-
2781
Hybrid Naïve Bayes Models for Scam Detection: Comparative Insights From Email and Financial Fraud
Published 2025-01-01“…This study revisits the Naïve Bayes algorithm—often underestimated in modern cybersecurity—as a core building block for effective scam detection. …”
Get full text
Article -
2782
RNA-BioLens: A Novel Raspberry Pi-Based Digital Microscope With Image Processing for Acute Lymphoblastic Leukemia Detection
Published 2025-01-01“…To address these challenges, this study presents a simplified digital microscope system integrated with the YOLOv4 (You Only Look Once) algorithm combined with additional segmentation and feature extraction methods designed explicitly for ALL cell detection. …”
Get full text
Article -
2783
Plasma lipidomic analysis reveals disruption of ether phosphatidylcholine biosynthesis and facilitates early detection of hepatitis B-related hepatocellular carcinoma
Published 2025-02-01“…Potential regulatory mechanisms are validated at multi-omic levels. A machine learning algorithm is used for feature selection and diagnostic modelling, and performance of the models is evaluated by ROC curves. …”
Get full text
Article -
2784
Automatic vibration fault detection of coal mine explosion-proof electrical equipment based on One-Class Support Vector Machine
Published 2025-02-01“…Experimental results showed that: ① When the number of iterations is 20, the OCSVM algorithm can complete convergence and achieve stability. ② In the electrical equipment signal classification experiment based on OCSVM, the use of the polynomial kernel function accurately classified samples for detection. ③ In the performance analysis of automatic vibration fault detection, the proposed method showed significantly higher accuracy across different sample sizes than infrared thermography and detection methods based on grey wolf optimization and support vector machine. …”
Get full text
Article -
2785
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
2786
Convolutional transform learning based fusion framework for scale invariant long term target detection and tracking in unmanned aerial vehicles
Published 2025-08-01“…For object detection (OD), the highly accurate YOLOv8 technique is utilized, followed by feature extraction through a backbone deep fusion-based convolutional transform learning of VGG16, CapsNet, and EfficientNetB7 to capture both spatial and hierarchical features across varying scales. …”
Get full text
Article -
2787
Key frame extraction based abnormal vehicle identification technique using statistical distribution analysis
Published 2025-08-01“…The experimental results are carried out using Car Accident Detection Dataset (CADP). For evaluating performance of KFEAVI, several algorithms are compared with the KFEAVI. …”
Get full text
Article -
2788
An Innovative Small-Target Detection Approach Against Information Attenuation: Fusing Enhanced Programmable Gradient Information and a Novel Mamba Module
Published 2025-03-01“…In small-target detection tasks, this problem becomes more serious. …”
Get full text
Article -
2789
Detection of Damage on Inner and Outer Races of Ball Bearings Using a Low-Cost Monitoring System and Deep Convolution Neural Networks
Published 2024-11-01“…Furthermore, an explainable AI technique is applied to extract key feature values identified by the fault classification algorithm, providing a method to support the analysis of fault causes.…”
Get full text
Article -
2790
Robust Bi-CBMSegNet framework for advancing breast mass segmentation in mammography with a dual module encoder-decoder approach
Published 2025-07-01“…However, segmenting and classifying breast masses in mammograms is challenging due to their similar shapes to the surrounding glands. Current target detection algorithms have limited applications and low accuracy. …”
Get full text
Article -
2791
Automated Detection of Recent Mud Extrusions Using UAV Imagery and Deep Learning: A Comparative Analysis of Traditional and CNN-Based Approaches
Published 2025-05-01“…Traditional algorithms rely on handcrafted features, while CNNs learn hierarchical representations directly from raw data. …”
Get full text
Article -
2792
Deep-m6Am: a deep learning model for identifying N6, 2′-O-Dimethyladenosine (m6Am) sites using hybrid features
Published 2025-03-01“…To enhance computational efficiency and eliminate noisy or redundant features, a supervised SHAP (SHapley Additive exPlanations) algorithm is utilized, ensuring the selection of the most informative features. …”
Get full text
Article -
2793
-
2794
Development of Model for Traffic Flows on Urban Street and Road Network
Published 2019-02-01“…Innovation in the first-level model is an approach in determining conditions while detecting a fuzzy set without using a standard algorithm that is an algorithm of local flexible regulation. …”
Get full text
Article -
2795
An Efficient Optimal CapsNet Model-Based Computer-Aided Diagnosis for Gastrointestinal Cancer Classification
Published 2024-01-01“…This technique has great promise for transforming initial detection and involvement in the battle against dangerous diseases. …”
Get full text
Article -
2796
LSD-Det: A Lightweight Detector for Small Ship Targets in SAR Images
Published 2025-01-01“…However, ship targets in SAR images are often small, have blurred edges, and suffer from strong background interference, making it difficult for traditional detection algorithms to balance accuracy and real-time performance. …”
Get full text
Article -
2797
Enhanced defect sensing technology in turbid water environments using multi-beam sonar
Published 2025-02-01Get full text
Article -
2798
-
2799
Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)
Published 2019-01-01“…In this paper, we can successfully detect two types of flooding-based DDoS attacks. Our detection technique can reduce the training time as well as the testing time by using two key features, namely, the volumetric and the asymmetric features. …”
Get full text
Article -
2800
Characterizing and Detecting Multiscenario Degradation of the Maidika Alpine Wetland Nature Reserve in the Qinghai–Tibet Plateau Using Landsat Time Series
Published 2025-01-01“…Based on 3 elements, spectral–temporal characterization, classification, and degradation detection for wetland covers, this study proposes a continuous classification and degradation detection algorithm for alpine wetlands (AW-CCD). …”
Get full text
Article