Showing 1,341 - 1,360 results of 5,605 for search 'features detection analysis', query time: 0.24s Refine Results
  1. 1341

    Music Emotion Detection Using Hierarchical Sparse Kernel Machines by Yu-Hao Chin, Chang-Hong Lin, Ernestasia Siahaan, Jia-Ching Wang

    Published 2014-01-01
    “…In the first level, a set of acoustical features are extracted, and principle component analysis (PCA) is implemented to reduce the dimension. …”
    Get full text
    Article
  2. 1342
  3. 1343

    Unmasking the Fake: Machine Learning Approach for Deepfake Voice Detection by Muhammad Usama Tanveer Gujjar, Kashif Munir, Madiha Amjad, Atiq Ur Rehman, Amine Bermak

    Published 2024-01-01
    “…By extracting Mel-Frequency Cepstral Coefficients (MFCC) from audio samples which serve as the foundational features for identifying genuine and fake voices. These MFCC features are then enhanced through a transformation process that employs a Gaussian Naive Bayes (GNB) model in conjunction with Non-Negative Factorization, creating a more discriminative feature set for subsequent analysis. …”
    Get full text
    Article
  4. 1344

    An explainable EEG epilepsy detection model using friend pattern by Turker Tuncer, Sengul Dogan

    Published 2025-05-01
    “…EEG signals have commonly been used to detect epilepsy. Therefore, the main objective of this research is to demonstrate the epilepsy detection capability of the presented new-generation relation-centric feature extraction function. …”
    Get full text
    Article
  5. 1345

    Surface roughness detection based on spindle motor current signal by Liu Xuejie, Li Guofu, Ren Lu

    Published 2024-02-01
    “…The total harmonic distortion feature achieves built-up edge detection during the machining process. …”
    Get full text
    Article
  6. 1346
  7. 1347

    Contactless Detection of pH Change in a Liquid Analyte by Dylan Gustafson, Dominic Klyve

    Published 2025-04-01
    “…Second, the change is detected using a Linear Discriminant Analysis model using values from an inverse Fourier transform of the frequency data as its features. …”
    Get full text
    Article
  8. 1348

    Rumor Detection Based on Knowledge Enhancement and Graph Attention Network by Wanru Wang, Yuwei Lv, Yonggang Wen, Xuemei Sun

    Published 2022-01-01
    “…Presently, most of the existing rumor detection methods focus on learning and integrating various features for detection, but due to the complexity of the language, these models often rarely consider the relationship between the parts of speech. …”
    Get full text
    Article
  9. 1349

    Using pseudo-AI submissions for detecting AI-generated code by Shariq Bashir

    Published 2025-05-01
    “…Previous studies have explored ways to detect AI-generated text, such as analyzing structural differences, embedding watermarks, examining specific features, or using fine-tuned language models. …”
    Get full text
    Article
  10. 1350

    Detection of axonal synapses in 3D two-photon images. by Cher Bass, Pyry Helkkula, Vincenzo De Paola, Claudia Clopath, Anil Anthony Bharath

    Published 2017-01-01
    “…Studies of structural plasticity in the brain often require the detection and analysis of axonal synapses (boutons). …”
    Get full text
    Article
  11. 1351

    An Object Detection Model based on Augmented Reality for Iraqi Archaeology by suha Dh. Athab, Abdulamir Abdullah Karim

    Published 2024-12-01
    “…The proposed model utilizes a pre-trained backbone network to extract complicated spatial features from input images; additional convolutional and fully connected layers are introduced to refine these features. …”
    Get full text
    Article
  12. 1352

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  13. 1353

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  14. 1354

    Anomaly Detection for MVB Network Based on Logistic Ensemble Learning by Huizhen WANG, Lide WANG, Yueyi YANG, Ping SHEN

    Published 2021-01-01
    “…Multifunction vehicle bus (MVB) has been widely used in rail transit vehicles, but the poor working environment may result in the performance degradation of MVB network, which even endangers the driving safety in serious cases. Based on the analysis of common faults in MVB network, with extracting the network state features from the MVB physical layer and data link layer, an detection method based on heterogeneous Logistic ensemble learning to detect MVB network anomaly and avoid breakdown maintenance to the maximum extent was proposed. …”
    Get full text
    Article
  15. 1355

    APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION by Qoria Yudi Pratama, Mohammad Isa Irawan

    Published 2025-01-01
    “…CBA integrates the advantages of classification and association analysis, allowing the classification process and a deeper understanding of the strength of the relationship between features in the dataset through the analysis of metrics such as support and confidence. …”
    Get full text
    Article
  16. 1356

    TATPat based explainable EEG model for neonatal seizure detection by Turker Tuncer, Sengul Dogan, Irem Tasci, Burak Tasci, Rena Hajiyeva

    Published 2024-11-01
    “…In this EFE model, there are four essential phases and these phases: (i) automaton and transformer-based feature extraction, (ii) feature selection deploying cumulative weight-based neighborhood component analysis (CWNCA), (iii) the Directed Lobish (DLob) and Causal Connectome Theory (CCT)-based explainable result generation and (iv) classification deploying t algorithm-based support vector machine (tSVM). …”
    Get full text
    Article
  17. 1357

    Transformer Self-Attention Change Detection Network with Frozen Parameters by Peiyang Cheng, Min Xia, Dehao Wang, Haifeng Lin, Zikai Zhao

    Published 2025-03-01
    “…These results fully demonstrate the superiority, robustness, and generalization ability of ZAQNet in change detection tasks and provide an efficient and reliable solution for remote sensing image analysis.…”
    Get full text
    Article
  18. 1358
  19. 1359

    Deep learning-based edge detection for random natural images by Kanija Muntarina, Rafid Mostafiz, Sumaita Binte Shorif, Mohammad Shorif Uddin

    Published 2025-03-01
    “…Edge detection plays a critical role in computer vision, particularly in the analysis of random natural images. …”
    Get full text
    Article
  20. 1360

    YOLOv8 with Post-Processing for Small Object Detection Enhancement by Jinkyu Ryu, Dongkurl Kwak, Seungmin Choi

    Published 2025-06-01
    “…Small-object detection in images, a core task in unstructured big-data analysis, remains challenging due to low resolution, background noise, and occlusion. …”
    Get full text
    Article