-
1721
Machine-Learning-Based Depression Detection Model from Electroencephalograph (EEG) Data Obtained by Consumer-Grade EEG Device
Published 2024-10-01“…At present, a sufficient score has not been achieved.; <b>Methods:</b> To improve the score of depression detection, we quantified various EEG indices to train models such as power spectrum, asymmetry, complexity, and functional connectivity. …”
Get full text
Article -
1722
Early Detection of Alzheimer’s Disease: An Extensive Review of Advancements in Machine Learning Mechanisms Using an Ensemble and Deep Learning Technique
Published 2023-12-01“…The findings of this study contribute significantly to the field of AD diagnoses and pave the way for more precise and efficient early detection strategies.…”
Get full text
Article -
1723
Enhanced framework for credit card fraud detection using robust feature selection and a stacking ensemble model approach
Published 2025-06-01“…With the increase in online payment volumes, conventional fraud detection technologies are increasingly confronted by the complexity of fraudulent strategies that require intelligent and scalable alternatives. …”
Get full text
Article -
1724
Underwater Magnetic Sensors Network
Published 2025-04-01“…This study explores the design and performance of an underwater magnetic sensor network (UMSN) tailored for intrusion detection in complex environments such as riverbeds and areas with dense vegetation. …”
Get full text
Article -
1725
A Scalable Framework for Real-Time Network Security Traffic Analysis and Attack Detection Using Machine and Deep Learning
Published 2025-04-01“…This paper presents an advanced framework for real-time monitoring and analysis of network traffic and endpoint security in large-scale enterprises by addressing the increasing complexity and frequency of cyber-attacks. Our Network Security Traffic Analysis Platform employs a comprehensive technology stack including the Elastic Stack, ZEEK, Osquery, Kafka, and GeoLocation data. …”
Get full text
Article -
1726
FED-GEM-CN: A federated dual-CNN architecture with contrastive cross-attention for maritime radar intrusion detection
Published 2025-09-01“…These findings substantiate the efficacy of the proposed system in delivering robust, energy-efficient, and privacy-aware intrusion detection tailored to the constraints of maritime radar networks. …”
Get full text
Article -
1727
High-resolution accurate mass- mass spectrometry based- untargeted metabolomics: Reproducibility and detection power across data-dependent acquisition, data-independent acquisition...
Published 2025-01-01“…Here, we compare three acquisition modes—Data-Dependent Acquisition (DDA), Data-Independent Acquisition (DIA), and AcquireX —to evaluate performance and reproducibility in detecting low-abundance metabolites in a complex matrix. …”
Get full text
Article -
1728
PerMSCA-YOLO: A Perceptual Multi-Scale Convolutional Attention Enhanced YOLOv8 Model for Rail Defect Detection
Published 2025-03-01“…The innovative contribution of this research lies in its effective strategy for improving detection accuracy and real-time performance through multi-scale feature fusion and deep semantic alignment mechanisms, providing a solution that balances both precision and efficiency for defect detection in complex track environments, with substantial engineering application potential.…”
Get full text
Article -
1729
Enhanced the Trans‐Cleavage Activity of CRISPR‐Cas12a Using Metal‐Organic Frameworks as Stimulants for Efficient Electrochemical Sensing of Circulating Tumor DNA
Published 2025-06-01“…Herein, an electrochemical biosensor based on manganese metal‐organic frameworks (MOFs)‐enhanced CRISPR (MME‐CRISPR) is proposed that enables the efficient detection of circulating tumor DNA (ctDNA). …”
Get full text
Article -
1730
-
1731
BlockDroid: detection of Android malware from images using lightweight convolutional neural network models with ensemble learning and blockchain for mobile devices
Published 2025-05-01“…Because these methods can automatically extract meaningful features from data and efficiently learn complex relationships, they can achieve better performance in malware detection as well as in solving many other problems. …”
Get full text
Article -
1732
Identifying All Matches of a Rigid Object in an Input Image Using Visible Triangles
Published 2025-03-01“…It has been suggested that for objects identifiable by their corners, every triangle formed by these corner points can serve as a reference for detecting other corner points. This approach enables effective rigid object detection, including partial matches. …”
Get full text
Article -
1733
Computationally Enhanced UAV-Based Real-Time Pothole Detection Using YOLOv7-C3ECA-DSA Algorithm
Published 2025-01-01“…Although YOLO-based algorithms have been widely adopted for their speed and efficiency in object detection, achieving a balance between high accuracy and low inference time remains a challenge, particularly in scenarios involving small objects and complex features. …”
Get full text
Article -
1734
Red Raspberry Maturity Detection Based on Multi-Module Optimized YOLOv11n and Its Application in Field and Greenhouse Environments
Published 2025-04-01“…In order to achieve accurate and rapid identification of red raspberry fruits in the complex environments of fields and greenhouses, this study proposes a new red raspberry maturity detection model based on YOLOv11n. …”
Get full text
Article -
1735
IEAM: Integrating Edge Enhancement and Attention Mechanism with Multi-Path Complementary Features for Salient Object Detection in Remote Sensing Images
Published 2025-06-01“…To address these challenges, we integrate edge enhancement and attention mechanisms with multi-path complementary features for salient object detection in remote sensing images (IEAM), aiming to improve salient target accuracy, boundary detection, and memory efficiency. …”
Get full text
Article -
1736
A Low Computational Cost Method for Mobile Malware Detection Using Transfer Learning and Familial Classification Using Topic Modelling
Published 2022-01-01“…In recent times, most researchers and scholars have used deep learning approaches to detect Android malware. Although deep learning techniques provide good accuracy and efficiency, they require high computational cost to train huge and complex data sets. …”
Get full text
Article -
1737
Enhancing Autonomous Truck Navigation in Underground Mines: A Review of 3D Object Detection Systems, Challenges, and Future Trends
Published 2025-06-01“…Integrating autonomous haulage systems into underground mining has revolutionized safety and operational efficiency. However, deploying 3D detection systems for autonomous truck navigation in such an environment faces persistent challenges due to dust, occlusion, complex terrains, and low visibility. …”
Get full text
Article -
1738
Hybrid Naïve Bayes Models for Scam Detection: Comparative Insights From Email and Financial Fraud
Published 2025-01-01“…Online scams continue to escalate in scale and sophistication, ranging from deceptive phishing emails to complex financial fraud schemes. These evolving threats have surpassed the capabilities of traditional detection systems, creating an urgent demand for scalable, real-time, and interpretable machine learning solutions. …”
Get full text
Article -
1739
OculusNet: Detection of retinal diseases using a tailored web-deployed neural network and saliency maps for explainable AI
Published 2025-07-01“…This study introduces OculusNet, an efficient and explainable deep learning (DL) approach for detecting retinal diseases using OCT images. …”
Get full text
Article -
1740
Research on multi-view collaborative detection system for UAV swarms based on Pix2Pix framework and BAM attention mechanism
Published 2025-04-01“…The system is designed to enhance multi-view image generation and detection algorithms, thereby improving the accuracy and efficiency of object detection across varying perspectives. …”
Get full text
Article