Search alternatives:
feature » features (Expand Search)
Showing 1,381 - 1,400 results of 5,605 for search 'Feature detection analysis', query time: 0.21s Refine Results
  1. 1381

    Affordable droplet-based flow analyzer with peristaltic micro-pumps for fluorescent ammonium sensing by Mingtao Sun, Yiyu Jiang, Wenshan Liang, Hui Zeng, Huiwen Chen, Min Zhang

    Published 2024-12-01
    “…The analyzer provides a limit of detection of 0.02 μM (3σ) and an RSD of 0.15 % (n=10, 1 μM ammonium). …”
    Get full text
    Article
  2. 1382
  3. 1383

    Automated Feature Extraction in Brain Tumor by Magnetic Resonance Imaging Using Gaussian Mixture Models by Ahmad Chaddad

    Published 2015-01-01
    “…GMM features demonstrated the best performance by the comparative study using principal component analysis (PCA) and wavelet based features. …”
    Get full text
    Article
  4. 1384

    Identification method for wheel/rail tread defects based on integrated partial convolutional network by CHENG Xiang, HE Jing, ZHANG Changfan, JIA Lin

    Published 2024-09-01
    “…Given the difficulties associated with accurately detecting minor wheelset damages, an enhanced adaptive spatial feature fusion (E-ASFF) detection approach was introduced. …”
    Get full text
    Article
  5. 1385

    Ultrasound super resolution imaging for accurate uterus tumor detection and malignancy prediction by Ashwini Sawant, Sujata Kulkarni, Milind Sawant

    Published 2024-06-01
    “…Enhanced ultrasound images can reach even higher accuracy, cementing them as plausible alternatives to MRI. A comparative analysis of copious relevant image de-speckling, image enhancement, segmentation, and feature extraction methods are carried out. …”
    Get full text
    Article
  6. 1386

    Contactless Detection of pH Change in a Liquid Analyte by Dylan Gustafson, Dominic Klyve

    Published 2025-04-01
    “…Second, the change is detected using a Linear Discriminant Analysis model using values from an inverse Fourier transform of the frequency data as its features. …”
    Get full text
    Article
  7. 1387
  8. 1388

    Deep learning-based edge detection for random natural images by Kanija Muntarina, Rafid Mostafiz, Sumaita Binte Shorif, Mohammad Shorif Uddin

    Published 2025-03-01
    “…Edge detection plays a critical role in computer vision, particularly in the analysis of random natural images. …”
    Get full text
    Article
  9. 1389

    APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION by Qoria Yudi Pratama, Mohammad Isa Irawan

    Published 2025-01-01
    “…CBA integrates the advantages of classification and association analysis, allowing the classification process and a deeper understanding of the strength of the relationship between features in the dataset through the analysis of metrics such as support and confidence. …”
    Get full text
    Article
  10. 1390

    Detecting and Analysing Possible Outliers in Global Stock Market Returns by Ali A. Shehadeh, Sadam M. Alwadi, Mohammad I. Almaharmeh

    Published 2022-12-01
    “…The main objective of the paper is to provide an extensive analysis of the main characteristics, features and effects of the detected outlier returns. …”
    Get full text
    Article
  11. 1391

    Detection Of Sentence Modality On French Automatic Speech-to-text Transcriptions by Luisa Orosanu, Denis Jouvet

    Published 2016-05-01
    “…The classifiers based on linguistic features outperform the classifiers based on prosodic features. …”
    Get full text
    Article
  12. 1392

    BLSTM based night-time wildfire detection from video. by Ahmet K Agirman, Kasim Tasdemir

    Published 2022-01-01
    “…Distinguishing fire from non-fire objects in night videos is problematic if only spatial features are to be used. Those features are highly disrupted under low-lit environments because of several factors, such as the dynamic range limitations of the cameras. …”
    Get full text
    Article
  13. 1393

    Anomaly Detection for MVB Network Based on Logistic Ensemble Learning by Huizhen WANG, Lide WANG, Yueyi YANG, Ping SHEN

    Published 2021-01-01
    “…Multifunction vehicle bus (MVB) has been widely used in rail transit vehicles, but the poor working environment may result in the performance degradation of MVB network, which even endangers the driving safety in serious cases. Based on the analysis of common faults in MVB network, with extracting the network state features from the MVB physical layer and data link layer, an detection method based on heterogeneous Logistic ensemble learning to detect MVB network anomaly and avoid breakdown maintenance to the maximum extent was proposed. …”
    Get full text
    Article
  14. 1394

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  15. 1395

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  16. 1396
  17. 1397

    An Enhanced Image Segmentation Technique-Based on Motion Detection Algorithm by Zaid Sh. Bakr, Hamzah M. Marhoon, Ammar Alaythawy

    Published 2024-12-01
    “… This paper presents a prototype for an intelligent, self-contained theft detection system designed for small-scale applications. …”
    Get full text
    Article
  18. 1398
  19. 1399

    Application of machine learning methods for automated detection of network intrusions by M. V. Babicheva, I. A. Tretyakov

    Published 2023-05-01
    “…To train the models, a sample with signs of normal and abnormal traffic was prepared, and it was thinned and balanced as a result of preliminary statistical analysis. Five machine learning algorithms were selected and tested, both on a training set of features and on a real test set obtained experimentally. …”
    Get full text
    Article
  20. 1400

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…Regarding the challenges of cross-dataset detection, the paper analyzes how differences in feature distributions between datasets lead to the performance degradation of traditional deep learning models in cross-domain applications. …”
    Get full text
    Article