-
441
A Machine Learning-Based Risk Prediction Model During Pregnancy in Low-Resource Settings
Published 2024-11-01Get full text
Article -
442
Forest Fire Detection Using Wireless Sensors and Networks
Published 2022-09-01Get full text
Article -
443
-
444
Efficient Small Object Detection You Only Look Once: A Small Object Detection Algorithm for Aerial Images
Published 2024-11-01“…As a result, object detection in aerial images faces challenges like difficulty in extracting small target information and poor integration of spatial and semantic data. …”
Get full text
Article -
445
Exploring End-to-End object detection with transformers versus YOLOv8 for enhanced citrus fruit detection within trees
Published 2024-12-01“…Our approach employs a data-driven methodology, dividing the dataset into training and testing sets, with rigorous validation to ensure robustness.For DETR, evaluation results demonstrate promising performance across various IoU thresholds, indicating its effectiveness in accurately localizing fruits within bounding boxes. …”
Get full text
Article -
446
The Role of Freehand Transperineal Prostate Biopsy Under Local Anesthesia Without Antibiotics in Outpatient Settings
Published 2024-12-01“…The conclusions suggest that FTPB under LA in an outpatient setting without antibiotics is safe, feasible, and efficient.…”
Get full text
Article -
447
Dissemination of ST101 blaOXA-48 producing Klebsiella pneumoniae at tertiary care setting
Published 2018-06-01Get full text
Article -
448
Prevalence of cervical dysplasia and its relationship with socio-demographic characteristics in a low-resource setting
Published 2025-05-01“…Informed consent was obtained from each participant, and data were collected through structured questionnaires. …”
Get full text
Article -
449
cpop: Detecting Changes in Piecewise-Linear Signals
Published 2024-05-01“… Changepoint detection is an important problem with a wide range of applications. …”
Get full text
Article -
450
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
451
-
452
Voice Detection Using Convolutional Neural Network
Published 2023-04-01“…Unlike the existing modern works related to this area, proposed system was evaluated using a real set of environmental sound data, and not only on filtered or separated voice audio tracks. …”
Get full text
Article -
453
Stochastic List Generator for Iterative MIMO Detection
Published 2025-01-01“…We take note that to develop a low-complexity detector one should first obtain a list of candidate samples of the transmitted data symbols that closely match with the received signal. …”
Get full text
Article -
454
Robustness evaluation of commercial liveness detection platform
Published 2022-02-01“…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
Get full text
Article -
455
Comparing vector and human surveillance strategies to detect arbovirus transmission: A simulation study for Zika virus detection in Puerto Rico.
Published 2019-12-01“…<h4>Objectives</h4>We leveraged a unique set of data from human and virological surveillance in Ae. aegypti during the 2016 ZIKV epidemic in Caguas, Puerto Rico, to compare alternative strategies for detecting and monitoring ZIKV activity.…”
Get full text
Article -
456
-
457
Exploring feature sparsity for out-of-distribution detection
Published 2024-11-01“…Abstract Out-of-distribution (OOD) detection is a crucial problem in practice, especially, for the safe deployment of machine learning models in industrial settings. …”
Get full text
Article -
458
Detection of Crowd concentrations with YOLO V3
Published 2023-10-01“…The obtained results on test data extracted from 2 data sets STCrowd, SmartCity, and our self-collected dataset confirm the feasibility of the proposed method. …”
Get full text
Article -
459
Detection of Crowd concentrations with YOLO V3
Published 2023-10-01“…The obtained results on test data extracted from 2 data sets STCrowd, SmartCity, and our self-collected dataset confirm the feasibility of the proposed method. …”
Get full text
Article -
460