Showing 1,441 - 1,460 results of 3,033 for search 'data detection learning algorithm', query time: 0.15s Refine Results
  1. 1441

    Enhanced residual attention-based subject-specific network (ErAS-Net): facial expression-based pain classification with multiple attention mechanisms by Mahdi Morsali, Aboozar Ghaffari

    Published 2025-06-01
    “…To further evaluate generalizability, a cross-dataset experiment was conducted using the BioVid Heat Pain Database, where ErAS-Net achieved 78.14% accuracy for binary pain detection on unseen data without fine-tuning. The fact that this finding supports the attention mechanism and human perception is why the proposed model proves to be a powerful and reliable tool for automatic pain detection.…”
    Get full text
    Article
  2. 1442
  3. 1443
  4. 1444

    Machine learning for detection of diffusion abnormalities-related respiratory changes among normal, overweight, and obese individuals based on BMI and pulmonary ventilation paramet... by Xin-Yue Song, Xin-Peng Xie, Wen-Jing Xu, Yu-Jia Cao, Bin-Miao Liang

    Published 2025-07-01
    “…Abstract Background The integration of machine learning (ML) algorithms enables the detection of diffusion abnormalities-related respiratory changes in individuals with normal body mass index (BMI), overweight, and obesity based on BMI and pulmonary ventilation parameters. …”
    Get full text
    Article
  5. 1445
  6. 1446
  7. 1447

    Intrusion Detection System for Network Security Using Novel Adaptive Recurrent Neural Network-Based Fox Optimizer Concept by R. Manivannan, S. Senthilkumar

    Published 2025-02-01
    “…Data normalization is conducted to scale the incoming data into a usable format. …”
    Get full text
    Article
  8. 1448

    AI-Aided Proximity Detection and Location-Dependent Authentication on Mobile-Based Digital Twin Networks: A Case Study of Door Materials by Woojin Park, Hyeyoung An, Yongbin Yim, Soochang Park

    Published 2024-10-01
    “…Such cyber-physical authentication (CPA) with the ITC is built on the dynamic BLE beaconing scheme with accurate proximity detection and dynamic identifier (ID) allocation. To achieve high accuracy in proximity detection, the proposed scheme is conducted using a wide variety of data pre-processing algorithms, machine learning technologies, and ensemble techniques. …”
    Get full text
    Article
  9. 1449
  10. 1450
  11. 1451

    Adaptive ensemble techniques leveraging BERT based models for multilingual hate speech detection in Korean and english by Seohyun Yoo, Eunbae Jeon, Joonseo Hyeon, Jaehyuk Cho

    Published 2025-06-01
    “…Popular machine learning algorithms such as Random Forest, Logistic Regression, Gaussian Naïve Bayes, and Support Vector Machine are employed as meta-learners for PMF. …”
    Get full text
    Article
  12. 1452
  13. 1453

    Hyperparameters optimization of evolving spiking neural network using artificial bee colony for unsupervised anomaly detection by Rehan Rabie, Sahran Shahnorbanun, Alyasseri Zaid Abdi Alkareem, Sani Nor Samsiah, Al-Betar Mohammed Azmi

    Published 2025-07-01
    “…Nowadays, anomaly detection in streaming data has gained considerable attention due to the exponential growth in the data gathered by Internet of Things applications. …”
    Get full text
    Article
  14. 1454
  15. 1455

    Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques by K. Sasikumar, Sivakumar Nagarajan

    Published 2025-01-01
    “…This article introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. …”
    Get full text
    Article
  16. 1456

    SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training by Wanwei Huang, Haobin Tian, Lei Wang, Sunan Wang, Kun Wang, Songze Li

    Published 2025-07-01
    “…Next, the network intrusion detection process is modeled as a Markov decision process and integrated with the Soft Actor-Critic (SAC) reinforcement learning algorithm, with a view to constructing agents; In the context of adversarial training, two agents, designated as the attacker and the defender, are defined to perform asynchronous adversarial training. …”
    Get full text
    Article
  17. 1457

    PROACTIVE APPROACH IN TAX RISK MANAGEMENT: DATA ANALYSIS TECHNIQUES TO IDENTIFY HIGH-RISK TAXPAYERS by Funda KARAKOYUN

    Published 2024-12-01
    “…Although, the work of experts in traditional methods and data analysis in auditing is limited, the effectiveness of data mining methods and the combination of the results obtained with tax scenarios approach the desired accuracy rate in risk detection. …”
    Get full text
    Article
  18. 1458

    YOLOv8n-WSE-Pest: A Lightweight Deep Learning Model Based on YOLOv8n for Pest Identification in Tea Gardens by Hongxu Li, Wenxia Yuan, Yuxin Xia, Zejun Wang, Junjie He, Qiaomei Wang, Shihao Zhang, Limei Li, Fang Yang, Baijuan Wang

    Published 2024-09-01
    “…To enable the intelligent monitoring of pests within tea plantations, this study introduces a novel image recognition algorithm, designated as YOLOv8n-WSE-pest. Taking into account the pest image data collected from organic tea gardens in Yunnan, this study utilizes the YOLOv8n network as a foundation and optimizes the original loss function using WIoU-v3 to achieve dynamic gradient allocation and improve the prediction accuracy. …”
    Get full text
    Article
  19. 1459
  20. 1460

    Quantum key distribution through quantum machine learning: a research review by Krupa Purohit, Ajay Kumar Vyas

    Published 2025-05-01
    “…This review will explore current research gaps and future developments in QKD, security analysis of QKD protocols, and eavesdropping detection by leveraging various QML algorithms.…”
    Get full text
    Article