Showing 1,541 - 1,560 results of 5,605 for search 'features detection analysis', query time: 0.20s Refine Results
  1. 1541

    Water quality anomaly detection research based on GRU-PINN model by Zhao Xinyu

    Published 2025-01-01
    “…Feature selection is then performed based on feature importance ranking and mutual information analysis. …”
    Get full text
    Article
  2. 1542

    The Possibilities of Modern Ultrasound Scanning in Uveal Melanoma Extrascleral Growth Detection by A. G. Amiryan, S. V. Saakyan, G. P. Zakharova, A. Yu. Tsygankov

    Published 2022-10-01
    “…In patients with EG, domed and irregular tumors were more often detected. The results of densitometric analysis of the tumor in patients with and without EG showed significantly higher acoustic density in patients with EG in the area of the base (A1) and central part (A2) of the tumor. …”
    Get full text
    Article
  3. 1543

    A systematic review of effective data augmentation in cervical cancer detection by Betelhem Zewdu Wubineh, Andrzej Rusiecki, Krzysztof Halawa

    Published 2025-06-01
    “…This review examines effective augmentation techniques and top-performing deep-learning models for segmentation and classification in cervical cancer detection. Analyzing 57 articles, we found that hybrid deep feature fusion with augmentation (rotation, flipping, shifting, brightness adjustments) achieved 99.8% accuracy in binary and 99.1% in multiclass classification. …”
    Get full text
    Article
  4. 1544

    A Cloud User Anomaly Detection Method Based on Mouse Behavior by XU Hong-jun, ZHANG Hong, HE Wei

    Published 2019-08-01
    “…The experimental results show that the proposed method can effectively detect abnormal behavior of users under the precondition of ensuring user privacy, meanwhile, it can avoid the analysis and processing of high dimensional feature data and reduce the difficulty of abnormal behavior detection.…”
    Get full text
    Article
  5. 1545

    Performance of Machine Learning and Image Processing in Plant Leaf Disease Detection by Abu Sarwar Zamani, L. Anand, Kantilal Pitambar Rane, P. Prabhu, Ahmed Mateen Buttar, Harikumar Pallathadka, Abhishek Raghuvanshi, Betty Nokobi Dugbakie

    Published 2022-01-01
    “…Precision agriculture's automatic leaf disease detection system employs image acquisition, image processing, image segmentation, feature extraction, and machine learning techniques. …”
    Get full text
    Article
  6. 1546

    Detecting and Explaining Postpartum Depression in Real-Time with Generative Artificial Intelligence by Silvia García-Méndez, Francisco de Arriba-Pérez

    Published 2025-12-01
    “…Mainly, our work contributes to an intelligent PPD screening system that combines Natural Language Processing, Machine Learning (ML), and Large Language Models (LLMS) toward an affordable, real-time, and noninvasive free speech analysis. Moreover, it addresses the black box problem since the predictions are described to the end users thanks to the combination of LLMS with interpretable ML models (i.e. tree-based algorithms) using feature importance and natural language. …”
    Get full text
    Article
  7. 1547

    MSO‐DETR: Metric space optimization for few‐shot object detection by Haifeng Sima, Manyang Wang, Lanlan Liu, Yudong Zhang, Junding Sun

    Published 2024-12-01
    “…Finally, the decoder processes the high‐level feature information as the decoding of the query object and detects objects by predicting their locations and corresponding task encodings. …”
    Get full text
    Article
  8. 1548

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…Regarding the challenges of cross-dataset detection, the paper analyzes how differences in feature distributions between datasets lead to the performance degradation of traditional deep learning models in cross-domain applications. …”
    Get full text
    Article
  9. 1549

    Mitigating Online Banking Fraud Using Machine Learning and Anomaly Detection by Sheunesu Makura, Caden Dobson, Seani Rananga

    Published 2025-06-01
    “…Online banking fraud has become increasingly prevalent with the widespread adoption of digital financial services, necessitating advanced security solutions capable of detecting both known and emerging threats. This paper presents a robust machine learning framework that integrates anomaly detection with network packet analysis to mitigate fraudulent activities, focusing particularly on Distributed Denial of Service (DDoS) attacks. …”
    Get full text
    Article
  10. 1550

    Cells Grouping Detection and Confusing Labels Correction on Cervical Pathology Images by Wenbo Pang, Yi Ma, Huiyan Jiang, Qiming Yu

    Published 2024-12-01
    “…To address this issue, we perform a labels correction module with feature similarity by constructing feature centers for typical cells in each category. …”
    Get full text
    Article
  11. 1551

    Efficient lung cancer detection using computational intelligence and ensemble learning. by Richa Jain, Parminder Singh, Mohamed Abdelkader, Wadii Boulila

    Published 2024-01-01
    “…Our proposed method employs Logistic Regression, MLP Classifier, Gaussian NB Classifier, and Intelligent Feature Selection using K-Means and Fuzzy Logic to enhance detection procedures in lung cancer dataset. …”
    Get full text
    Article
  12. 1552

    Anomaly detection in cropland monitoring using multiple view vision transformer by Xuesong Liu, Yansong Liu, He Sui, Chuan Qin, Yuanxi Che, Zhaobo Guo

    Published 2025-04-01
    “…Comparative analysis with state-of-the-art algorithms reveals the superiority of the proposed model. …”
    Get full text
    Article
  13. 1553

    Enhancing Cybersecurity: Hybrid Deep Learning Approaches to Smishing Attack Detection by Tanjim Mahmud, Md. Alif Hossen Prince, Md. Hasan Ali, Mohammad Shahadat Hossain, Karl Andersson

    Published 2024-11-01
    “…Traditional phishing detection methods, such as feature-based, rule-based, heuristic, and blacklist approaches, have struggled to keep pace with the rapidly evolving tactics employed by attackers. …”
    Get full text
    Article
  14. 1554

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  15. 1555

    Hybrid Android Malware Detection and Classification Using Deep Neural Networks by Muhammad Umar Rashid, Shahnawaz Qureshi, Abdullah Abid, Saad Said Alqahtany, Ali Alqazzaz, Mahmood ul Hassan, Mana Saleh Al Reshan, Asadullah Shaikh

    Published 2025-03-01
    “…Unlike prior approaches, the proposed system integrates a multi-dimensional analysis of Android permissions, intents, and API calls, enabling robust feature extraction even under reverse engineering constraints. …”
    Get full text
    Article
  16. 1556

    Leak detection and localization in water distribution systems via multilayer networks by Daniel Barros, Ariele Zanfei, Andrea Menapace, Gustavo Meirelles, Manuel Herrera, Bruno Brentan

    Published 2025-01-01
    “…Due to the intrinsic interconnected feature of water flow, including losses, this study proposes a methodology based on graph correlation and multilayer network analysis for leak detection and localization in WDNs with multiple components (infrastructure, control devices, hydraulic sensors). …”
    Get full text
    Article
  17. 1557

    iSeizdiag: toward the framework development of epileptic seizure detection for healthcare by Ashish Sharma, Ashish Sharma, Akshat Saxena, Mradul Agrawal, Kunal Kishor, Deepti Kaushik, Prateek Jain, Arvind R. Yadav, Manob Jyoti Saikia, Manob Jyoti Saikia

    Published 2025-05-01
    “…Different neurological disorders are represented as different waves on EEG records.MethodThis paper involves the detection of Epilepsy which appears as rapid spiking on electroencephalogram signals, using feature extraction and machine learning techniques. …”
    Get full text
    Article
  18. 1558

    A comprehensive survey on techniques, challenges, evaluation metrics and applications of deep learning models for anomaly detection by Mudita Kohli, Indu Chhabra

    Published 2025-07-01
    “…Analyzing network packets for identifying deviations from the standard behavior is called anomaly detection. Deep learning tools have emerged as a promising alternative over classical machine learning approaches due to their proficiency in feature modeling, appraise detection rate, and mirror cognitive development. …”
    Get full text
    Article
  19. 1559

    Deep Learning in Defect Detection of Wind Turbine Blades: A Review by Katleho Masita, Ali N. Hasan, Thokozani Shongwe, Hasan Abu Hilal

    Published 2025-01-01
    “…Furthermore, this review discusses the role of advanced data acquisition techniques, such as drone-based imaging, thermographic analysis, and LiDAR (Light Detection and Ranging), in generating high-resolution and multi-spectral data for improved detection accuracy. …”
    Get full text
    Article
  20. 1560

    Leveraging U-Net and ASPP for effective fault detection in photovoltaic modules by Khalfalla Awedat, Masoud Alajmi, Mustafa Elfituri

    Published 2025-07-01
    “…This study presents a novel deep-learning-based approach to enhance fault detection in PV systems by customizing the Atrous Spatial Pyramid Pooling (ASPP) module within a U-Net architecture. …”
    Get full text
    Article