsets, thus making the feature set richer for subsequent analysis and machine learning applications.…”
Get full text
Article -
572
A Hybrid Framework for Detection and Analysis of Leaf Blight Using Guava Leaves Imaging
Published 2023-03-01Get full text
Article -
573
Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks
Published 2025-01-01“…Therefore, Enhanced Grey Wolf Optimization (EGWO) for Feature Selection (FS) is implemented. The function of EGWO is to remove unnecessary features from datasets used for intrusion detection. …”
Get full text
Article -
574
Comparative analysis of features phenotype limb-girdle muscular dystrophy 2А and 2I types
Published 2015-02-01Get full text
Article -
575
Analysis of Electrodermal Signal Features as Indicators of Cognitive and Emotional Reactions—Comparison of the Effectiveness of Selected Statistical Measures
Published 2025-05-01“…It was also found that some signal features were highly correlated, suggesting the possibility of simplifying the analysis by choosing just one measure from each correlated pair. …”
Get full text
Article -
576
-
577
Intelligent Recognition of Rock Mass Discontinuities on the Basis of RGB-Enhanced Point Cloud Features
Published 2025-06-01Get full text
Article -
578
Computed Tomographic Features of Bezoars and Other Gastrointestinal Foreign Bodies in Dogs and Cats: A Comparative Analysis
Published 2025-04-01“…This study presents a comparative analysis of the computed tomographic (CT), radiographic, and ultrasonographic (US) characteristics of gastrointestinal foreign bodies, including bezoars, in dogs and cats, and evaluates their association with complications and clinical outcomes. …”
Get full text
Article -
579
ALGORITHM OF UNMANNED AERIAL VEHICLES ACOUSTIC SIGNALS DETECTION BASED ON ANALYSIS OF FRACTAL DIMENSION
Published 2018-08-01“…It is established that the values of FD for broadband noise are subordinated to the normal probability density distribution law. An algorithm for detecting of UAV acoustic signals based on the analysis of FD with a constant probability of false alarm is proposed. …”
Get full text
Article -
580
Emoji-Driven Sentiment Analysis for Social Bot Detection with Relational Graph Convolutional Networks
Published 2025-07-01“…To address this gap, we propose ESA-BotRGCN, an emoji-driven multi-modal detection framework that integrates semantic enhancement, sentiment analysis, and multi-dimensional feature modeling. …”
Get full text
Article