Search alternatives:
feature » features (Expand Search)
Showing 561 - 580 results of 5,605 for search 'Feature detection analysis', query time: 0.22s Refine Results
  1. 561

    Framework for Mapping Sublimation Features on Mars’ South Polar Cap Using Object-Based Image Analysis by Racine D. Cleveland, Vincent F. Chevrier, Jason A. Tullis

    Published 2025-07-01
    “…This study applies object-based image analysis (OBIA) to automate the detection and measurement of SCFs using High-Resolution Imaging Science Experiment (HiRISE) images spanning five Martian years. …”
    Get full text
    Article
  2. 562

    Electrogastrogram-based detection of cybersickness with the application of wavelet transformation and machine learning: A case study by Ilija V. Tanasković, Nenad B. Popović, Jaka J. Sodnik, Sašo J. Tomažič, Nadica S. Miljković

    Published 2025-01-01
    “…The feature selection demonstrates that the root mean square of the amplitude as well as the maximum and mean values of the power spectral density (PSD) calculated on all DWT coefficients, are effective for CS detection while the dominant EGG scale could not indicate CS for any level of decomposition. …”
    Get full text
    Article
  3. 563
  4. 564

    Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques by Yadigar Imamverdiyev, Elshan Baghirov, John Chukwu Ikechukwu

    Published 2025-01-01
    “…The analysis revealed vital features significantly impacting malware detection, such as process services, active services, file handles, registry keys, and callback functions. …”
    Get full text
    Article
  5. 565

    Comparative analysis of data transformation methods for detecting non-technical losses in electricity grids by Maria Gabriel Chuwa, Daniel Ngondya, Rukia Mwifunyi

    Published 2025-09-01
    “…This study explores various methods for transforming energy consumption patterns into two-dimensional (2D) representations to enhance feature extraction and NTL detection. Six encoding techniques for time series data were evaluated: Markov transition fields (MTF), Gramian angular summation field (GASF), Gramian angular difference field (GADF), Recurrence plots (RP), and time–frequency analysis methods, including short-time Fourier transform (STFT) and continuous wavelet transform (CWT). …”
    Get full text
    Article
  6. 566
  7. 567
  8. 568

    Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm by Ayuba John, Ismail Fauzi Bin Isnin, Syed Hamid Hussain Madni, Farkhana Binti Muchtar

    Published 2024-12-01
    “…Principal Component Analysis (PCA) has proven to be a helpful feature selection technique for dimensionality reduction. …”
    Get full text
    Article
  9. 569

    Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets by Arif Rahman, Suprihatin, Imam Riadi, Tawar, Furizal

    Published 2024-12-01
    “…This study examines the keypoint extraction of three well-known SIFT libraries, i.e., David Lowe's implementation, OpenSIFT, and vlSIFT in vlfeat. Performance analysis was conducted on multiclass small-scale image datasets to capture the sensitivity of keypoint detection. …”
    Get full text
    Article
  10. 570

    Research on insider threat detection based on personalized federated learning and behavior log analysis by Xiaoyun Ye, Faqin Luo, Huangrongbin Cui, Jinlong Wang, Xiaoyun Xiong, Wencui Zhang, Jiawei Yu, Wenhao Zhao

    Published 2025-06-01
    “…Traditional methods for detecting insider threats, such as Random Forest and Isolation Forest, suffer from high computational resource consumption, poor feature representation, and sensitivity to noise. …”
    Get full text
    Article
  11. 571

    Characterising Payload Entropy in Packet Flows—Baseline Entropy Analysis for Network Anomaly Detection by Anthony Kenyon, Lipika Deka, David Elizondo

    Published 2024-12-01
    “…Such entropy metrics can be included within feature subsets, thus making the feature set richer for subsequent analysis and machine learning applications.…”
    Get full text
    Article
  12. 572
  13. 573

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…Therefore, Enhanced Grey Wolf Optimization (EGWO) for Feature Selection (FS) is implemented. The function of EGWO is to remove unnecessary features from datasets used for intrusion detection. …”
    Get full text
    Article
  14. 574
  15. 575

    Analysis of Electrodermal Signal Features as Indicators of Cognitive and Emotional Reactions—Comparison of the Effectiveness of Selected Statistical Measures by Marcin Jukiewicz, Joanna Marcinkowska

    Published 2025-05-01
    “…It was also found that some signal features were highly correlated, suggesting the possibility of simplifying the analysis by choosing just one measure from each correlated pair. …”
    Get full text
    Article
  16. 576
  17. 577
  18. 578

    Computed Tomographic Features of Bezoars and Other Gastrointestinal Foreign Bodies in Dogs and Cats: A Comparative Analysis by Jongwon Koo, Kidong Eom, Jaehwan Kim, Jeongyun Jeong, Hongji Yoon, Minsu Lee, Jinsoo Park, Jongmun Cho

    Published 2025-04-01
    “…This study presents a comparative analysis of the computed tomographic (CT), radiographic, and ultrasonographic (US) characteristics of gastrointestinal foreign bodies, including bezoars, in dogs and cats, and evaluates their association with complications and clinical outcomes. …”
    Get full text
    Article
  19. 579

    ALGORITHM OF UNMANNED AERIAL VEHICLES ACOUSTIC SIGNALS DETECTION BASED ON ANALYSIS OF FRACTAL DIMENSION by Leonid M. Artushin, Mykola V. Buhaiov

    Published 2018-08-01
    “…It is established that the values of FD for broadband noise are subordinated to the normal probability density distribution law. An algorithm for detecting of UAV acoustic signals based on the analysis of FD with a constant probability of false alarm is proposed. …”
    Get full text
    Article
  20. 580

    Emoji-Driven Sentiment Analysis for Social Bot Detection with Relational Graph Convolutional Networks by Kaqian Zeng, Zhao Li, Xiujuan Wang

    Published 2025-07-01
    “…To address this gap, we propose ESA-BotRGCN, an emoji-driven multi-modal detection framework that integrates semantic enhancement, sentiment analysis, and multi-dimensional feature modeling. …”
    Get full text
    Article