Showing 1,621 - 1,640 results of 3,033 for search 'data detection learning algorithm', query time: 0.14s Refine Results
  1. 1621

    The role of explainable AI in enhancing breast cancer diagnosis using machine learning and deep learning models by Zulfikar Ali Ansari, Manish Madhava Tripathi, Rafeeq Ahmed

    Published 2025-05-01
    “…Although artificial intelligence (AI) has showed amazing promise in breast cancer prediction mainly machine learning (ML) algorithms as well as deep learning (DL), practical use of these models is greatly hampered by their lack of interpretability and transparency. …”
    Get full text
    Article
  2. 1622

    A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security by Ersin Enes Eryılmaz, Erdal Kılıç, Yankı Ertek, Sedat Akleylek

    Published 2024-06-01
    “…However, these methods inherently contain security vulnerabilities. As deep learning (DL) and machine learning (ML) models have significantly advanced in recent years, they have also begun to be employed in advanced security methods for IoT systems. …”
    Get full text
    Article
  3. 1623

    Algorithm for Cloud Particle Phase Identification Based on Bayesian Random Forest Method by Fu Tao, Yang Zhipeng, Tao Fa, Hu Shuzhen, Lu Yuxiang, Fu Changqing

    Published 2025-01-01
    “…However, the cloud radar detects composite information about multiphase particles and lacks temperature data within cloud layers, leading to significant aliasing of phase state characteristics of cloud particles. …”
    Get full text
    Article
  4. 1624
  5. 1625

    FONDUE—Fine-Tuned Optimization: Nurturing Data Usability & Efficiency by Valerie Restat, Indra Diestelkämper, Meike Klettke, Uta Störl

    Published 2025-05-01
    “…An important aspect of this is data cleaning. Although many different algorithms and tools already exist for data cleaning, an end-to-end data quality solution is still needed. …”
    Get full text
    Article
  6. 1626

    Integrating Ambient In-Home Sensor Data and Electronic Health Record Data for the Prediction of Outcomes in Amyotrophic Lateral Sclerosis: Protocol for an Exploratory Feasibility S... by William E Janes, Noah Marchal, Xing Song, Mihail Popescu, Abu Saleh Mohammad Mosa, Juliana H Earwood, Vovanti Jones, Marjorie Skubic

    Published 2025-03-01
    “…Sensors include bed, gait, and motion sensors. Sensor data are subjected to a multidimensional streaming clustering algorithm to detect changes in health status. …”
    Get full text
    Article
  7. 1627

    Potential Biomarkers for Predicting the Risk of Developing Into Long COVID After COVID‐19 Infection by Zhiyong Hou, Yu Ming, Jun Liu, Zhong Wang

    Published 2025-01-01
    “…Among the 67 candidate genes were processed with machine learning algorithms and logistic regression, a subgroup consisting of CEP55, CDCA2, MELK, and DEPDC1B, was at last identified as potential biomarkers for predicting the risk of the progression into long COVID after COVID‐19 infections. …”
    Get full text
    Article
  8. 1628

    Self-Healing Databases for Emergency Response Logistics in Remote and Infrastructure-Poor Settings by James McGarvey, Martha R. Grabowski, Buddy Custard, Steven Gabelein

    Published 2025-02-01
    “…<i>Results:</i> The self-healing algorithm could be applied to other safety-critical databases that could benefit from technology that automatically detects, diagnoses, and repairs data anomalies and inconsistencies, with or without human intervention. …”
    Get full text
    Article
  9. 1629

    Research on a Panoramic Image Stitching Method for Images of Corn Ears, Based on Video Streaming by Yi Huangfu, Hongming Chen, Zhonghao Huang, Wenfeng Li, Jie Shi, Linlin Yang

    Published 2024-12-01
    “…We plan to continue optimizing the algorithm and more broadly promote its use in fields such as corn breeding and pest and disease detection in an effort to advance the development of agricultural automation technology.…”
    Get full text
    Article
  10. 1630

    iSentenizer-μ: Multilingual Sentence Boundary Detection Model by Derek F. Wong, Lidia S. Chao, Xiaodong Zeng

    Published 2014-01-01
    “…Sentence boundary detection (SBD) system is normally quite sensitive to genres of data that the system is trained on. …”
    Get full text
    Article
  11. 1631

    Assessment of technological capabilities to counter fraudulent practices in the banking sector by A. V. Berdyshev, I. E. Zarkhin, A. A. Katysheva

    Published 2022-11-01
    “…The purpose of the article is to assess the possibility of using machine learning technology by banks and develop an algorithm for detecting fraudulent transactions based on programming. …”
    Get full text
    Article
  12. 1632

    Detection method of LDoS attacks based on combination of ANN & KPCA by Zhijun WU, Liang LIU, Meng YUE

    Published 2018-05-01
    “…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
    Get full text
    Article
  13. 1633

    Automated Global Method to Detect Rapid and Future Urban Areas by Heather S. Sussman, Sarah J. Becker

    Published 2025-05-01
    “…However, methods to detect rapid urbanization are currently absent. Additionally, methods that predict future urban areas often rely on deep learning algorithms, which can be computationally expensive and require a large data volume. …”
    Get full text
    Article
  14. 1634
  15. 1635

    Defect detection in textiles using back propagation neural classifier by Subrata Das, Amitabh Wahi, Suresh Jayaram

    Published 2023-09-01
    “…The artificial neural network algorithms learn from the input data after successful training process, it predicts the nature of the unknown samples in very fast and accurate way. …”
    Get full text
    Article
  16. 1636

    Towards consistently measuring and monitoring habitat condition with airborne laser scanning and unmanned aerial vehicles by W. Daniel Kissling, Yifang Shi, Jinhu Wang, Agata Walicka, Charles George, Jesper E. Moeslund, France Gerard

    Published 2024-12-01
    “…A VRE would also improve data management, metadata standardization, workflow reproducibility, and transferability of structure-from-motion algorithms and machine learning models such as random forests and convolutional neural networks. …”
    Get full text
    Article
  17. 1637

    Enhanced Channel Estimation for RIS-Assisted OTFS Systems by Introducing ELM Network by Mintao Zhang, Zhiying Liu, Li Wang, Wenquan Hu, Chaojin Qing

    Published 2025-05-01
    “…Applying the classic message passing algorithm for data symbol detection, simulation results demonstrate the effectiveness of the proposed method in improving the symbol detection (SD) performance of RIS-assisted OTFS systems. …”
    Get full text
    Article
  18. 1638

    An automated platform to detect, assess, and quantify deterioration in concrete structures by Ibrahim Odeh, Behrouz Shafei

    Published 2025-10-01
    “…The model improved existing architectures by accommodating representative image resolutions and implementing a region-growing algorithm for precise defect quantification. To provide a holistic platform, this study established additional transfer learning and fine-tuning steps. …”
    Get full text
    Article
  19. 1639

    A novel framework for Chinese personal sensitive information detection by Chenglong Ren, Xiao Lan, Xingshu Chen, Yonggang Luo, Shuhua Ruan

    Published 2024-12-01
    “…Additionally, experiments on real data show CPSID has a better detection result than individual methods (rule matching or sequence labelling).…”
    Get full text
    Article
  20. 1640

    Using Anomaly Detection to Search for Technosignatures in Breakthrough Listen Observations by Snir Pardo, Dovi Poznanski, Steve Croft, Andrew P. V. Siemion, Matthew Lebofsky

    Published 2025-01-01
    “…Advances in detection technology have led to an exponential growth in data, necessitating innovative and efficient analysis methods. …”
    Get full text
    Article