Showing 1,481 - 1,500 results of 3,033 for search 'data detection learning algorithm', query time: 0.13s Refine Results
  1. 1481

    Integrating near-infrared hyperspectral imaging with machine learning and feature selection: Detecting adulteration of extra-virgin olive oil with lower-grade olive oils and hazeln... by Derick Malavi, Katleen Raes, Sam Van Haute

    Published 2024-01-01
    “…This study applies near-infrared hyperspectral imaging (NIR-HSI) and machine learning (ML) to detect EVOO adulteration with hazelnut, refined olive, and olive pomace oils at various concentrations (1%, 5%, 10%, 20%, 40%, and 100% m/m). …”
    Get full text
    Article
  2. 1482

    Plasma cfDNA multi-omic biomarkers profiling for detection and stratification of gastric carcinoma by Shiyi Song, Xiuli Zhang, Pin Cui, Weihuang He, Jiyuan Zhou, Shubing Wang, Yong Xiong, Shu Xu, Xiaohui Lin, Guozeng Huang, Xiaohua Tan, Qinglong Xu, Yongling Liu, Qingqun Li, Kehua Yuan, Mingji Feng, Hanming Lai, Hui Yang, Shaorong Zhang

    Published 2025-06-01
    “…The multi-omic biomarkers in this study, including fragmentation profile, end motif and genome-wide Copy Number Variations (CNV) of plasma cfDNA, are recently developed means for cancer detection and monitoring. And these biomarkers were extracted from WGS data to build machine learning algorithm based classifiers, prediction models, to discriminate GC patients from healthy individuals, achieving extremely high precision of sensitivity at 94.87% and specificity at 99.35%. …”
    Get full text
    Article
  3. 1483

    Invisible Manipulation: Deep Reinforcement Learning-Enhanced Stealthy Attacks on Battery Energy Management Systems by Qi Xiao, Lidong Song, Jong Ha Woo, Rongxing Hu, Bei Xu, Kai Ye, Ning Lu

    Published 2025-01-01
    “…Our method employs deep reinforcement learning (DRL) to generate synthetic measurements (e.g., battery voltage, current) that mimic real data, bypassing residual-based bad data detection (BDD) and misleading Extended Kalman-filter (EKF) based State-of-Charge (SoC) estimations. …”
    Get full text
    Article
  4. 1484
  5. 1485
  6. 1486
  7. 1487
  8. 1488
  9. 1489

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…The SpamAssassin dataset is used in this study to explore the use of the Naive Bayes (NB) algorithm for spam detection. The algorithm demonstrated high accuracy and efficiency in classifying large-scale text data, achieving an accuracy of 97.74%, a recall rate of 96.60%, and a precision rate of 96.8%, with an F1 score of 0.97. …”
    Get full text
    Article
  10. 1490

    Real-Time Anomaly Detection in IoMT Networks Using Stacking Model and a Healthcare- Specific Dataset by Hadjer Goumidi, Samuel Pierre

    Published 2025-01-01
    “…This study addresses these challenges by proposing a real-time anomaly detection model based on machine learning (ML) techniques, designed to detect and mitigate diverse cyber threats effectively. …”
    Get full text
    Article
  11. 1491
  12. 1492

    Tools for forecasting regional economic growth using big data and business intelligence technologies by Afanasev Kirill, Kalinin Aleksandr

    Published 2025-04-01
    “…The research methodology includes modified machine learning algorithms specifically adapted for regional data analysis, using both structured and unstructured information sources. …”
    Get full text
    Article
  13. 1493
  14. 1494
  15. 1495

    Comparing Machine Learning-Based Crime Hotspots Versus Police Districts: What’s the Best Approach for Crime Forecasting? by Eugenio Cesario, Paolo Lindia, Andrea Vinci

    Published 2025-01-01
    “…This study examines the impact of various partitioning techniques on crime forecasting performance, comparing the traditional static division of the city into police districts with machine learning approaches, specifically density clustering algorithms, for detecting crime hotspots. …”
    Get full text
    Article
  16. 1496
  17. 1497

    Hybrid Naïve Bayes Models for Scam Detection: Comparative Insights From Email and Financial Fraud by Lebede Ngartera, Mahamat Ali Issaka, Saralees Nadarajah

    Published 2025-01-01
    “…This study revisits the Naïve Bayes algorithm—often underestimated in modern cybersecurity—as a core building block for effective scam detection. …”
    Get full text
    Article
  18. 1498

    A model-free method to detect the risk and locate the sources of sub-synchronous oscillations in a large-scale renewable power system by Yufan He, Wenjuan Du, Qiang Fu, H.F. Wang

    Published 2025-04-01
    “…To solve the problem, this study proposes a novel model-free method to detect SSO risk and locate the source. The proposed method applies the deep learning support vector data description and label spreading approaches. …”
    Get full text
    Article
  19. 1499

    Detection of Agricultural Terraces Platforms Using Machine Learning from Orthophotos and LiDAR-Based Digital Terrain Model: A Case Study in Roya Valley of Southeast France by Michael Vincent Tubog, Karine Emsellem, Stephane Bouissou

    Published 2025-04-01
    “…This study aimed to develop a semi-automatic method for detecting and mapping terraced areas using LiDAR and orthophoto data from French repositories, processed with GIS and analyzed through a Support Vector Machine (SVM) classification algorithm. …”
    Get full text
    Article
  20. 1500

    Synthetic Data Generation and Evaluation Techniques for Classifiers in Data Starved Medical Applications by Wan D. Bae, Shayma Alkobaisi, Matthew Horak, Siddheshwari Bankar, Sartaj Bhuvaji, Sungroul Kim, Choon-Sik Park

    Published 2025-01-01
    “…However, prediction models are sensitive to the size and distribution of the data they are trained on. ML algorithms rely heavily on vast quantities of training data to make accurate predictions. …”
    Get full text
    Article