-
3821
Application of Variational Mode Decomposition based on the FOA and in Bearing Fault Diagnosis
Published 2020-05-01“…Finally, the optimal modal component is selected based on the kurtosis maximization criterion for envelope demodulation analysis and extracting the frequency of the fault feature. The effectiveness of the presented method is verified by simulation signal analysis, detecting bearing fault signal and comparing with multi-resolution singular value decomposition (MRSVD) approach based on fruit fly optimization algorithm.…”
Get full text
Article -
3822
Diagnostic accuracy of artificial intelligence for the screening of prostate cancer in biparametric magnetic resonance imaging: a systematic review
Published 2024-12-01“…Accurate and timely detection of prostate cancer is important under the current conditions. …”
Get full text
Article -
3823
An Approach for Predicting the Shape and Size of a Buried Basic Object on Surface Ground Penetrating Radar System
Published 2012-01-01“…The pattern of object under test will be known by comparing its data with the training data using a decision tree method. A simple powerful algorithm to extract feature parameters of object which is based on linear extrapolation is proposed. …”
Get full text
Article -
3824
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01“…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
Get full text
Article -
3825
Video Pulses: User-Based Modeling of Interesting Video Segments
Published 2014-01-01“…Previous research in video retrieval has focused on content-based techniques, such as pattern recognition algorithms that attempt to understand the low-level features of a video. …”
Get full text
Article -
3826
Automated Analysis of Fluorescence Microscopy Images to Identify Protein-Protein Interactions
Published 2006-01-01“…These features are used to relay quantitative values that aid in the automated scoring of positive interactions. …”
Get full text
Article -
3827
Real-Time Recognition of Loading Cycles’ Process Based on Electric Mining Shovel Monitoring
Published 2022-01-01“…An automatic recognition algorithm based on the feature extraction of working parameters to recognize each state in the loading cycle process of an electric mining shovel was proposed. …”
Get full text
Article -
3828
Development and validation of a carotid plaque risk prediction model for coal miners
Published 2025-05-01“…Finally, a nomogram was plotted to increase its interpretability.ResultsThe XGBoost algorithm demonstrated superior performance in feature screening, identifying the top five features as follows: age, systolic blood pressure, low-density lipoprotein cholesterol, white blood cell count, and body mass index (BMI). …”
Get full text
Article -
3829
Application Of K-Nearest Neighbor Algoritma for Customer Review Sentiment Analysis at Ngeboel Vapestore Shop
Published 2025-06-01“… This study applies the K-Nearest Neighbor (K-NN) algorithm to classify customer sentiments from online reviews about Ngeboel Vapestore, a local MSME in the vape industry. …”
Get full text
Article -
3830
Moisture transport axes: a unifying definition for tropical moisture exports, atmospheric rivers, and warm moist intrusions
Published 2025-04-01“…Here, we propose an algorithm that detects these various lines of moisture transport in instantaneous maps of the vertically integrated water vapour transport. …”
Get full text
Article -
3831
Whole slide image based prognosis prediction in rectal cancer using unsupervised artificial intelligence
Published 2024-12-01“…A tumor detection model was built by transfer learning. Then, on the basis of the tumor patches recognized by the tumor detection model, a convolutional autoencoder model was built for decoding the tumor patches into deep latent features. …”
Get full text
Article -
3832
Epidemiological, molecular, and evolutionary characteristics of G1P[8] rotavirus in China on the eve of RotaTeq application
Published 2024-12-01“…Phylogenetic and identity features of 11 genes were assessed by DNAStar and MEGA v.7.ResultsResults showed that the detection rate of G1P[8] in China from 2016 to 2018 was generally low with significant seasonality. …”
Get full text
Article -
3833
Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks
Published 2025-02-01“…The model is designed to handle diverse inputs, including satellite cloud imagery, vorticity, wind speed, and geopotential height, and it features an advanced center detection algorithm to ensure precise TC center identification. …”
Get full text
Article -
3834
Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images
Published 2022-02-01“…The suspicious regions are detected using fuzzy C-means clustering algorithm and divided them into negative and positive patches. …”
Get full text
Article -
3835
Research on Sugar Concentration Sensing Based on Real-Time Polarization and Interaction Effects
Published 2025-03-01“…This paper presents a non-contact method for detecting the sugar concentration in solutions based on real-time polarization characteristics and an interaction effects model. …”
Get full text
Article -
3836
Probing cosmic voids with emission-line galaxies
Published 2025-06-01“…These features exhibit characteristic signatures that reflect both the underlying cosmology and the nature of the emission-line galaxies.DiscussionLIM-based void detection is a promising avenue for cosmological studies. …”
Get full text
Article -
3837
Artificial intelligence correctly classifies developmental stages of monarch caterpillars enabling better conservation through the use of community science photographs
Published 2024-11-01“…Despite advances in automated species identification, traits like developmental stage or health remain underexplored or manually annotated, with limited focus on automating these features. As a proof-of-concept, we developed a computer vision model utilizing the YOLOv5 algorithm to accurately detect monarch butterfly caterpillars in photographs and classify them into their five developmental stages (instars). …”
Get full text
Article -
3838
Fault Diagnosis of Rolling Bearing Using Improved Wavelet Threshold Denoising and Fast Spectral Correlation Analysis
Published 2021-01-01“…This brings about difficulties to the extraction of its fault features. Therefore, there is a need to develop a reliable method for early fault detection of the bearing. …”
Get full text
Article -
3839
Decoding Anomalous Diffusion Using Higher-Order Spectral Analysis and Multiple Signal Classification
Published 2025-02-01“…Recent advances using statistical methods and recurrent neural networks have made it possible to detect such phenomena, even in noisy conditions. In this work, we explore feature extraction through parametric and non-parametric spectral analysis methods to decode anomalously diffusing trajectories, achieving reduced computational costs compared with other approaches that require additional data or prior training. …”
Get full text
Article -
3840
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
Published 2019-01-01“…In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for illumination, so that each light path is concentrated in a bucket detector to obtain intensity values of all images. Then, all the detected intensity values are encrypted by using public key cryptography algorithm to obtain the final ciphertext. …”
Get full text
Article