-
321
CD-CTFM: A Lightweight CNN-Transformer Network for Remote Sensing Cloud Detection Fusing Multiscale Features
Published 2024-01-01“…Clouds in remote sensing images inevitably affect information extraction, which hinders the following analysis of satellite images. Hence, cloud detection is a necessary preprocessing procedure. …”
Get full text
Article -
322
An Improved Software Source Code Vulnerability Detection Method: Combination of Multi-Feature Screening and Integrated Sampling Model
Published 2025-03-01“…The key innovations include (i) utilizing abstract syntax tree (AST) representation of source code to extract potential vulnerability-related features through multiple feature screening techniques; (ii) conducting analysis of variance (ANOVA) and evaluating feature selection techniques to identify representative and discriminative features; (iii) addressing class imbalance by applying an integrated over-sampling strategy to create synthetic samples from vulnerable code to expand the minority class sample size; (iv) employing outlier detection technology to filter out abnormal synthetic samples, ensuring high-quality synthesized samples. …”
Get full text
Article -
323
Multi-stream feature fusion of vision transformer and CNN for precise epileptic seizure detection from EEG signals
Published 2025-08-01“…However, most existing deep learning-based epilepsy detection methods are deficient in mining the local features and global time series dependence of EEG signals, limiting the performance enhancement of the models in seizure detection. …”
Get full text
Article -
324
A comparative study of convolutional neural networks and traditional feature extraction techniques for adulteration detection in ground beef
Published 2025-06-01“…Therefore, notable efforts have been made to find fast, non-destructive and efficient methods to detect adulteration in minced meat. In this research, thermal imaging was investigated to detect adulteration of ground beef in two data sets that included sheep lung and chicken gizzard as impurities. …”
Get full text
Article -
325
Incremental Adversarial Learning for Polymorphic Attack Detection
Published 2024-01-01Get full text
Article -
326
EARLY DETECTION OF THYROID CANCER USING TIME SERIES ANALYSIS AND QUADRATIC DISCRIMINANT ANALYSIS
Published 2025-03-01“…Thyroid cancer, a prevalent and potentially life-threatening disease, demands early detection for effective treatment. This study proposes a novel approach for the early detection of thyroid cancer by employing Time Series Analysis (TSA) and Quadratic Discriminant Analysis (QDA). …”
Get full text
Article -
327
Environmental Factors in Structural Health Monitoring—Analysis and Removal of Effects from Resonance Frequencies
Published 2025-03-01“…Secondly, the selection of only a handful of the most informative resonance frequency features not only reduces the feature space, but also increases the classification performance, albeit with a trade-off between false alarms and missed damage detection. …”
Get full text
Article -
328
StrokeNeXt: an automated stroke classification model using computed tomography and magnetic resonance images
Published 2025-06-01“…In the DFE pipeline, StrokeNeXt extracts features from fixed‑size patches, iterative neighborhood component analysis (INCA) selects the top features, and a t algorithm-based k-nearest neighbors (tkNN) classifier has been utilized for classification. …”
Get full text
Article -
329
ANN-SVM-IP: An Innovative Method for Rapidly and Efficiently Detecting and Classifying of External Defects of Apple Fruits
Published 2025-01-01“…In addition to relying on a large database of more than 21,000 diverse images, it makes the proposed approach promising and feasible for practical applications.INDEX TERMS SVM algorithm, ANN algorithms, features extraction, adjusting of variables, detecting of apple fruits, classification of apple, training and testing.…”
Get full text
Article -
330
An Improved Man-Made Structure Detection Method for Multi-aspect Polarimetric SAR Data
Published 2025-01-01“…Consequently, relying solely on anisotropic analysis may not yield favorable man-made structure detection results. …”
Get full text
Article -
331
Multi-Level Intertemporal Attention-Guided Network for Change Detection in Remote Sensing Images
Published 2025-06-01Get full text
Article -
332
Humor processing and its relationship with clinical features in patients with first-episode schizophrenia
Published 2025-03-01“…Clinical participants also completed clinical and social functioning measurements. Signal detection theory analysis was used to calculate the d' and β values, which represent the detection of humor signals in the comprehension phase and inner criteria of the humor appreciation phase, respectively. …”
Get full text
Article -
333
Harmonic Aggregation Entropy: A Highly Discriminative Harmonic Feature Estimator for Time Series
Published 2025-07-01“…This approach addresses the issues associated with traditional time–frequency analysis methods, such as the large computational burden and lack of specificity in feature extraction. …”
Get full text
Article -
334
DISTINCT FEATURES OF STAGHORN NEPHROLITHIASIS IN SOUTH OF RUSSIA
Published 2013-03-01Get full text
Article -
335
GENRE FEATURES OF THE POSTMODERN NOVEL “PERFUME: THE STORY OF A MURDERER” BY P. SÜSKIND
Published 2022-06-01“…The purpose of the article is to define the genre features of Patrick Süskind’s novel as a postmodern work. …”
Get full text
Article -
336
Border Feature Enhancement in Ultrasound Image Segmentation
Published 2025-01-01Get full text
Article -
337
Dynamic analysis of malicious behavior propagation based on feature selection in software network
Published 2024-11-01“…This paper introduces a dynamic analysis detection method for malicious behavior based on feature extraction (MBDFE), designed to effectively identify and thwart the spread of malicious software. …”
Get full text
Article -
338
Towards Parkinson’s Disease Detection Through Analysis of Everyday Handwriting
Published 2025-02-01Get full text
Article -
339
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Published 2016-10-01“…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
Get full text
Article -
340