-
601
Falling Detection of Toddlers Based on Improved YOLOv8 Models
Published 2024-10-01“…The spatial location is compared to the preceding stage’s two centers of mass points, K for the toddler’s body and H for the head. Position status detection is performed on the extracted data. We gathered 230 RGB-captured daily videos of toddlers aged 13 to 30 months playing and experiencing upside-down falls. …”
Get full text
Article -
602
BERT ensemble based MBR framework for android malware detection
Published 2025-04-01“…By using ensemble methods on static data, the MBR framework not only provides a reliable malware detection solution but also presents a novel strategy. …”
Get full text
Article -
603
Overcoming Fairness and Latency Challenges in BBR With an Adaptive Delay Detection
Published 2025-01-01“…In 2016, Google introduced a new congestion control algorithm called Bottleneck Bandwidth and Round-trip propagation time (BBR). BBR aims to set the data-sending rate of flows to operate at an optimal operating point—maximizing throughput, minimizing delay, and reducing packet loss. …”
Get full text
Article -
604
Impact of Lexical Features on Answer Detection Model in Discussion Forums
Published 2021-01-01“…Online forums have become the main source of knowledge over the Internet as data are constantly flooded into them. In most cases, a question in a web forum receives several responses, making it impossible for the question poster to obtain the most suitable answer. …”
Get full text
Article -
605
The characterization of the collimated beams of fast neutrons with the clid detection system
Published 2022-12-01“…The main objective of the Chamber-for-Light-Ion-Detection (CLID) is to produce new differential nuclear data of high interest for the material applications related to fusion and aerospace technologies and to potentially test and validate models of nuclear reactions. …”
Get full text
Article -
606
Surface Ice Detection Using Hyperspectral Imaging and Machine Learning
Published 2025-07-01“…Hyperspectral reflectance data were acquired using a push-broom HSI system under controlled laboratory conditions, with ice and rime ice generated using a thermoelectric cooling setup. …”
Get full text
Article -
607
Enhancing Student Management Through Hybrid Machine Learning and Rough Set Models: A Framework for Positive Learning Environments
Published 2025-01-01“…The model combines classification algorithms with rough set-based decision rules to analyze complex student data, including academic performance, behavior patterns, and levels of engagement. …”
Get full text
Article -
608
Food Waste Detection in Canteen Plates Using YOLOv11
Published 2025-06-01“…To evaluate the performance of the model, we used a real dataset as well as three benchmarking datasets with food plates, in which it could be detected waste. For the real dataset, the system achieved a mean average precision (mAP) of 0.343, a precision of 0.62, and a recall of 0.322 on the test set as well as demonstrating high accuracy in classifying waste considering the traditional evaluation metrics on the benchmarking datasets. …”
Get full text
Article -
609
Temporal variation in the detection of endangered birds in the Northern Atlantic Forest
Published 2025-03-01“…Considering the complete set of species studied, detection correlated negatively with rainfall, with a decrease in detection of bird species two months before the onset of the rainy season, between February and June. …”
Get full text
Article -
610
Sysmon event logs for machine learning-based malware detection
Published 2025-12-01“…Malware poses a significant threat to modern computing environments, necessitating advanced detection techniques that can adapt to evolving attack methods. …”
Get full text
Article -
611
Ensemble Voting for Enhanced Robustness in DarkNet Traffic Detection
Published 2024-01-01Get full text
Article -
612
A hybrid model for detecting motion artifacts in ballistocardiogram signals
Published 2025-07-01“…The data used for this study were collected from patients with sleep apnea using piezoelectric sensors, and the model’s performance was evaluated using a set of predefined metrics. …”
Get full text
Article -
613
Enhancing Anomaly Detection Performance: Deep Learning Models Evaluation
Published 2025-05-01“…Berbeza dengan model canggih lain seperti DenseNet121 dan ResNet50, InceptionV3 mempunyai ketepatan dan kebolehsuaian yang tinggi dalam mengendalikan kebolehubahan yang terdapat dalam set data anomali video. Kajian ini menyumbang kepada peningkatan keselamatan dengan memberi gabungan pengoptimum bersama model yang dipertingkatkan, memajukan pendekatan pengawasan video dan menyediakan sokongan bagi pembangunan sistem pengesanan anomali yang teguh. …”
Get full text
Article -
614
Nursing Students’ Computer Self-Efficacy and Attitudes toward Its Use in The Health Care Setting: A Comparative Study
Published 2024-02-01“…A structured self-administered questionnaire covering sociodemographic data, the pretest for attitudes toward computers in healthcare, and computer self-efficacy scales were the tool used to collect the study data. …”
Get full text
Article -
615
Automatic Detect Incorrect Lifting Posture with the Pose Estimation Model
Published 2025-02-01“…Participants lifted boxes of varying sizes and weights while their movements were recorded from multiple angles and heights to ensure comprehensive data capture. We used the OpenPose algorithm to detect and extract key body points to calculate relevant biomechanical features. …”
Get full text
Article -
616
BlueEdge: application design for big data cleaning processing using mobile edge computing environments
Published 2025-08-01“…Abstract With the rapid growth of the Internet of Things (IoT) and the emergence of big data, handling massive amounts of data has become a major challenge. …”
Get full text
Article -
617
Unmasking the Fake: Machine Learning Approach for Deepfake Voice Detection
Published 2024-01-01“…We present an advanced method for deepfake voice detection, leveraging a custom model named MFCC-GNB XtractNet. …”
Get full text
Article -
618
Network-based intrusion detection using deep learning technique
Published 2025-07-01“…Abstract A high growth rate in network traffic and the complexity of cyber threats have made it necessary to create more effective and flexible intrusion detection systems. Most traditional Network-based Intrusion Detection Systems (NIDS) can become weak at detecting new patterns of attacks due to the use of obsolete data or traditional machine learning models. …”
Get full text
Article -
619
Antimicrobial activity of copper-nickel coated door handles: a blinded, randomized controlled study in a clinical setting
Published 2025-08-01“…Methods: A pilot study was set up in a blinded, randomized controlled design to elucidate the antimicrobial activity of door handles coated with a copper-nickel alloy. …”
Get full text
Article -
620
Genomic dynamics of high-risk carbapenem-resistant Klebsiella pneumoniae clones carrying hypervirulence determinants in Egyptian clinical settings
Published 2024-10-01“…The most prevalent carbapenemase genes detected within the isolates were bla NDM−5 and bla OXA−48 . …”
Get full text
Article