Showing 421 - 440 results of 5,605 for search 'features detection analysis', query time: 0.22s Refine Results
  1. 421
  2. 422
  3. 423
  4. 424

    Performance Evaluation of Different Speech-Based Emotional Stress Level Detection Approaches by Jan Stas, Stanislav Ondas, Jozef Juhar

    Published 2025-01-01
    “…A detailed comparative analysis of their speech characteristics, including fundamental frequency (<inline-formula> <tex-math notation="LaTeX">$F_{0}$ </tex-math></inline-formula>), formant frequencies (<inline-formula> <tex-math notation="LaTeX">$F_{1}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$F_{2}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$F_{3}$ </tex-math></inline-formula>), voice intensity, harmonic-to-noise ratio, jitter, and shimmer, was conducted to investigate how these features change with increasing stress and contribute to its detection. …”
    Get full text
    Article
  5. 425

    Clinical profile and molecular genetic analysis of alport syndrome in children: a single center experience by Aqsa Ahmad, Aqsa Ahmad, Liang Lijun, Zhang Yan, Zhang Yan, Ma Yan, Zhao Shuai, Zhao Shuai, Du Wangnan, Du Wangnan

    Published 2024-12-01
    “…Nine different variants were detected, with 3 mutations identified as novel. Two cases underwent histopathological analysis, revealing a thin basement membrane and mild to moderate mesangial proliferation. …”
    Get full text
    Article
  6. 426

    Detection of phishing portals through machine learning algorithms by E. A. Trushnikov

    Published 2024-10-01
    “…Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. …”
    Get full text
    Article
  7. 427

    A genetic programming approach with adaptive region detection to skin cancer image classification by Kunjie Yu, Jintao Lian, Ying Bi, Jing Liang, Bing Xue, Mengjie Zhang

    Published 2024-12-01
    “…A new region detection function has been developed to select the lesion areas from skin images for feature extraction. …”
    Get full text
    Article
  8. 428

    Anomaly distribution acquisition method for probabilistic damage tolerance assessment of hole features by Guo Li, Huimin Zhou, Junbo Liu, Shuyang Xia, Shuiting Ding

    Published 2024-12-01
    “…The default anomaly distribution of hole features has been established and published in airworthiness advisory circular 33.70-2 based on historical anomaly data collected from cracked or ruptured parts recorded in laboratory analysis reports of the special industries before 2005. …”
    Get full text
    Article
  9. 429

    BWFER-YOLOv8: An Enhanced Cascaded Framework for Concealed Object Detection by Khalid Ijaz, Ikramullah Khosa, Ejaz A. Ansari, Syed Farooq Ali, Asif Hussain, Faran Awais Butt

    Published 2025-01-01
    “…The comprehensive quantitative and qualitative analysis reveals that the proposed framework outperforms the state-of-the-art tiny YOLOv3 and YOLOv8 models by achieving 98.1% precision and recall in detecting concealed weapons. …”
    Get full text
    Article
  10. 430

    Wind Turbine Blade Fault Detection Method Based on TROA-SVM by Zhuo Lei, Haijun Lin, Xudong Tang, Yong Xiong, He Wen

    Published 2025-01-01
    “…Rigorous analysis and feature selection are subsequently conducted to eliminate redundant data, thereby focusing on retaining the most significant features for classification. …”
    Get full text
    Article
  11. 431
  12. 432

    Automatic detection method of software upgrade vulnerability based on network traffic analysis by Jinhui TENG, Yan GUANG, Hui SHU, Bing ZHANG

    Published 2020-02-01
    “…During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism by extracting the network traffic during the upgrade process,then matched it with the vulnerability feature vector to anticipate upgrading vulnerabilities.In a validation environment,the man-in-the-middle attack using the portrait information was carried out to verify the detection results.In addition,an automatic vulnerability analysis and verification system based on this method was designed.184 Windows applications samples was test and 117 upgrade vulnerabilities were detected in these samples,which proved validity of the method.…”
    Get full text
    Article
  13. 433
  14. 434
  15. 435
  16. 436

    Integrating multiple terrain features for artefact detection in the newly released TanDEM-X 30 m DEM and DCM over the Loess Plateau by Xingang Zhang, Shanchuan Guo, Zilong Xia, Haowei Mu, Bing Wang, Bin Cui, Hong Fang, Peijun Du

    Published 2025-07-01
    “…To address this limitation, a novel artefact detection framework integrating multiple terrain features was proposed. …”
    Get full text
    Article
  17. 437

    Machine Learning Approach for Biopsy-Based Identification of Eosinophilic Esophagitis Reveals Importance of Global features by Tomer Czyzewski, Nati Daniel, Mark Rochman, Julie Caldwell, Garrett Osswald, Margaret Collins, Marc Rothenberg, Yonatan Savir

    Published 2021-01-01
    “…One of the main challenges in automating this process, like many other biopsy-based diagnostics, is detecting features that are small relative to the size of the biopsy. …”
    Get full text
    Article
  18. 438

    Multilevel Feature Interaction Network for Remote Sensing Images Semantic Segmentation by Hongkun Chen, Huilan Luo

    Published 2024-01-01
    “…Notably, this study is the first to address ways to enhance the performance for HSR remote sensing image analysis by iteratively refining features at multilevels for different tasks. …”
    Get full text
    Article
  19. 439

    Laryngeal cancer diagnosis based on improved YOLOv8 algorithm by Xin Nie, Xueyan Zhang, Di Wang, Yuankun Liu, Lumin Xing, Wenjian Liu

    Published 2025-01-01
    “…A novel multiscale enhanced convolution module has been introduced to improve the model’s feature extraction capabilities for small-sized targets. …”
    Get full text
    Article
  20. 440