-
101
Deep-learning-based detection of underwater fluids in multiple multibeam echosounder data
Published 2025-02-01“…Fluids can be detected in the water column using multibeam echosounder data. …”
Get full text
Article -
102
Electrocardiogram Abnormality Detection Using Machine Learning on Summary Data and Biometric Features
Published 2025-04-01Get full text
Article -
103
Qseek: A data-driven Framework for Automated Earthquake Detection, Localization and Characterization
Published 2025-02-01“… We introduce a data-driven method and software for detecting and locating earthquakes in large seismic datasets. …”
Get full text
Article -
104
Automatic Detection of Interplanetary Coronal Mass Ejections in Solar Wind In Situ Data
Published 2022-10-01“…However, accurate and fast detection still remains a challenge when facing the large amount of data from different instruments. …”
Get full text
Article -
105
Lightweight hybrid transformers-based dyslexia detection using cross-modality data
Published 2025-05-01“…Traditional dyslexia detection (DD) relies on lengthy, subjective, restricted behavioral evaluations and interviews. …”
Get full text
Article -
106
Enhancing Bee Mite Detection with YOLO: The Role of Data Augmentation and Stratified Sampling
Published 2025-06-01“…The model applied data augmentation, and stratified sampling achieved the highest performance, with F1 scores of 97.4% and 96.4% for the detection of bee mites and seven beekeeping-related objects, respectively. …”
Get full text
Article -
107
Vision-Based Activity Recognition for Unobtrusive Monitoring of the Elderly in Care Settings
Published 2025-05-01“…The system integrates a frame differencing algorithm with adjustable sensitivity parameters and an anomaly detection model tailored to identify deviations from individual behavior patterns without relying on large volumes of labeled data. …”
Get full text
Article -
108
Risk Management of Import and Export Products Based on Big Data Analysis: Assessment Model with IndetermSoft Set
Published 2025-05-01“…The integration of big data analytics into risk evaluation processes has revolutionized the ability to detect, assess, and mitigate potential threats across international trade operations. …”
Get full text
Article -
109
Constraining the Mass of a Hypothetical Secondary Black Hole in M87 with the NANOGrav 15 yr Data Set
Published 2025-01-01“…To constrain the mass ratio between the primary SMBH ( M _1 ) and the secondary black hole ( M _2 ) defined as q ≡ M _2 / M _1 ≤ 1, and the length of the semimajor axis of the binary system ( a ), we impose the following three constraints: (i) the lower limit of a , below which the SMBH binary is expected to merge; (ii) the strain amplitude of the gravitational-wave background at nanohertz frequencies shown in the NANOGrav 15 yr data set; and (iii) a finite length of the semimajor axis of M _1 , which can induce periodic behavior in the jet. …”
Get full text
Article -
110
Improved model for intrusion detection in the Internet of Things
Published 2025-07-01“…Abstract The Internet of Things (IoT) includes many devices generating vast amounts of data that need extensive computation. IoT has several definitions, but the most popular refers to multiple devices, objects, and sensors all connecting via a network to exchange data. …”
Get full text
Article -
111
Comparative Analysis of Transformers to Support Fine-Grained Emotion Detection in Short-Text Data
Published 2022-05-01“…To understand the applicability and tradeoffs among common transformers within such contexts, our research investigates accuracy and efficiency considerations in fine-tuning transformers for granular emotion detection in short-text data. This paper presents a comparative study investigating the performance of five common transformers as applied in the specific context of multi-category emotion detection in short-text Twitter data. …”
Get full text
Article -
112
Enhanced Federated Learning Framework based on Deep Learning and Neutrosophic Set for Android Malware Classification
Published 2025-05-01“…Due to the requirement for massive volumes of data aggregation, traditional centralized machine learning (ML) techniques for malware detection face challenges with data sharing, computational complexity, and privacy. …”
Get full text
Article -
113
A Parameter-Free Topological Disassembly-Guided Method for Hyperspectral Target Detection
Published 2025-01-01“…Additionally, properties of point sets in the image-level topology are exploited to accurately quantify feature differences among various objects, further improving detection accuracy and reliability. …”
Get full text
Article -
114
Multi-Modal Feature Set-Based Detection of Freezing of Gait in Parkinson’s Disease Patients Using SVM
Published 2025-01-01“…This work aims to detect FoG using a multi-modal feature set. A publicly available multi-modal dataset was used, comprising data collected from 12 patients using various sensors, including Electroencephalogram (EEG), Electromyography (EMG), tri-axial ACC (accelerometers and gyroscopes), and Skin Conductance (SC) sensors. …”
Get full text
Article -
115
Evaluating model generalization for cow detection in free-stall barn settings: Insights from the COw LOcalization (COLO) dataset
Published 2025-08-01“…This study investigates the generalization capabilities of object detection models for cow detection in indoor free-stall barn settings, focusing on varying training data characteristics such as view angles and lighting, and model complexities. …”
Get full text
Article -
116
Application research of sample data generation based on improved Cycle-GAN in intrusion detection
Published 2025-04-01“…The issue of slow data updates, insufficient data samples for certain intrusion categories, and imbalanced distributions between normal and abnormal data sets in standard intrusion detection data sets have been addressed through both data sample augmentation and detection model optimization. …”
Get full text
Article -
117
Cyber intrusion detection using ensemble of deep learning with prediction scoring based optimized feature sets for IOT networks
Published 2025-12-01“…To address these issues, we propose the Ensemble of Deep Learning Models with Prediction Scoring-based Optimized Feature Sets (EDLM-PSOFS). Our approach begins with data preprocessing utilizing MissForest imputation and label one-hot encoding, effectively managing incomplete and categorical data.For feature selection, we employ the Median-based Shapiro-Wilk test alongside Correlation-Adaptive LASSO Regression (CALR) to ensure robust feature extraction. …”
Get full text
Article -
118
-
119
Leveraging Gradient Noise for Detection and Filtering of Byzantine Clients
Published 2025-01-01“…Distributed Learning enables multiple clients to collaboratively train large models on private, decentralized data. However, this setting faces a significant challenge: real-world datasets are inherently heterogeneous, and the distributed nature of the system makes it vulnerable to Byzantine attacks. …”
Get full text
Article -
120
Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Published 2019-10-01“…The recurrent neural network model is applied to classify the data set of intrusion detection system and normal instances for various subclasses. …”
Get full text
Article