-
681
Research on dust identification and concentration detection method based on machine vision
Published 2025-08-01“…Firstly, a set of simulation experiment platform for collecting and making dust data set is built, and the dust position information data set and dust concentration data set are made respectively. …”
Get full text
Article -
682
Machine Learning-Based Grasshopper Species Classification using Neutrosophic Completed Local Binary Pattern
Published 2024-10-01Get full text
Article -
683
Analysis of plant metabolomics data using identification‐free approaches
Published 2025-07-01“…Additionally, we explore their practical applications in plant science and highlight a set of useful tools to support researchers in analyzing complex plant metabolomics data. …”
Get full text
Article -
684
Smart home environment data across 4 European countrieszenodo
Published 2025-06-01“…The strength of the dataset lies in the variety of sensors including sound pressure and the long period (nearly 1 year) of high frequency measurements in different countries.Collecting data in real-world residential settings is challenging, but by making this dataset publicly available, we provide researchers with a valuable resource to explore smart home applications, presence detection, and environmental monitoring in everyday life.…”
Get full text
Article -
685
Improved YOLOv8-Based Algorithm for Citrus Leaf Disease Detection
Published 2025-01-01“…In order to maintain the randomness of the experimental data, this experiment divided the data set into training set, validation set and test set with a ratio of 7:2:1, which contained 1267 images, 362 images and 181 images respectively. …”
Get full text
Article -
686
Recognition of Human Activities Based on Ambient Audio and Vibration Data
Published 2024-01-01“…This paper presents a distributed multisensor system for the recognition of human activities based on ambient audio and vibration data. The system comprises multiple ambient multisensor nodes (AMSNs) situated within a smart home setting, in conjunction with a data transfer and analysis subsystem. …”
Get full text
Article -
687
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
Get full text
Article -
688
ROASMI: accelerating small molecule identification by repurposing retention data
Published 2025-02-01“…The application of ROASMI to four real-world datasets demonstrates its advantages in distinguishing coexisting isomers with similar fragmentation patterns and in annotating detection peaks without informative spectra. ROASMI is flexible enough to be retrained with user-defined reference sets and is compatible with other MS/MS scorers, making further improvements in small-molecule identification. …”
Get full text
Article -
689
-
690
Depression Recognition Using Daily Wearable-Derived Physiological Data
Published 2025-01-01“…Our results demonstrate the feasibility of using daily wearable-derived physiological data for depression recognition. The achieved classification accuracies suggest that this approach could be integrated into clinical settings for the early detection and monitoring of depressive symptoms. …”
Get full text
Article -
691
Detection of cardiac amyloidosis using machine learning on routine echocardiographic measurements
Published 2024-12-01“…Data was split by patient into a training data set of 2882 studies from 486 patients and a test data set of 721 studies from 150 patients. …”
Get full text
Article -
692
Compositional epistasis detection using a few prototype disease models.
Published 2019-01-01“…We study computational approaches for detecting SNP-SNP interactions that are characterized by a set of "two-locus, two-allele, two-phenotype and complete-penetrance" disease models. …”
Get full text
Article -
693
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01“…Abstract As modern attack methods become more concealed and complex, obtaining many labeled samples in big data streams is difficult. Active learning has long been used to achieve better intrusion detection performance by using only a small number of training samples. …”
Get full text
Article -
694
Solar flares detected by the new narrowband VLF receiver at SANAE IV
Published 2011-09-01Get full text
Article -
695
Offline Detection of Violations in Chinese E-Commerce Live Streaming Content
Published 2025-01-01“…Experimental results show that our two-stage approach achieves superior performance, and that LLM-generated data further boosts the robustness and effectiveness of the violation detection system in offline settings.…”
Get full text
Article -
696
Object Detection Algorithm Based on Feature Enhancement and Anchor-object Matching
Published 2022-06-01“…The mAP of the A-SSD algorithm on the PASCAL VOC data set reached 80.7, and the missed detection rate of the A-SSD algorithm on the workshop pedestrian data set was 3.5%, and the accuracy rate was 91.5%.…”
Get full text
Article -
697
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
698
Workshop Staff Detection Method Based on Spatial Domain Attention Mechanism
Published 2022-04-01“…It is verified on the test set and VOC data set in this paper, and the results show that the positioning effect and detection rate are better.…”
Get full text
Article -
699
-
700
CHANGES IN PHYSICAL AND CHEMICAL PROPERTIES OF ORAL FLUID IN PATIENTS WITH PERIODONTAL DISEASES IN THE SETTINGS OF CHRONIC HEPATITIS C DURING ANTIVIRAL THERAPY
Published 2018-03-01“…Introduction. Published data indicate a significant increase in the prevalence of HCV-infection and high incidence of periodontal lesions in the settings of infection with hepatitis C. …”
Get full text
Article