Showing 1,601 - 1,620 results of 4,968 for search 'data set detection', query time: 0.17s Refine Results
  1. 1601

    Non-Destructive Detection of Chilled Mutton Freshness Using a Dual-Branch Hierarchical Spectral Feature-Aware Network by Jixiang E, Chengjun Zhai, Xinhua Jiang, Ziyang Xu, Muqiu Wudan, Danyang Li

    Published 2025-04-01
    “…Although hyperspectral data can effectively capture changes in mutton freshness, sparse raw spectra require optimal data processing strategies to minimize redundancy. …”
    Get full text
    Article
  2. 1602

    Photon-Counting Underwater Wireless Optical Communication by Recovering Clock and Data From Discrete Single Photon Pulses by Qiurong Yan, Zihang Li, Zhu Hong, Ting Zhan, Yuhao Wang

    Published 2019-01-01
    “…To realize a long-distance underwater communication by using low-cost light emitting diode (LED) and single photon avalanche diode (SPAD), we proposed a method for recovering clock and data directly from discrete random pulse sequences output by SPAD. …”
    Get full text
    Article
  3. 1603

    Private sensors and crowdsourced rainfall data: Accuracy and potential for modelling pluvial flooding in urban areas of Oslo, Norway by Kay Khaing Kyaw, Emma Baietti, Cristian Lussana, Valerio Luzzi, Paolo Mazzoli, Stefano Bagli, Attilio Castellarin

    Published 2024-12-01
    “…We also explored the potential use of private rain gauge data in inundation models. Our results indicate that private sensors have excellent rain detection capabilities, but they tend to underestimate the reference value on average by approximately 25%. …”
    Get full text
    Article
  4. 1604
  5. 1605

    Deep Learning‐Based 3D Microseismic Event Direct Location Using Simultaneous Surface and Borehole Data by Yuanyuan Yang, Omar M. Saad, Tariq Alkhalifah

    Published 2024-12-01
    “…The proposed method, based on distinct feature extraction blocks for the surface and borehole data, has potent compatibility for embracing diverse data sets. …”
    Get full text
    Article
  6. 1606

    High-Knee-Flexion Posture Recognition Using Multi-Dimensional Dynamic Time Warping on Inertial Sensor Data by Annemarie F. Laudanski, Arne Küderle, Felix Kluge, Bjoern M. Eskofier, Stacey M. Acker

    Published 2025-02-01
    “…The objective of this study was to develop a sensor-based framework for the detection and measurement of high-flexion postures frequently adopted in occupational settings. …”
    Get full text
    Article
  7. 1607

    Detection of primary malignancy and metastases with FDG PET/CT in patients with cholangiocarcinomas: Lesion-based comparison with contrast enhanced CT by Youssef Elias, Aladin Mariano, Yang Lu

    Published 2016-07-01
    “…Six patients had paired pretreatment tests, and FDG PET/CT results changed planned management in three patients. Our data suggest that FDG PET/CT detect more primary and metastatic lesions and lead to considerable changes in treatment plan in comparison with CECT.…”
    Get full text
    Article
  8. 1608

    Factors influencing performance of internet-based biosurveillance systems used in epidemic intelligence for early detection of infectious diseases outbreaks. by Philippe Barboza, Laetitia Vaillant, Yann Le Strat, David M Hartley, Noele P Nelson, Abla Mawudeku, Lawrence C Madoff, Jens P Linge, Nigel Collier, John S Brownstein, Pascal Astagneau

    Published 2014-01-01
    “…Crude detection rates (C-DR), crude sensitivity rates (C-Se) and intrinsic sensitivity rates (I-Se) were calculated from multivariable regressions to evaluate the systems' performance (events detected compared to the gold-standard) 472 raw signals (Internet disease reports) related to the 86 events included in the gold-standard data set were retrieved from the six systems. 84 events were detected before their publication in the gold-standard. …”
    Get full text
    Article
  9. 1609
  10. 1610

    Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection by Rodrigo Eduardo Arevalo-Ancona, Manuel Cedillo-Hernandez

    Published 2025-06-01
    “…This paper presents a robust multitask zero-watermarking scheme for ownership authentication, auxiliary information embedding, and tamper detection using a dual-branch neural network. The proposed method generates three zero-watermarking codes stored in a three-layer structure, where each layer corresponds to a different type of watermark: a binary logo for ownership authentication, a QR code for auxiliary data, and a halftone version of the original image for tamper detection. …”
    Get full text
    Article
  11. 1611

    Low-Power Portable System for Power Grid Foreign Object Detection Based on the Lightweight Model of Improved YOLOv7 by Yonghuan He, Rong Wu, Chao Dang

    Published 2025-01-01
    “…Furthermore, a professional power grid foreign object detection data set is proposed, and the proposed model is experimentally verified on the dataset. …”
    Get full text
    Article
  12. 1612

    Deep normative modelling reveals insights into early-stage Alzheimer's disease using multi-modal neuroimaging data by Ana Lawry Aguila, Luigi Lorenzini, Mohammed Janahi, Frederik Barkhof, Andre Altmann

    Published 2025-05-01
    “…We calculated deviations, relative to the healthy population, in multi-modal MRI data of non-demented individuals in the external EPAD (ep-ad.org) cohort and explored these deviations with the aim of determining whether normative modelling could detect AD-relevant subtle differences between individuals. …”
    Get full text
    Article
  13. 1613

    Identification of microsatellite loci according to BAC sequencing data and their physical mapping to the bread wheat 5B chromosome by M. A. Nesterov, D. A. Afonnikov, E. M. Sergeeva, L. A. Miroshnichenko, M. K. Bragina, A. O. Bragin, G. V. Vasiliev, E. A. Salina

    Published 2016-01-01
    “…Thus, 21 markers specific for chromosome 5B were detected. Eight of these markers were mapped to the distal region of this chromosome (bin 5BS6) using a set of Chinese Spring deletion lines for 5BS. …”
    Get full text
    Article
  14. 1614

    Sensitive and specific peak detection for SELDI-TOF mass spectrometry using a wavelet/neural-network based approach. by Vincent A Emanuele, Gitika Panicker, Brian M Gurbaxani, Jin-Mann S Lin, Elizabeth R Unger

    Published 2012-01-01
    “…The new method was applied to data collected from a study of cervical mucus for the early detection of cervical cancer in HPV infected women. …”
    Get full text
    Article
  15. 1615

    3D Buildings Change Detection from Aerial and Satellite Stereo Imagery Using Kullback–Leibler Divergence Algorithm by Sitav H. Abdullah, Haval A. Sadeq, Dleen M. Salih

    Published 2023-06-01
    “…Two DSMs have been obtained through the photogrammetric process using two different sensors. The first data set is based on the stereo aerial imagery captured in 2012 and the second stereo is from the worldview-2 sensor captured in 2017. …”
    Get full text
    Article
  16. 1616

    Performance and limitations of linkage-disequilibrium-based methods for inferring the genomic landscape of recombination and detecting hotspots: a simulation study by Raynaud, Marie, Gagnaire, Pierre-Alexandre, Galtier, Nicolas

    Published 2023-03-01
    “…Population genomic approaches offer an attractive way to infer the population-scaled recombination rate ρ=4Ner using the linkage disequilibrium information contained in DNA sequence polymorphism data. Such methods have been used in a broad range of plant and animal species to build genome-wide recombination maps. …”
    Get full text
    Article
  17. 1617
  18. 1618
  19. 1619

    Decision Support System (DSS) for Fraud Detection in Health Insurance Claims Using Genetic Support Vector Machines (GSVMs) by Robert A. Sowah, Marcellinus Kuuboore, Abdul Ofoli, Samuel Kwofie, Louis Asiedu, Koudjo M. Koumadi, Kwaku O. Apeadu

    Published 2019-01-01
    “…Genetic support vector machines (GSVMs), a novel hybridized data mining and statistical machine learning tool, which provide a set of sophisticated algorithms for the automatic detection of fraudulent claims in these health insurance databases are used. …”
    Get full text
    Article
  20. 1620

    Whale Optimization Algorithm-Enhanced Long Short-Term Memory Classifier with Novel Wrapped Feature Selection for Intrusion Detection by Haider AL-Husseini, Mohammad Mehdi Hosseini, Ahmad Yousofi, Murtadha A. Alazzawi

    Published 2024-11-01
    “…Traditional methods often struggle with high-dimensional data and the need for real-time detection. This paper proposes a comprehensive intrusion detection method utilizing a novel wrapped feature selection approach combined with a long short-term memory classifier optimized with the whale optimization algorithm to address these challenges effectively. …”
    Get full text
    Article