-
361
Integrating Correlation-Based Feature Selection and Clustering for Improved Cardiovascular Disease Diagnosis
Published 2018-01-01“…The obtained effects have been evaluated regarding the number of detected dependencies between parameters. Experiment results showed the advantage of the presented approach compared to other feature selection methods and without using clustering to support statistical inference.…”
Get full text
Article -
362
A New Method for Weak Fault Feature Extraction Based on Improved MED
Published 2018-01-01“…Because of the characteristics of weak signal and strong noise, the low-speed vibration signal fault feature extraction has been a hot spot and difficult problem in the field of equipment fault diagnosis. …”
Get full text
Article -
363
Optimization and Validation of Wafer Surface Defect Detection Algorithm Based on RT-DETR
Published 2025-01-01“…Firstly, a dynamic snake convolutional layer is introduced to detect elongated scratches where conventional convolutional kernels fail to extract features effectively. …”
Get full text
Article -
364
A New Approach for Clustered MCs Classification with Sparse Features Learning and TWSVM
Published 2014-01-01“…We formulate this classification problem as sparse feature learning based classification on behalf of the test samples with a set of training samples, which are also known as a “vocabulary” of visual parts. …”
Get full text
Article -
365
DISEASES OF THE GENITOURINARY SYSTEM IN HIV INFECTION–A NEW PROBLEM OF MODERN UROLOGY
Published 2016-01-01Get full text
Article -
366
Method for extracting ship shaft rate features by fusing acoustic and magnetic field
Published 2025-07-01“…Abstract To address the challenge of detecting small underwater targets, this paper proposes a detection method based on the fusion of acoustic and magnetic fields. …”
Get full text
Article -
367
Features of the development and clinical course of pneumothorax in patients with a new coronavirus infection
Published 2022-10-01“…New coronavirus infection (COVID-19) is a modern global problem that requires the rapid development of diagnostic and treatment methods, as well as the study of pathological effects on body tissues. …”
Get full text
Article -
368
Encrypted malicious traffic detection based on neural network
Published 2025-03-01“…A scalable window self-attention mechanism is designed, and the Transfomer neural network model is used to classify feature maps, achieving efficient detection of malicious traffic.Experimental results show that this method performs well in detection accuracy, recall rate, and model robustness, and provides a feasible solution to the problem of malicious behavior detection in encrypted traffic.…”
Get full text
Article -
369
Improved printed circuit board defect detection scheme
Published 2025-01-01“…Abstract In this paper, an improved printed circuit board(PCB)defect detection scheme named PD-YOLOv8 is proposed, which is specialized in the common and challenging problem of small target recognition in PCB inspection. …”
Get full text
Article -
370
Algorithm for Recognition of Small Air Targets by Trajectory Features in Passive Bistatic Radar
Published 2023-11-01“…Development of an algorithm for recognizing small air targets by trajectory features based on machine learning. Implementation and evaluation of the quality of decision-making methods in a given recognition problem. …”
Get full text
Article -
371
Small target detection algorithm based on SAHI-Improved-YOLOv8 for UAV imagery: A case study of tree pit detection
Published 2025-12-01“…The application of deep learning in tree pit detection of unmanned aerial vehicle (UAV) images has problems such as dense distribution, high density, small size, false detections, missed detections, and high localization error. …”
Get full text
Article -
372
Semantic Features-Based Discourse Analysis Using Deceptive and Real Text Reviews
Published 2023-01-01“…The final results indicate that semantically aware features inspire more confidence to detect deception in text.…”
Get full text
Article -
373
Optical-Theorem-Based Holography for Target Detection and Tracking
Published 2025-03-01“…The development of robust, real-time optical methods for the detection and tracking of particles in complex, multiple-scattering media is a problem of practical importance in a number of fields, including environmental monitoring, air quality assessment, and homeland security. …”
Get full text
Article -
374
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
375
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
376
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
Get full text
Article -
377
Application of deep learning in malware detection: a review
Published 2025-04-01“…Future researchers will benefit from this review by better understanding current deep learning models in the field of malware detection. The review includes common methods such as convolutional neural networks, recurrent neural networks and generative adversarial networks, focusing on feature extraction techniques such as sequence features, image visualization and data enhancement. …”
Get full text
Article -
378
Center-Guided Network with Dynamic Attention for Transmission Tower Detection
Published 2025-04-01“…To address these problems, we propose the Center-Guided network with Dynamic Attention (CGDA) for detecting TTs from aerial images. …”
Get full text
Article -
379
Current Problems of the Forensic Analysis of Handwriting and Signatures Made with Modern Technical Means
Published 2022-08-01Get full text
Article -
380
Application of artificial intelligence in ophthalmology for solving the problem of semantic segmentation of fundus images
Published 2023-10-01“…Basic problems of using the neural network approach in biomedicine are formulated. …”
Get full text
Article