Suggested Topics within your search.
Suggested Topics within your search.
-
1621
Toward Causal and Evidential Open-Set Temporal Action Detection
Published 2025-01-01Get full text
Article -
1622
Concept Drift Detection Based on Deep Neural Networks and Autoencoders
Published 2025-03-01“…In domains such as fraud detection, healthcare, and industrial equipment maintenance, streaming data often exhibit characteristics such as continuous generation, high real-time processing requirements, and complex distributions, making it susceptible to concept drift. …”
Get full text
Article -
1623
Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection
Published 2025-01-01“…With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption. …”
Get full text
Article -
1624
Detection of smoke from infrared image frames in the aircraft cargoes
Published 2021-04-01“…Since, in the cargo of civil aircraft, visible image processing technology cannot be used to detect smoke in the event of a fire due to the closed dark environment, a novel smoke detection method using infrared image processing technology is presented. …”
Get full text
Article -
1625
Dynamics of the island mass effect – Part 1: Detecting the extent
Published 2025-07-01“…<p>In the vast Pacific Ocean, remote islands and atolls induce mesoscale and sub-mesoscale processes that significantly impact the surrounding oligotrophic ocean, collectively referred to as the island mass effect (IME). …”
Get full text
Article -
1626
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1627
Optical Differentiation and Edge Detection Based on Birefringence of Uniaxial Crystals
Published 2025-04-01Get full text
Article -
1628
Ensemble Transformer–Based Detection of Fake and AI–Generated News
Published 2025-01-01“…This work leverages advanced natural language processing, machine learning, and deep learning algorithms to effectively detect fake and AI–generated content. …”
Get full text
Article -
1629
Detection and quantification of methane plumes with the MethaneAIR airborne spectrometer
Published 2025-08-01“…In this work, we present a computationally efficient data processing chain optimized for the detection and quantification of methane plumes with MethaneAIR. …”
Get full text
Article -
1630
Dysarthria Severity detection Using Recurrent and Convolutional Neural Networks
Published 2024-12-01Get full text
Article -
1631
Face and silhouette based age estimation for child detection system
Published 2022-09-01Get full text
Article -
1632
Gaussian-Based Approach to Subpixel Detection of Blurred and Unsharp Edges
Published 2014-09-01Get full text
Article -
1633
Detecting and Mitigating Wind Turbine Clutter for Airspace Radar Systems
Published 2013-01-01Get full text
Article -
1634
Two distinct dynamic modes subtend the detection of unexpected sounds.
Published 2014-01-01Get full text
Article -
1635
Artificial Intelligence applications in anomaly identification detection of big database
Published 2022-01-01Get full text
Article -
1636
Detection of Malicious Executables Using Rule Based Classification Algorithms
Published 2017-09-01Get full text
Article -
1637
Robust Image Forgery Detection Using Point Feature Analysis
Published 2019-09-01Get full text
Article -
1638
Machine Learning Algorithms for Retinal Image Analysis and Glaucoma Detection
Published 2022-02-01Get full text
Article -
1639
Impact of Spelling and Editing Correctness on Detection of LLM-Generated Emails
Published 2024-10-01Get full text
Article -
1640
Defect detection based on extreme edge of defective region histogram
Published 2018-01-01“…Automatic thresholding has been used by many applications in image processing and pattern recognition systems. Specific attention was given during inspection for quality control purposes in various industries like steel processing and textile manufacturing. …”
Get full text
Article