Showing 321 - 340 results of 4,968 for search 'data set detection', query time: 0.19s Refine Results
  1. 321
  2. 322
  3. 323
  4. 324

    Timeseria: An object-oriented time series processing library by Stefano Alberto Russo, Giuliano Taffoni, Luca Bortolussi

    Published 2025-02-01
    “…Timeseria comes with a comprehensive set of base data structures, data transformations for resampling and aggregation, common data manipulation operations, and extensible models for data reconstruction, forecasting and anomaly detection. …”
    Get full text
    Article
  5. 325
  6. 326

    MED-AGNeT: An attention-guided network of customized augmentation of samples based on conditional diffusion for textile defect detection by Jun Liu, Haolin Li, Hao Liu, Jiuzhen Liang

    Published 2025-12-01
    “…Fabric defect detection plays a vital role in ensuring the production quality of the textile manufacturing industry. …”
    Get full text
    Article
  7. 327

    A comprehensive review of deep learning approaches for rice disease detection: Datasets, methodologies, and future directions by Usman Idris Ismail, Hui Na Chua, Rosdiadee Nordin, Muhammed Kabir Ahmed

    Published 2025-08-01
    “…It also compares popular deep learning architectures, discussing their respective strengths and shortcomings in rice disease detection. Furthermore, it explores the limitations of existing models in terms of real-world deployment, including issues related to data diversity, domain adaptation, and hardware constraints. …”
    Get full text
    Article
  8. 328

    Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments by M. Karthikeyan, R. Brindha, Maria Manuel Vianny, V. Vaitheeshwaran, Mrinal Bachute, Sanket Mishra, Bibhuti Bhusan Dash

    Published 2025-07-01
    “…Despite IoT’s merits, rising cyberthreats and the rapid growth of smart devices increase the risk of data breaches and security attacks. The increasing complexity of cyberattacks demands advanced intrusion detection systems (IDS) to defend crucial assets and data. …”
    Get full text
    Article
  9. 329

    Practical Comparison Between Genetic Algorithm and Clonal Selection Theory on KDD Dataset by Najlaa Aldabagh, Mafaz Khalil

    Published 2010-12-01
    “…The comparison to be done by applying the two models on some records of Knowledge Discovery and Data mining tools which is known by the name KDD data sets (its records the data of the interring packets to the computer system from the internet), to produce population ( in case of GA) or antibodies (in case of CST) can recognize these abnormal records.…”
    Get full text
    Article
  10. 330

    Specific PCR primer designed from genome data for rapid detection of Fusarium oxysporum f. sp. cubense tropical race 4 in the Cavendish banana. by Shunsuke Nozawa, Dan Charlie Joy Pangilinan, G Alvindia Dionisio, Kyoko Watanabe

    Published 2024-01-01
    “…The primers allowed for rapid detection in experimentally diseased tissues. We concluded that this novel primer set enables the simplified diagnosis of fusarium wilt caused by Foc TR4 in bananas.…”
    Get full text
    Article
  11. 331

    DART-Vetter: A Deep Learning Tool for Automatic Triage of Exoplanet Candidates by Stefano Fiscale, Laura Inno, Alessandra Rotundi, Angelo Ciaramella, Alessio Ferone, Christian Magliano, Luca Cacciapuoti, Veselin Kostov, Elisa V. Quintana, Giovanni Covone, Maria Teresa Muscari Tomajoli, Vito Saggese, Luca Tonietti, Antonio Vanzanella, Vincenzo Della Corte

    Published 2025-01-01
    “…We trained and tested DART-Vetter on several data sets of publicly available and homogeneously labelled TESS and Kepler light curves in order to prove the effectiveness of our model. …”
    Get full text
    Article
  12. 332
  13. 333

    A Comprehensive Drift-Adaptive Framework for Sustaining Model Performance in COVID-19 Detection From Dynamic Cough Audio Data: Model Development and Validation by Theofanis Ganitidis, Maria Athanasiou, Konstantinos Mitsis, Konstantia Zarkogianni, Konstantina S Nikita

    Published 2025-06-01
    “… BackgroundThe COVID-19 pandemic has highlighted the need for robust and adaptable diagnostic tools capable of detecting the disease from diverse and continuously evolving data sources. …”
    Get full text
    Article
  14. 334

    Deployable Deep Learning for Cross-Domain Plant Leaf Disease Detection via Ensemble Learning, Knowledge Distillation, and Quantization by Mohammad Junayed Hasan, Suvodeep Mazumdar, Sifat Momen

    Published 2025-01-01
    “…We propose a unified optimization approach integrating ensemble learning, knowledge distillation, and quantization across 24 deep learning architectures for edge-compatible disease detection. Strategic data augmentation and ADASYN-based balancing mitigate the severe 75:1 class imbalance, while systematic hyperparameter tuning optimizes model configurations. …”
    Get full text
    Article
  15. 335

    Uncertainty CNNs: A path to enhanced medical image classification performance by Vasileios E. Papageorgiou, Georgios Petmezas, Pantelis Dogoulis, Maxime Cordy, Nicos Maglaveras

    Published 2025-02-01
    “…The automated detection of tumors using medical imaging data has garnered significant attention over the past decade due to the critical need for early and accurate diagnoses. …”
    Get full text
    Article
  16. 336
  17. 337
  18. 338

    Quantification of tuberculosis exposure in a high-burdened setting by Benjamin Patterson, Sabine Hermans, Robin Wood, Frank Cobelens

    Published 2025-07-01
    “…Abstract Recent studies using sensitive aerosol sampling and detection methodologies, have enumerated aerosolized Mycobacterium tuberculosis (Mtb) across a spectrum of tuberculosis states in a high-burdened setting. …”
    Get full text
    Article
  19. 339

    An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption by Mozamel M. Saeed

    Published 2025-01-01
    “…This study proposes a unified AI-driven cybersecurity framework to detect anomalies, verify data integrity, automate incident response, and ensure long-term cryptographic resilience. …”
    Get full text
    Article
  20. 340