-
1541
Water quality anomaly detection research based on GRU-PINN model
Published 2025-01-01“…Feature selection is then performed based on feature importance ranking and mutual information analysis. …”
Get full text
Article -
1542
The Possibilities of Modern Ultrasound Scanning in Uveal Melanoma Extrascleral Growth Detection
Published 2022-10-01“…In patients with EG, domed and irregular tumors were more often detected. The results of densitometric analysis of the tumor in patients with and without EG showed significantly higher acoustic density in patients with EG in the area of the base (A1) and central part (A2) of the tumor. …”
Get full text
Article -
1543
A systematic review of effective data augmentation in cervical cancer detection
Published 2025-06-01“…This review examines effective augmentation techniques and top-performing deep-learning models for segmentation and classification in cervical cancer detection. Analyzing 57 articles, we found that hybrid deep feature fusion with augmentation (rotation, flipping, shifting, brightness adjustments) achieved 99.8% accuracy in binary and 99.1% in multiclass classification. …”
Get full text
Article -
1544
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01“…The experimental results show that the proposed method can effectively detect abnormal behavior of users under the precondition of ensuring user privacy, meanwhile, it can avoid the analysis and processing of high dimensional feature data and reduce the difficulty of abnormal behavior detection.…”
Get full text
Article -
1545
Performance of Machine Learning and Image Processing in Plant Leaf Disease Detection
Published 2022-01-01“…Precision agriculture's automatic leaf disease detection system employs image acquisition, image processing, image segmentation, feature extraction, and machine learning techniques. …”
Get full text
Article -
1546
Detecting and Explaining Postpartum Depression in Real-Time with Generative Artificial Intelligence
Published 2025-12-01“…Mainly, our work contributes to an intelligent PPD screening system that combines Natural Language Processing, Machine Learning (ML), and Large Language Models (LLMS) toward an affordable, real-time, and noninvasive free speech analysis. Moreover, it addresses the black box problem since the predictions are described to the end users thanks to the combination of LLMS with interpretable ML models (i.e. tree-based algorithms) using feature importance and natural language. …”
Get full text
Article -
1547
MSO‐DETR: Metric space optimization for few‐shot object detection
Published 2024-12-01“…Finally, the decoder processes the high‐level feature information as the decoding of the query object and detects objects by predicting their locations and corresponding task encodings. …”
Get full text
Article -
1548
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…Regarding the challenges of cross-dataset detection, the paper analyzes how differences in feature distributions between datasets lead to the performance degradation of traditional deep learning models in cross-domain applications. …”
Get full text
Article -
1549
Mitigating Online Banking Fraud Using Machine Learning and Anomaly Detection
Published 2025-06-01“…Online banking fraud has become increasingly prevalent with the widespread adoption of digital financial services, necessitating advanced security solutions capable of detecting both known and emerging threats. This paper presents a robust machine learning framework that integrates anomaly detection with network packet analysis to mitigate fraudulent activities, focusing particularly on Distributed Denial of Service (DDoS) attacks. …”
Get full text
Article -
1550
Cells Grouping Detection and Confusing Labels Correction on Cervical Pathology Images
Published 2024-12-01“…To address this issue, we perform a labels correction module with feature similarity by constructing feature centers for typical cells in each category. …”
Get full text
Article -
1551
Efficient lung cancer detection using computational intelligence and ensemble learning.
Published 2024-01-01“…Our proposed method employs Logistic Regression, MLP Classifier, Gaussian NB Classifier, and Intelligent Feature Selection using K-Means and Fuzzy Logic to enhance detection procedures in lung cancer dataset. …”
Get full text
Article -
1552
Anomaly detection in cropland monitoring using multiple view vision transformer
Published 2025-04-01“…Comparative analysis with state-of-the-art algorithms reveals the superiority of the proposed model. …”
Get full text
Article -
1553
Enhancing Cybersecurity: Hybrid Deep Learning Approaches to Smishing Attack Detection
Published 2024-11-01“…Traditional phishing detection methods, such as feature-based, rule-based, heuristic, and blacklist approaches, have struggled to keep pace with the rapidly evolving tactics employed by attackers. …”
Get full text
Article -
1554
Detection of SSL/TLS protocol attacks based on flow spectrum theory
Published 2022-02-01“…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
Get full text
Article -
1555
Hybrid Android Malware Detection and Classification Using Deep Neural Networks
Published 2025-03-01“…Unlike prior approaches, the proposed system integrates a multi-dimensional analysis of Android permissions, intents, and API calls, enabling robust feature extraction even under reverse engineering constraints. …”
Get full text
Article -
1556
Leak detection and localization in water distribution systems via multilayer networks
Published 2025-01-01“…Due to the intrinsic interconnected feature of water flow, including losses, this study proposes a methodology based on graph correlation and multilayer network analysis for leak detection and localization in WDNs with multiple components (infrastructure, control devices, hydraulic sensors). …”
Get full text
Article -
1557
iSeizdiag: toward the framework development of epileptic seizure detection for healthcare
Published 2025-05-01“…Different neurological disorders are represented as different waves on EEG records.MethodThis paper involves the detection of Epilepsy which appears as rapid spiking on electroencephalogram signals, using feature extraction and machine learning techniques. …”
Get full text
Article -
1558
A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection
Published 2025-07-01“…Analyzing network packets for identifying deviations from the standard behavior is called anomaly detection. Deep learning tools have emerged as a promising alternative over classical machine learning approaches due to their proficiency in feature modeling, appraise detection rate, and mirror cognitive development. …”
Get full text
Article -
1559
Deep Learning in Defect Detection of Wind Turbine Blades: A Review
Published 2025-01-01“…Furthermore, this review discusses the role of advanced data acquisition techniques, such as drone-based imaging, thermographic analysis, and LiDAR (Light Detection and Ranging), in generating high-resolution and multi-spectral data for improved detection accuracy. …”
Get full text
Article -
1560
Leveraging U-Net and ASPP for effective fault detection in photovoltaic modules
Published 2025-07-01“…This study presents a novel deep-learning-based approach to enhance fault detection in PV systems by customizing the Atrous Spatial Pyramid Pooling (ASPP) module within a U-Net architecture. …”
Get full text
Article