Showing 321 - 340 results of 5,605 for search 'features detection analysis', query time: 0.26s Refine Results
  1. 321

    CD-CTFM: A Lightweight CNN-Transformer Network for Remote Sensing Cloud Detection Fusing Multiscale Features by Wenxuan Ge, Xubing Yang, Rui Jiang, Wei Shao, Li Zhang

    Published 2024-01-01
    “…Clouds in remote sensing images inevitably affect information extraction, which hinders the following analysis of satellite images. Hence, cloud detection is a necessary preprocessing procedure. …”
    Get full text
    Article
  2. 322

    An Improved Software Source Code Vulnerability Detection Method: Combination of Multi-Feature Screening and Integrated Sampling Model by Xin He, Asiya, Daoqi Han, Shuncheng Zhou, Xueliang Fu, Honghui Li

    Published 2025-03-01
    “…The key innovations include (i) utilizing abstract syntax tree (AST) representation of source code to extract potential vulnerability-related features through multiple feature screening techniques; (ii) conducting analysis of variance (ANOVA) and evaluating feature selection techniques to identify representative and discriminative features; (iii) addressing class imbalance by applying an integrated over-sampling strategy to create synthetic samples from vulnerable code to expand the minority class sample size; (iv) employing outlier detection technology to filter out abnormal synthetic samples, ensuring high-quality synthesized samples. …”
    Get full text
    Article
  3. 323

    Multi-stream feature fusion of vision transformer and CNN for precise epileptic seizure detection from EEG signals by Qi Li, Wei Cao, Anyuan Zhang

    Published 2025-08-01
    “…However, most existing deep learning-based epilepsy detection methods are deficient in mining the local features and global time series dependence of EEG signals, limiting the performance enhancement of the models in seizure detection. …”
    Get full text
    Article
  4. 324

    A comparative study of convolutional neural networks and traditional feature extraction techniques for adulteration detection in ground beef by Leila Bahmani, Saied Minaei, Alireza Mahdavian, Ahmad Banakar, Mahmoud Soltani Firouz

    Published 2025-06-01
    “…Therefore, notable efforts have been made to find fast, non-destructive and efficient methods to detect adulteration in minced meat. In this research, thermal imaging was investigated to detect adulteration of ground beef in two data sets that included sheep lung and chicken gizzard as impurities. …”
    Get full text
    Article
  5. 325
  6. 326

    EARLY DETECTION OF THYROID CANCER USING TIME SERIES ANALYSIS AND QUADRATIC DISCRIMINANT ANALYSIS by Eun Heo, Yoo-Shin Park, Tae-Hoon Kim, Byung-Chan Min

    Published 2025-03-01
    “…Thyroid cancer, a prevalent and potentially life-threatening disease, demands early detection for effective treatment. This study proposes a novel approach for the early detection of thyroid cancer by employing Time Series Analysis (TSA) and Quadratic Discriminant Analysis (QDA). …”
    Get full text
    Article
  7. 327

    Environmental Factors in Structural Health Monitoring—Analysis and Removal of Effects from Resonance Frequencies by Rims Janeliukstis, Lasma Ratnika, Liga Gaile, Sandris Rucevskis

    Published 2025-03-01
    “…Secondly, the selection of only a handful of the most informative resonance frequency features not only reduces the feature space, but also increases the classification performance, albeit with a trade-off between false alarms and missed damage detection. …”
    Get full text
    Article
  8. 328

    StrokeNeXt: an automated stroke classification model using computed tomography and magnetic resonance images by Evren Ekingen, Ferhat Yildirim, Ozgur Bayar, Erhan Akbal, Ilknur Sercek, Abdul Hafeez-Baig, Sengul Dogan, Turker Tuncer

    Published 2025-06-01
    “…In the DFE pipeline, StrokeNeXt extracts features from fixed‑size patches, iterative neighborhood component analysis (INCA) selects the top features, and a t algorithm-based k-nearest neighbors (tkNN) classifier has been utilized for classification. …”
    Get full text
    Article
  9. 329

    ANN-SVM-IP: An Innovative Method for Rapidly and Efficiently Detecting and Classifying of External Defects of Apple Fruits by Nashaat M. Hussain Hassan, Mohamed M. Hassan Mahmoud, Mohamed A. Ismeil, M. Mourad Mabrook, A. A. Donkol, A. M. Mabrouk

    Published 2025-01-01
    “…In addition to relying on a large database of more than 21,000 diverse images, it makes the proposed approach promising and feasible for practical applications.INDEX TERMS SVM algorithm, ANN algorithms, features extraction, adjusting of variables, detecting of apple fruits, classification of apple, training and testing.…”
    Get full text
    Article
  10. 330

    An Improved Man-Made Structure Detection Method for Multi-aspect Polarimetric SAR Data by Fabin Dong, Qiang Yin, Wen Hong

    Published 2025-01-01
    “…Consequently, relying solely on anisotropic analysis may not yield favorable man-made structure detection results. …”
    Get full text
    Article
  11. 331
  12. 332

    Humor processing and its relationship with clinical features in patients with first-episode schizophrenia by Yunfei Ji, Bingjie Huang, Jia Huang, Xiaodong Guo, Tianqi Gao, Yue Zheng, Wanheng Hu, Xiaolin Yin, Xianghe Wang, Xin Yu, Chengcheng Pu

    Published 2025-03-01
    “…Clinical participants also completed clinical and social functioning measurements. Signal detection theory analysis was used to calculate the d' and β values, which represent the detection of humor signals in the comprehension phase and inner criteria of the humor appreciation phase, respectively. …”
    Get full text
    Article
  13. 333

    Harmonic Aggregation Entropy: A Highly Discriminative Harmonic Feature Estimator for Time Series by Ye Wang, Zhentao Yu, Cheng Chi, Bozhong Lei, Jianxin Pei, Dan Wang

    Published 2025-07-01
    “…This approach addresses the issues associated with traditional time–frequency analysis methods, such as the large computational burden and lack of specificity in feature extraction. …”
    Get full text
    Article
  14. 334
  15. 335

    GENRE FEATURES OF THE POSTMODERN NOVEL “PERFUME: THE STORY OF A MURDERER” BY P. SÜSKIND by Nataliia А. Kovalova

    Published 2022-06-01
    “…The purpose of the article is to define the genre features of Patrick Süskind’s novel as a postmodern work. …”
    Get full text
    Article
  16. 336
  17. 337

    Dynamic analysis of malicious behavior propagation based on feature selection in software network by Huajian Xue, Huajian Xue, Yali Wang, Qiguang Tang

    Published 2024-11-01
    “…This paper introduces a dynamic analysis detection method for malicious behavior based on feature extraction (MBDFE), designed to effectively identify and thwart the spread of malicious software. …”
    Get full text
    Article
  18. 338
  19. 339

    Analysis of super-long and sparse feature in pseudo-random sequence based on similarity by Chun-jie CAO, Jing-zhang SUN, Zhi-qiang ZHANG, Long-juan WANG, Meng-xing HUANG

    Published 2016-10-01
    “…Similarity analysis of pseudo-random sequence in wireless communication networks is a research hotspot problem in the domain of information warfare.Based on the difficulties in super-long sequence,extremely sparse feature,and futilities in engineering application for real-time processing exist in similarity analysis of sequence in wireless net-work,a method of similarity analysis of sequence in a certain margin of misacceptance probability was proposed.Firstly,the similarity probability distribution of real-random sequence was theoretically analyzed.Secondly,according to the standard of NIST SP 800-22,the randomness of pseudo-bitstream was analyzed and the validity of pseudo-bitstream was judged.Finally,similarity was analyzed and verified by combining super-long pseudo-random sequence in real wireless communication networks.The results indicate that the lower bound of similarity value is 0.62 when misacceptance prob-ability uncertainty at about 1%.Above conclusion is considerable importance from the significance and theoretical values in network security domains,such as protocol analysis,traffic analysis,intrusion detection and others.…”
    Get full text
    Article
  20. 340