Search alternatives:
feature » features (Expand Search)
Showing 1,241 - 1,260 results of 5,605 for search 'Feature detection analysis', query time: 0.21s Refine Results
  1. 1241

    Neurophysiological Approaches to Lie Detection: A Systematic Review by Bewar Neamat Taha, Muhammet Baykara, Talha Burak Alakuş

    Published 2025-05-01
    “…The goal is to summarize commonly used EEG signal processing techniques, feature extraction methods, and classification algorithms, identifying those that yield the highest accuracy in lie detection tasks. …”
    Get full text
    Article
  2. 1242

    Rapid and sensitive melamine detection via paper-based surface-enhanced Raman scattering substrate: Plasma-assisted in situ growth of closely packed gold nanoparticles on cellulose... by Ba-Thong Trinh, Rashida Akter, Hanjun Cho, Oleksii Omelianovych, Kwanghyeon Jo, Hongki Kim, Taejoon Kang, Huu-Quang Nguyen, Jaebeom Lee, Kwanyong Seo, Ho-Suk Choi, Ilsun Yoon

    Published 2025-03-01
    “…The AuNP–cellulose paper not only exhibited a low detection limit (23 nM (2.9 ppb)) for melamine, adulterated in milk, after sample pretreatments but also enabled rapid detection of 0.2 ppm melamine in formula and low-fat milk within 30 s without any pretreatments, with the supports of principal component analysis (PCA) method. …”
    Get full text
    Article
  3. 1243

    Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology by Bin Li, Hai Yin, A-kun Yang, Ai-guo Ouyang

    Published 2022-01-01
    “…The combined terahertz time-domain spectroscopy (THz-TDS) and chemometric technology is used to detect the adulteration of similar substances in Panax notoginseng powder. …”
    Get full text
    Article
  4. 1244

    Novel Immune Microlens Imaging for Detection of Antigen and Antibody by Jiahui Liang, Xiaotian Ye, Jiang He, Jing Liu, Yaoxiong Huang, Feiyue Xing

    Published 2019-01-01
    “…Detection and analysis of antigen-antibody reaction is one of the most critical detection techniques in the fields of medicine, biology, environmental science, and food safety. …”
    Get full text
    Article
  5. 1245

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  6. 1246
  7. 1247

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  8. 1248

    Investigate the Use of Deep Learning in IoT Attack Detection by Mohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar Laimeche

    Published 2025-06-01
    “…This study contributes a comprehensive comparative analysis of deep learning models for IoT security, focusing on the effectiveness of weighted features in improving detection accuracy. …”
    Get full text
    Article
  9. 1249

    Strawberry Disease Detection Using Multispectral UAV Imagery by A. F. Cheshkova, V. S. Riksen

    Published 2025-07-01
    “…The acquired imagery underwent preliminary processing, including orthophotomap generation and extraction of spectral and textural features from the images. (Results and discussion) Analysis of the multispectral data enabled the identification of informative feature sets for distinguishing between healthy and fungus-infected strawberry plants. …”
    Get full text
    Article
  10. 1250

    Toward an Onboard Anomaly Detection and Identification Method for Satellites by Shun Katsube, Hironori Sahara

    Published 2025-01-01
    “…Feature contribution analysis using orthogonal arrays and signal-to-noise ratios was used to enhance explainability, attempting to identify the type and location of detected anomalies. …”
    Get full text
    Article
  11. 1251

    Relationship Between YWHAQ Expression and Clinicopathological Features and Prognosis of Patients with Gastric Adenocarcinoma by Xueqing LIU, Libo YANG, Linhai LI, Ping SHENG, Sicheng LIU, Lihua LI

    Published 2025-05-01
    “…Immunohistochemistry was used to detect the protein expression of YWHAQ in gastric adenocarcinoma tissues. …”
    Get full text
    Article
  12. 1252
  13. 1253

    Circulating Tumor Cells Count and Morphological Features in Breast, Colorectal and Prostate Cancer. by Sjoerd T Ligthart, Frank A W Coumans, Francois-Clement Bidard, Lieke H J Simkens, Cornelis J A Punt, Marco R de Groot, Gerhardt Attard, Johann S de Bono, Jean-Yves Pierga, Leon W M M Terstappen

    Published 2013-01-01
    “…The number of CTC correlated strongest with survival, whereas CTC size, roundness and apoptosis features reached significance in univariate analysis, but not in multivariate analysis. …”
    Get full text
    Article
  14. 1254

    Algorithm for Recognition of Small Air Targets by Trajectory Features in Passive Bistatic Radar by Dao Van Luc, A. A. Konovalov, Le Minh Hoang

    Published 2023-11-01
    “…The results of a comparative analysis of decision-making methods for recognizing small UAVs and birds based on their trajectory features are presented. …”
    Get full text
    Article
  15. 1255
  16. 1256

    Cell-phone origin identification based on spectral features of device self-noise by Anshan PEI, Rangding WANG, Diqun YAN

    Published 2017-01-01
    “…With the widespread availability of cell-phone recording devices and the availability of various powerful and easy-to-use digital media editing software,source cell-phone identification has become a hot topic in multimedia forensics.A novel cell-phone identification method was proposed based on the recorded speech.Firstly,device self-noise (DSN) was considered as the fingerprint of the cell-phone and estimated from the silent segments of the speech.Then,the mean of the noise's spectrum was extracted as the identification.Principal components analysis (PCA) was applied to reduce the feature dimension.Support vector machine (SVM) was adopted as the classifier to determine the source of the detecting speech.Twenty-four popular models of the cell-phones were evaluated in the experiment.The experimental results show that the average identification accuracy and recall of the method can reach up to 99.24% and demonstrate that the self-noise feature has more superior performance than the MFCC feature.…”
    Get full text
    Article
  17. 1257

    Specific Features of the Spread of New Coronavirus Infection (COVID 19) in Orenburg Region by A. S. Pankov, A. G. Korneev, S. Yu. Nosyreva

    Published 2021-07-01
    “…It is necessary to study COVID-19 distribution features among the population of the central Orenburg region administrative districts in June–December 2020.Materials & Methods. …”
    Get full text
    Article
  18. 1258

    Role of EEG as Biomarker in the Early Detection and Classification of Dementia by Noor Kamal Al-Qazzaz, Sawal Hamid Bin MD. Ali, Siti Anom Ahmad, Kalaivani Chellappan, Md. Shabiul Islam, Javier Escudero

    Published 2014-01-01
    “…The early detection and classification of dementia are important clinical support tasks for medical practitioners in customizing patient treatment programs to better manage the development and progression of these diseases. …”
    Get full text
    Article
  19. 1259
  20. 1260

    The biochemical and morphostructural features of biological fluids in patients with rapidly growing uterine myoma by E. G. Shvarev, L. V. Dikareva, A. K. Ayupova, G. E. Shvarev

    Published 2014-08-01
    “…A new procedure has been developed and tested to diagnose rapidly growing UM, including the latter concurrent with endometrial hyperplastic processes, which is based on the comparison of the levels of lipid peroxidation products in the biomolecules in the study biological fluids (endometrial lavages) and on the analysis of their morphostructural features. A mathematical model to calculate uterine volume has been proposed to objectify the estimation of tumor growth rates. …”
    Get full text
    Article