Search alternatives:
feature » features (Expand Search)
Showing 1,821 - 1,840 results of 5,605 for search 'Feature detection analysis', query time: 0.22s Refine Results
  1. 1821

    LAVID: A Lightweight and Autonomous Smart Camera System for Urban Violence Detection and Geolocation by Mohammed Azzakhnini, Houda Saidi, Ahmed Azough, Hamid Tairi, Hassan Qjidaa

    Published 2025-04-01
    “…Due to the advancement of artificial intelligence methods, many automatic video analysis tasks like violence detection have been studied from a research perspective, and are even beginning to be commercialized in industrial solutions. …”
    Get full text
    Article
  2. 1822

    Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data by Naglaa Ibrahim, Hana Usman

    Published 2013-07-01
    “…For rules generation NSL-KDD Data Set is used which include, KDDTrain and KDDTest, 125973 and 22544 records respectively, each record  consists of 41 features and one class attribute for specifying   normal and abnormal connection (complete train and test data are used), In order to get rid of redundancy and inappropriate features Principal  Component Analysis (PCA) is used for selecting (5)  features. …”
    Get full text
    Article
  3. 1823

    Non-Contact Laser Ultrasound Detection of Internal Gas Defects in Lithium-Ion Batteries by Dongxia Tang, Chenguang Xu, Guidong Xu, Sen Cui, Sai Zhang

    Published 2025-03-01
    “…Through both time-domain and frequency-domain analysis of the ultrasonic features, the results demonstrate that the signal amplitude attenuation characteristics of ultrasound in media with acoustic impedance mismatches can be used for precise detection and quantitative characterization of gas defect regions within the battery. …”
    Get full text
    Article
  4. 1824

    Face Detection Method based on Lightweight Network and Weak Semantic Segmentation Attention Mechanism by Xiaoyan Wu

    Published 2022-01-01
    “…K-means++ algorithm is employed to perform clustering analysis on YOLOv4 model prior frames in this paper, and smaller size prior frames are set to capture small face information to solve the missing detection problem of small face targets in scenes. …”
    Get full text
    Article
  5. 1825
  6. 1826

    Incipient Fault Detection of Rolling Element Bearings Based on Deep EMD-PCA Algorithm by Huaitao Shi, Jin Guo, Zhe Yuan, Zhenpeng Liu, Maxiao Hou, Jie Sun

    Published 2020-01-01
    “…Due to the relatively weak early fault characteristics of rolling bearings, the difficulty of early fault detection increases. For unsolving this problem, an incipient fault detection method based on deep empirical mode decomposition and principal component analysis (Deep EMD-PCA) is proposed. …”
    Get full text
    Article
  7. 1827

    Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment by Yan Xin, Xia Feng

    Published 2019-02-01
    “…In terms of semi-supervised support vector machine, we establish a detection model using spatio-temporal trajectories of different identities as input samples, which include features of both conspiracy and non-conspiracy attack scenarios. …”
    Get full text
    Article
  8. 1828

    Review of Modern Forest Fire Detection Techniques: Innovations in Image Processing and Deep Learning by Berk Özel, Muhammad Shahab Alam, Muhammad Umer Khan

    Published 2024-09-01
    “…In this article, we conduct a comprehensive review of articles from 2013 to 2023, exploring how these technologies are applied in fire detection and extinguishing. We delve into modern techniques enabling real-time analysis of the visual data captured by cameras or satellites, facilitating the detection of smoke, flames, and other fire-related cues. …”
    Get full text
    Article
  9. 1829

    Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs by Yan LI, Weizhong QIANG, Zhen LI, Deqing ZOU, Hai JIN

    Published 2023-12-01
    “…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
    Get full text
    Article
  10. 1830

    Abnormal Power Fluctuation Detection of Wind Turbines Based on Subband Processing and Correlation Coefficient by CHEN Gang, HU Kaikai, CHEN Yanan, ZHANG Jiayou, XIONG Wenhao

    Published 2024-04-01
    “…Wind turbine power signals are nonlinear and non-stationary signals, and their abnormal fluctuation Frequencies are uncertain, which makes it difficult to extract and detect abnormal power fluctuation features. This paper proposes a method for detecting abnormal power fluctuations of wind turbine based on subband processing and correlation coefficient. …”
    Get full text
    Article
  11. 1831

    Evaluating YOLO Models for Efficient Crack Detection in Concrete Structures Using Transfer Learning by Muhammad Sohaib, Muzamal Arif, Jong-Myon Kim

    Published 2024-12-01
    “…This work introduces a comprehensive analysis of various YOLO models for detecting cracks in concrete structures, aiming to assist in the selection of an optimal model for future detection and segmentation tasks. …”
    Get full text
    Article
  12. 1832

    Ensemble Computational Intelligent for Insomnia Sleep Stage Detection via the Sleep ECG Signal by Pragati Tripathi, M. A. Ansari, Tapan Kumar Gandhi, Rajat Mehrotra, Md Belal Bin Heyat, Faijan Akhtar, Chiagoziem C. Ukwuoma, Abdullah Y. Muaad, Yasser M. Kadah, Mugahed A. Al-Antari, Jian Ping Li

    Published 2022-01-01
    “…Insomnia is a common sleep disorder in which patients cannot sleep properly. Accurate detection of insomnia disorder is a crucial step for mental disease analysis in the early stages. …”
    Get full text
    Article
  13. 1833

    Harnessing multimodal approaches for depression detection using large language models and facial expressions by Misha Sadeghi, Robert Richer, Bernhard Egger, Lena Schindler-Gmelch, Lydia Helene Rupp, Farnaz Rahimi, Matthias Berking, Bjoern M. Eskofier

    Published 2024-12-01
    “…This study underscores the potential of automated depression detection, showing text-only models as robust and effective while paving the way for multimodal analysis.…”
    Get full text
    Article
  14. 1834

    A Spatio-Temporal Attention Network With Multiframe Information for Infrared Small Target Detection by Donghui Liu, Wenlong Zhang, Zicheng Feng, Xiaoliang Sun, Rui Zhang, Yang Shang

    Published 2025-01-01
    “…Most algorithms focus solely on extracting features from the spatial domain. However, this approach often leads to suboptimal detection performance. …”
    Get full text
    Article
  15. 1835

    Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection by Ilhan Firat Kilincer

    Published 2025-06-01
    “…In the last part of the study, the effect of the features in the CL2-IDS dataset on the classification is interpreted with SHapley Additive exPlanations (SHAP), an Explainable Artificial Intelligence (XAI) method. …”
    Get full text
    Article
  16. 1836

    Advanced Deep Learning Models for Melanoma Diagnosis in Computer-Aided Skin Cancer Detection by Ranpreet Kaur, Hamid GholamHosseini, Maria Lindén

    Published 2025-01-01
    “…An image segmentation network based on deep learning is then used to extract lesion regions for detailed analysis and calculate the optimized classification features. …”
    Get full text
    Article
  17. 1837

    Dielectrophoresis-Enhanced Microfluidic Device with Membrane Filter for Efficient Microparticle Concentration and Optical Detection by Young-Ho Nam, Seung-Ki Lee, Jae-Hyoung Park

    Published 2025-01-01
    “…These results highlight the device’s potential for precise and efficient microparticle concentration and detection.…”
    Get full text
    Article
  18. 1838

    Expanding and Interpreting Financial Statement Fraud Detection Using Supply Chain Knowledge Graphs by Shanshan Zhu, Tengyun Ma, Haotian Wu, Jifan Ren, Daojing He, Yubin Li, Rui Ge

    Published 2025-02-01
    “…These relationships also aid in the assessment and detection of financial fraud. Recent studies employing graph neural networks (GNNs) have demonstrated enhanced detection capabilities by integrating corporate financial features with supply chain relationships, surpassing traditional methods that rely solely on financial features. …”
    Get full text
    Article
  19. 1839

    Streamlined Bearing Fault Detection Using Artificial Intelligence in Permanent Magnet Synchronous Motors by Javier de las Morenas, Lidia M. Belmonte, Rafael Morales

    Published 2025-04-01
    “…However, bearing faults remain a critical issue, necessitating robust fault detection strategies. This paper proposes an edge–fog–cloud architecture for bearing fault detection with a specific focus on implementing an efficient and non-intrusive edge-based solution. …”
    Get full text
    Article
  20. 1840

    Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security by In-Seop Na, Anandakumar Haldorai, Nithesh Naik

    Published 2025-01-01
    “…This approach is commonly employed for spatial extraction of features, permitted the model to detect patterns that may indicate possible attacks. …”
    Get full text
    Article