Showing 101 - 120 results of 4,968 for search 'data set detection', query time: 0.18s Refine Results
  1. 101

    Deep-learning-based detection of underwater fluids in multiple multibeam echosounder data by Tyméa Perret, Gilles Le Chenadec, Arnaud Gaillot, Yoann Ladroit, Stéphanie Dupré

    Published 2025-02-01
    “…Fluids can be detected in the water column using multibeam echosounder data. …”
    Get full text
    Article
  2. 102
  3. 103

    Qseek: A data-driven Framework for Automated Earthquake Detection, Localization and Characterization by Marius Isken, Sebastian Heimann, Peter Niemz, Jannes Münchmeyer, Simone Cesca, Hannes Vasyura-Bathke, Torsten Dahm

    Published 2025-02-01
    “… We introduce a data-driven method and software for detecting and locating earthquakes in large seismic datasets. …”
    Get full text
    Article
  4. 104

    Automatic Detection of Interplanetary Coronal Mass Ejections in Solar Wind In Situ Data by H. T. Rüdisser, A. Windisch, U. V. Amerstorfer, C. Möstl, T. Amerstorfer, R. L. Bailey, M. A. Reiss

    Published 2022-10-01
    “…However, accurate and fast detection still remains a challenge when facing the large amount of data from different instruments. …”
    Get full text
    Article
  5. 105

    Lightweight hybrid transformers-based dyslexia detection using cross-modality data by Abdul Rahaman Wahab Sait, Yazeed Alkhurayyif

    Published 2025-05-01
    “…Traditional dyslexia detection (DD) relies on lengthy, subjective, restricted behavioral evaluations and interviews. …”
    Get full text
    Article
  6. 106

    Enhancing Bee Mite Detection with YOLO: The Role of Data Augmentation and Stratified Sampling by Hong-Gu Lee, Jeong-Yong Shin, Su-Bae Kim, Min-Jee Kim, Moon S. Kim, Hoyoung Lee, Changyeun Mo

    Published 2025-06-01
    “…The model applied data augmentation, and stratified sampling achieved the highest performance, with F1 scores of 97.4% and 96.4% for the detection of bee mites and seven beekeeping-related objects, respectively. …”
    Get full text
    Article
  7. 107

    Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings by Rahmat Ullah, Ikram Asghar, Saeed Akbar, Gareth Evans, Justus Vermaak, Abdulaziz Alblwi, Amna Bamaqa

    Published 2025-05-01
    “…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. …”
    Get full text
    Article
  8. 108

    Risk Management of Import and Export Products Based on Big Data Analysis: Assessment Model with IndetermSoft Set by Ling Chen, Chunpeng Liu

    Published 2025-05-01
    “…The integration of big data analytics into risk evaluation processes has revolutionized the ability to detect, assess, and mitigate potential threats across international trade operations. …”
    Get full text
    Article
  9. 109

    Constraining the Mass of a Hypothetical Secondary Black Hole in M87 with the NANOGrav 15 yr Data Set by Motoki Kino, Masahiro Nagashima, Hyunwook Ro, Yuzhu Cui, Kazuhiro Hada, Jongho Park

    Published 2025-01-01
    “…To constrain the mass ratio between the primary SMBH ( M _1 ) and the secondary black hole ( M _2 ) defined as q ≡ M _2 / M _1 ≤ 1, and the length of the semimajor axis of the binary system ( a ), we impose the following three constraints: (i) the lower limit of a , below which the SMBH binary is expected to merge; (ii) the strain amplitude of the gravitational-wave background at nanohertz frequencies shown in the NANOGrav 15 yr data set; and (iii) a finite length of the semimajor axis of M _1 , which can induce periodic behavior in the jet. …”
    Get full text
    Article
  10. 110

    Improved model for intrusion detection in the Internet of Things by Marina S. Amine, Fayza A. Nada, Khalid M. Hosny

    Published 2025-07-01
    “…Abstract The Internet of Things (IoT) includes many devices generating vast amounts of data that need extensive computation. IoT has several definitions, but the most popular refers to multiple devices, objects, and sensors all connecting via a network to exchange data. …”
    Get full text
    Article
  11. 111

    Comparative Analysis of Transformers to Support Fine-Grained Emotion Detection in Short-Text Data by Robert H. Frye, David C. Wilson

    Published 2022-05-01
    “…To understand the applicability and tradeoffs among common transformers within such contexts, our research investigates accuracy and efficiency considerations in fine-tuning transformers for granular emotion detection in short-text data. This paper presents a comparative study investigating the performance of five common transformers as applied in the specific context of multi-category emotion detection in short-text Twitter data. …”
    Get full text
    Article
  12. 112

    Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification by Mohamed Refaat Abdellah, Hasan H. Oudah, Ahmed Mohamed Ahmed Badawy, Mohamed AbdElFattah AbdElFattah M Hassan, Shady Ahmed Bedier, Ahmed A. Metwaly, Mohamed eassa, Ahmed Abdelhafeez

    Published 2025-05-01
    “…Due to the requirement for massive volumes of data aggregation, traditional centralized machine learning (ML) techniques for malware detection face challenges with data sharing, computational complexity, and privacy. …”
    Get full text
    Article
  13. 113

    A Parameter-Free Topological Disassembly-Guided Method for Hyperspectral Target Detection by Xiaotong Sun, Lina Zhuang, Lianru Gao, Hongmin Gao, Xu Sun, Bing Zhang

    Published 2025-01-01
    “…Additionally, properties of point sets in the image-level topology are exploited to accurately quantify feature differences among various objects, further improving detection accuracy and reliability. …”
    Get full text
    Article
  14. 114

    Multi-Modal Feature Set-Based Detection of Freezing of Gait in Parkinson’s Disease Patients Using SVM by Ghulam Murtaza, Mohammed Hammoud, Andrey Somov

    Published 2025-01-01
    “…This work aims to detect FoG using a multi-modal feature set. A publicly available multi-modal dataset was used, comprising data collected from 12 patients using various sensors, including Electroencephalogram (EEG), Electromyography (EMG), tri-axial ACC (accelerometers and gyroscopes), and Skin Conductance (SC) sensors. …”
    Get full text
    Article
  15. 115

    Evaluating model generalization for cow detection in free-stall barn settings: Insights from the COw LOcalization (COLO) dataset by Mautushi Das, Gonzalo Ferreira, C.P. James Chen

    Published 2025-08-01
    “…This study investigates the generalization capabilities of object detection models for cow detection in indoor free-stall barn settings, focusing on varying training data characteristics such as view angles and lighting, and model complexities. …”
    Get full text
    Article
  16. 116

    Application research of sample data generation based on improved Cycle-GAN in intrusion detection by ZENG Qingpeng, GUO Hangkai

    Published 2025-04-01
    “…The issue of slow data updates, insufficient data samples for certain intrusion categories, and imbalanced distributions between normal and abnormal data sets in standard intrusion detection data sets have been addressed through both data sample augmentation and detection model optimization. …”
    Get full text
    Article
  17. 117

    Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks by Deepesh M. Dhanvijay, Mrinai M. Dhanvijay, Vaishali H. Kamble

    Published 2025-12-01
    “…To address these issues, we propose the Ensemble of Deep Learning Models with Prediction Scoring-based Optimized Feature Sets (EDLM-PSOFS). Our approach begins with data preprocessing utilizing MissForest imputation and label one-hot encoding, effectively managing incomplete and categorical data.For feature selection, we employ the Median-based Shapiro-Wilk test alongside Correlation-Adaptive LASSO Regression (CALR) to ensure robust feature extraction. …”
    Get full text
    Article
  18. 118
  19. 119

    Leveraging Gradient Noise for Detection and Filtering of Byzantine Clients by Latifa Errami, Vyacheslav Kungurtsev, El Houcine Bergou

    Published 2025-01-01
    “…Distributed Learning enables multiple clients to collaboratively train large models on private, decentralized data. However, this setting faces a significant challenge: real-world datasets are inherently heterogeneous, and the distributed nature of the system makes it vulnerable to Byzantine attacks. …”
    Get full text
    Article
  20. 120

    Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system by Parminder Singh, Sujatha Krishnamoorthy, Anand Nayyar, Ashish Kr Luhach, Avinash Kaur

    Published 2019-10-01
    “…The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. …”
    Get full text
    Article