-
1341
Music Emotion Detection Using Hierarchical Sparse Kernel Machines
Published 2014-01-01“…In the first level, a set of acoustical features are extracted, and principle component analysis (PCA) is implemented to reduce the dimension. …”
Get full text
Article -
1342
-
1343
Unmasking the Fake: Machine Learning Approach for Deepfake Voice Detection
Published 2024-01-01“…By extracting Mel-Frequency Cepstral Coefficients (MFCC) from audio samples which serve as the foundational features for identifying genuine and fake voices. These MFCC features are then enhanced through a transformation process that employs a Gaussian Naive Bayes (GNB) model in conjunction with Non-Negative Factorization, creating a more discriminative feature set for subsequent analysis. …”
Get full text
Article -
1344
An explainable EEG epilepsy detection model using friend pattern
Published 2025-05-01“…EEG signals have commonly been used to detect epilepsy. Therefore, the main objective of this research is to demonstrate the epilepsy detection capability of the presented new-generation relation-centric feature extraction function. …”
Get full text
Article -
1345
Surface roughness detection based on spindle motor current signal
Published 2024-02-01“…The total harmonic distortion feature achieves built-up edge detection during the machining process. …”
Get full text
Article -
1346
-
1347
Contactless Detection of pH Change in a Liquid Analyte
Published 2025-04-01“…Second, the change is detected using a Linear Discriminant Analysis model using values from an inverse Fourier transform of the frequency data as its features. …”
Get full text
Article -
1348
Rumor Detection Based on Knowledge Enhancement and Graph Attention Network
Published 2022-01-01“…Presently, most of the existing rumor detection methods focus on learning and integrating various features for detection, but due to the complexity of the language, these models often rarely consider the relationship between the parts of speech. …”
Get full text
Article -
1349
Using pseudo-AI submissions for detecting AI-generated code
Published 2025-05-01“…Previous studies have explored ways to detect AI-generated text, such as analyzing structural differences, embedding watermarks, examining specific features, or using fine-tuned language models. …”
Get full text
Article -
1350
Detection of axonal synapses in 3D two-photon images.
Published 2017-01-01“…Studies of structural plasticity in the brain often require the detection and analysis of axonal synapses (boutons). …”
Get full text
Article -
1351
An Object Detection Model based on Augmented Reality for Iraqi Archaeology
Published 2024-12-01“…The proposed model utilizes a pre-trained backbone network to extract complicated spatial features from input images; additional convolutional and fully connected layers are introduced to refine these features. …”
Get full text
Article -
1352
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
1353
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
1354
Anomaly Detection for MVB Network Based on Logistic Ensemble Learning
Published 2021-01-01“…Multifunction vehicle bus (MVB) has been widely used in rail transit vehicles, but the poor working environment may result in the performance degradation of MVB network, which even endangers the driving safety in serious cases. Based on the analysis of common faults in MVB network, with extracting the network state features from the MVB physical layer and data link layer, an detection method based on heterogeneous Logistic ensemble learning to detect MVB network anomaly and avoid breakdown maintenance to the maximum extent was proposed. …”
Get full text
Article -
1355
APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION
Published 2025-01-01“…CBA integrates the advantages of classification and association analysis, allowing the classification process and a deeper understanding of the strength of the relationship between features in the dataset through the analysis of metrics such as support and confidence. …”
Get full text
Article -
1356
TATPat based explainable EEG model for neonatal seizure detection
Published 2024-11-01“…In this EFE model, there are four essential phases and these phases: (i) automaton and transformer-based feature extraction, (ii) feature selection deploying cumulative weight-based neighborhood component analysis (CWNCA), (iii) the Directed Lobish (DLob) and Causal Connectome Theory (CCT)-based explainable result generation and (iv) classification deploying t algorithm-based support vector machine (tSVM). …”
Get full text
Article -
1357
Transformer Self-Attention Change Detection Network with Frozen Parameters
Published 2025-03-01“…These results fully demonstrate the superiority, robustness, and generalization ability of ZAQNet in change detection tasks and provide an efficient and reliable solution for remote sensing image analysis.…”
Get full text
Article -
1358
Comparison of Moving Average and Differential Operation for Wheeze Detection in Spectrograms
Published 2022-09-01Get full text
Article -
1359
Deep learning-based edge detection for random natural images
Published 2025-03-01“…Edge detection plays a critical role in computer vision, particularly in the analysis of random natural images. …”
Get full text
Article -
1360
YOLOv8 with Post-Processing for Small Object Detection Enhancement
Published 2025-06-01“…Small-object detection in images, a core task in unstructured big-data analysis, remains challenging due to low resolution, background noise, and occlusion. …”
Get full text
Article