Search alternatives:
feature » features (Expand Search)
Showing 801 - 820 results of 5,605 for search 'Feature detection analysis', query time: 0.22s Refine Results
  1. 801

    Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models by Rijvan Beg, R. K. Pateriya, Deepak Singh Tomar

    Published 2024-01-01
    “…In the evolving cyber threat landscape, one of the most visible and pernicious challenges is malware activity detection and analysis. Traditional detection and analysis methods face threats of data high-dimensionality, lack of strength against adversarial attacks, and non-efficient use of unlabeled data samples. …”
    Get full text
    Article
  2. 802
  3. 803

    An Analysis of Layer-Freezing Strategies for Enhanced Transfer Learning in YOLO Architectures by Andrzej D. Dobrzycki, Ana M. Bernardos, José R. Casar

    Published 2025-08-01
    “…The You Only Look Once (YOLO) architecture is crucial for real-time object detection. However, deploying it in resource-constrained environments such as unmanned aerial vehicles (UAVs) requires efficient transfer learning. …”
    Get full text
    Article
  4. 804
  5. 805
  6. 806

    Analysis of Mini-Camera's Cat-Eye Retro-Reflection for Characterization of Diffraction Rings and Arrayed Spots by Chun Liu, Changming Zhao, Haiyang Zhang, Zilong Zhang, Shuyuan Gao, Yunshi Wang

    Published 2019-01-01
    “…The simulated and experimental results have good similarity in terms of profile shapes and trends with different incident angles and defocus distances. An analysis of the detection conditions and the reflection image features described in this article can thus be applied to hidden camera detection. …”
    Get full text
    Article
  7. 807
  8. 808

    Research on multi dimensional feature extraction and recognition of industrial and mining solid waste images based on mask R-CNN and graph convolutional networks by Shuqin Wang, Na Cheng, Yan Hu

    Published 2025-04-01
    “…The graph structure was input into GCN for high-order feature extraction, where the neighbor information of nodes was aggregated through multi-layer graph convolution to update node features, ultimately fusing the high-order features and primary features output by GCN to obtain multidimensional features for classification, detection, and segmentation tasks, thereby improving the accuracy and efficiency of image analysis. …”
    Get full text
    Article
  9. 809

    Study of anatomy-diagnostic features of leaves of <i>Cynara scolymus</i> L. grown under the conditions of the Kyrgyz Republic by S. C. Chubakova, N. T. Farmanova, N. V. Bobkova, T. A. Mamatov

    Published 2025-06-01
    “….), collected in the flowering phase (June) of 2023, in the Osh region of the Kyrgyz Republic, were used as the object of the study. To detect characteristic external features of artichoke prickly leaves, an external examination of the analytical sample was carried out visually (10 × ). …”
    Get full text
    Article
  10. 810

    GlassBoost: A Lightweight and Explainable Classification Framework for Tabular Datasets by Ehsan Namjoo, Alison N. O’Connor, Jim Buckley, Conor Ryan

    Published 2025-06-01
    “…To evaluate the system, we apply it to an anomaly detection task in the context of intrusion detection systems (IDSs), using a dataset containing traffic features from both malicious and normal activities. …”
    Get full text
    Article
  11. 811
  12. 812
  13. 813

    Clinical profile and molecular genetic analysis of alport syndrome in children: a single center experience by Aqsa Ahmad, Aqsa Ahmad, Liang Lijun, Zhang Yan, Zhang Yan, Ma Yan, Zhao Shuai, Zhao Shuai, Du Wangnan, Du Wangnan

    Published 2024-12-01
    “…Nine different variants were detected, with 3 mutations identified as novel. Two cases underwent histopathological analysis, revealing a thin basement membrane and mild to moderate mesangial proliferation. …”
    Get full text
    Article
  14. 814

    Deep multi-view feature fusion with data augmentation for improved diabetic retinopathy classification by Boualleg Yaakoub, Daouadi Kheir Eddine, Guehairia Oussama, Djeddi Chawki, Cheddad Abbas, Siddiqi Imran, Bouderah Brahim

    Published 2025-02-01
    “…This study introduces a novel framework for DR classification that leverages multi-view deep features, multilinear whitened principal component analysis, tensor exponential discriminant analysis, synthetic minority oversampling technique, and deep random forest. …”
    Get full text
    Article
  15. 815

    A Multicomponent Collaborative Fossil Fuel Power Plants Detection Framework Based on Geographic Analysis in Wide Areas by Ning Li, Min Jing, Wanxuan Geng, Shengkun Dongye, Hui Chen, Chen Ji, Liang Cheng

    Published 2025-01-01
    “…Next, we constructed a comprehensive FFPP dataset, including plants and their components, and trained two separate object detection models for FFPPs and their components. Subsequently, the FFPP model was used to perform coarse detection, followed by the refined detection of primary features (chimneys, square chimneys, and cooling towers) and auxiliary features (substations and storage tanks). …”
    Get full text
    Article
  16. 816

    CREDIT CARD FRAUD DETECTION USING LINEAR DISCRIMINANT ANALYSIS (LDA), RANDOM FOREST, AND BINARY LOGISTIC REGRESSION by Muhammad Ahsan, Tabita Yuni Susanto, Tiza Ayu Virania, Andi Indra Jaya

    Published 2022-12-01
    “…Therefore, pressuring them to continuously advance their fraud detection system is crucial. In this research, we describe fraud detection as a classification issue by comparing three methods. …”
    Get full text
    Article
  17. 817
  18. 818

    Medicare Fraud Detection Using Graph Analysis: A Comparative Study of Machine Learning and Graph Neural Networks by Yeeun Yoo, Jinho Shin, Sunghyon Kyeong

    Published 2023-01-01
    “…This study demonstrates that medicare fraud detection can be significantly enhanced by introducing graph analysis with considering the relationships among medical providers, beneficiaries, and physicians. …”
    Get full text
    Article
  19. 819
  20. 820

    Detection of Malicious Office Open Documents (OOXML) Using Large Language Models: A Static Analysis Approach by Jonas Heß , Kalman Graffi

    Published 2025-06-01
    “…As a supplementary tool to contemporary antivirus software, it is currently able to assist in the analysis of malicious Microsoft Office documents by identifying and summarising potentially malicious indicators with a foundation in evidence, which may prove to be more effective with advancing technology and soon to surpass tailored machine learning algorithms, even without the utilisation of signatures and detection rules. …”
    Get full text
    Article