Showing 1,101 - 1,120 results of 3,033 for search 'data detection learning algorithm', query time: 0.22s Refine Results
  1. 1101

    From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context by Sijm H. Noteboom, Eline Kho, Maria Galanty, Clara I. Sánchez, Frans C.P. ten Bookum, Denise P. Veelo, Alexander P.J. Vlaar, Björn J.P. van der Ster

    Published 2025-01-01
    “…Summary: Background: Clinical decision-making is increasingly shifting towards data-driven approaches and requires large databases to develop state-of-the-art algorithms for diagnosing, detecting and predicting diseases. …”
    Get full text
    Article
  2. 1102

    Automatic titration detection method of organic matter content based on machine vision by Bingjie Zhang, Meng Li, Qing Song, Lujian Xu

    Published 2025-07-01
    “…First, by analysing the colour change characteristics during the titration process, machine learning techniques are used to classify the titration speed, and a titration experiment state recognition model is constructed to divide the titration speed into four categories and improve titration efficiency; Second, through a large number of titration experiments to collect relevant data and extract key feature parameters, an efficient titration algorithm based on histogram similarity was designed to accurately identify titration endpoints and improve detection accuracy. …”
    Get full text
    Article
  3. 1103

    Green cover change detection using a modified adaptive ensemble of extreme learning machines for North-Western India by Madhu Khurana, Vikas Saxena

    Published 2021-12-01
    “…Non-availability of standard datasets and limited labeled data points makes it difficult to attain high accuracies in change detection. …”
    Get full text
    Article
  4. 1104

    Detecting of a Patient's Condition From Clinical Narratives Using Natural Language Representation by Thanh-Dung Le, Rita Noumeir, Jerome Rambaud, Guillaume Sans, Philippe Jouvet

    Published 2022-01-01
    “…<italic>Methods:</italic> The methodology consisted of empirical experiments of a learning algorithm to learn the hidden interpretation and presentation of the French clinical note data. …”
    Get full text
    Article
  5. 1105

    BCAST IDS: A Novel Network Intrusion Detection System for Broadcast Networks by Javier Gombao

    Published 2025-01-01
    “…A modern approach to enhancing the capabilities of NIDSs is the use of machine learning (ML) algorithms that predict attacks based on data. …”
    Get full text
    Article
  6. 1106

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article
  7. 1107

    Outlier Detection and Removal in Multivariate Time Series for a More Robust Machine Learning–based Solar Flare Prediction by Junzhi Wen, Azim Ahmadzadeh, Manolis K. Georgoulis, Viacheslav M. Sadykov, Rafal A. Angryk

    Published 2025-01-01
    “…Although various machine learning algorithms have been employed to improve solar flare prediction, there has been limited focus on improving performance using outlier detection. …”
    Get full text
    Article
  8. 1108
  9. 1109

    High Accuracy of Epileptic Seizure Detection Using Tiny Machine Learning Technology for Implantable Closed-Loop Neurostimulation Systems by Evangelia Tsakanika, Vasileios Tsoukas, Athanasios Kakarountas, Vasileios Kokkinos

    Published 2025-03-01
    “…One of its key characteristics is the ability to run machine learning algorithms without the need for high computational complexity and powerful hardware resources. …”
    Get full text
    Article
  10. 1110
  11. 1111
  12. 1112

    Automatic Paddy Planthopper Detection and Counting Using Faster R-CNN by Siti Khairunniza-Bejo, Mohd Firdaus Ibrahim, Marsyita Hanafi, Mahirah Jahari, Fathinul Syahir Ahmad Saad, Mohammad Aufa Mhd Bookeri

    Published 2024-09-01
    “…The datasets were subjected to data augmentation and utilised to train four convolutional object detection models based on transfer learning. …”
    Get full text
    Article
  13. 1113

    Advances in Federated Learning: Applications and Challenges in Smart Building Environments and Beyond by Mohamed Rafik Aymene Berkani, Ammar Chouchane, Yassine Himeur, Abdelmalik Ouamane, Sami Miniaoui, Shadi Atalla, Wathiq Mansoor, Hussain Al-Ahmad

    Published 2025-03-01
    “…Federated Learning (FL) is a transformative decentralized approach in machine learning and deep learning, offering enhanced privacy, scalability, and data security. …”
    Get full text
    Article
  14. 1114

    Nondestructive detection of sweet potato leaf curl virus using 3D laser imaging combined with deep learning by Yican Yang, Nuwan K. Wijewardane, Tyler J. Slonecki, Phillip A. Wadl, Sharon A. Andreason, Jingdao Chen, Lorin Harvey

    Published 2025-08-01
    “…Therefore, there is a need to establish alternative, point-of-care techniques for SPLCV detection. The goal of this study was to investigate the potential of using 3D point cloud data and deep learning to detect SPLCV. …”
    Get full text
    Article
  15. 1115

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Nevertheless, the possibility of FL regarding IoT forensics remains mostly unexplored. Deep learning (DL) focused cyberthreat detection has developed as a powerful and effective approach to identifying abnormal patterns or behaviours in the data field. …”
    Get full text
    Article
  16. 1116

    DeepGenMon: A Novel Framework for Monkeypox Classification Integrating Lightweight Attention-Based Deep Learning and a Genetic Algorithm by Abdulqader M. Almars

    Published 2025-01-01
    “…However, there is still room for improvement to accurately detect and classify monkeypox cases. Furthermore, the currently proposed pre-trained deep learning models can consume extensive resources to achieve accurate detection and classification of monkeypox. …”
    Get full text
    Article
  17. 1117

    Supervised Machine Learning for Real-Time Intrusion Attack Detection in Connected and Autonomous Vehicles: A Security Paradigm Shift by Ahmad Aloqaily, Emad E. Abdallah, Hiba AbuZaid, Alaa E. Abdallah, Malak Al-hassan

    Published 2025-01-01
    “…To accurately distinguish between benign and malicious messages, this study employed seven distinct supervised machine-learning algorithms for data classification. The selected algorithms encompassed Decision Trees, Random Forests, Naive Bayes, Logistic Regression, XG Boost, LightGBM, and Multi-layer Perceptrons. …”
    Get full text
    Article
  18. 1118

    Enhanced Fault Detection in Satellite Attitude Control Systems Using LSTM-Based Deep Learning and Redundant Reaction Wheels by Sajad Saraygord Afshari

    Published 2024-11-01
    “…In light of this, we introduce a fault detection methodology grounded in deep learning techniques specifically designed for satellite attitude control systems. …”
    Get full text
    Article
  19. 1119
  20. 1120

    WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram, Muhammad Awais Azam

    Published 2024-12-01
    “…False and disregarded alarms are a common problem for traditional IDSs in high-bandwidth and large-scale network systems. While applying learning techniques to intrusion detection, researchers are facing challenges mainly due to the imbalanced training sets and the high dimensionality of datasets, resulting from the scarcity of attack data and longer training periods, respectively. …”
    Get full text
    Article