-
2721
Network and Dataset for Multiscale Remote Sensing Image Change Detection
Published 2025-01-01“…This dataset consists of 842 pairs of images with a resolution of 1024 × 1024 pixels, featuring uniformly distributed change detection target sizes. Comparative experiments are conducted with 10 other state-of-the-art algorithms on the MSRS-CD dataset and another public dataset, LEVIR-CD. …”
Get full text
Article -
2722
AI-assisted ophthalmic imaging for early detection of neurodegenerative diseases
Published 2025-05-01“…These findings highlight AI’s potential to detect preclinical disease stages before significant neurological symptoms manifest. …”
Get full text
Article -
2723
Coral reef detection using ICESat-2 and machine learning
Published 2025-07-01“…Future work should refine algorithms and incorporate additional environmental variables to improve model performance across various reef types.…”
Get full text
Article -
2724
MODEL BASED FAULT DETECTION FOR SAFETY MANAGEMENT OF THE INDUSTRIAL PROCESSES
Published 2025-07-01“…The paper presents a efficient detection solution concepts based on the dependency and the causal connections that exist between the process parameters and proposes techniques and algorithms for the safe evolution of the process. …”
Get full text
Article -
2725
Predicting the Likelihood of Operational Risk Occurrence in the Banking Industry Using Machine Learning Algorithms
Published 2025-12-01“…Both algorithms demonstrated comparable performance across other modes. …”
Get full text
Article -
2726
Detection of selfish nodes based on credit mechanism in opportunistic networks
Published 2012-11-01“…The existence of selfish nodes seriously affects the routing performance of opportunistic networks(OppNet).To protect the OppNet against the nodes’ selfish behavior,a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding.The mechanism leverages 2-ACK messages to observe the nodes’behavior.Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes.Simulation results show that,when coupled with various routing algorithms,the mechanism could detect selfish nodes out accurately,and improve network performance effectively in terms of delivery rate and traffic load.…”
Get full text
Article -
2727
Detection of Fake Instagram Accounts via Machine Learning Techniques
Published 2024-11-01“…After making the necessary feature additions to and removals from these data, they are fed into machine learning algorithms with the aim of detecting fake Instagram accounts. …”
Get full text
Article -
2728
Android malware detection method based on deep neural network
Published 2020-10-01“…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
Get full text
Article -
2729
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article -
2730
Using A One-Class SVM To Optimize Transit Detection
Published 2024-07-01“…As machine learning algorithms become increasingly accessible, a growing number of organizations and researchers are using these technologies to automate the process of exoplanet detection. …”
Get full text
Article -
2731
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures
Published 2015-10-01“…In this work, we present a Fraud Detection System that classifies transactions in a Mobile Money Transfer infrastructure by using the data fusion algorithms derived from these new models. …”
Get full text
Article -
2732
Early Detection of Parkinson's Disease: Ensemble Learning for Improved Diagnosis
Published 2025-01-01“…This paper proposed several machine learning algorithms such as Decision Tree, Random Forest, Logistic Regression and Support Vector Machine and design an ensemble of these models to detect and classify Parkinson's disease. …”
Get full text
Article -
2733
Novel Approaches for the Early Detection of Glaucoma Using Artificial Intelligence
Published 2024-10-01“…Through the fast and accurate analysis of massive amounts of imaging data, artificial intelligence (AI), in particular machine learning (ML) and deep learning (DL), has emerged as a promising method to improve the early detection and management of glaucoma. Aims: The purpose of this study is to examine the current uses of AI in the early diagnosis, treatment, and detection of glaucoma while highlighting the advantages and drawbacks of different AI models and algorithms. …”
Get full text
Article -
2734
Traveling Wave and Wavelet Based Fault Location Detection in Microgrids
Published 2019-06-01“…In order to allow the use of traveling wave-basedprotection in loop distribution systems, the system is separated into three zones.To each three separate zone a type D fault locator method was applied, and byensuring that these algorithms worked in accordance, fault location detection wascarried out in a looped microgrid.…”
Get full text
Article -
2735
Predicting the generalization of computer aided detection (CADe) models for colonoscopy
Published 2024-11-01“…Abstract Generalizability of AI colonoscopy algorithms is important for wider adoption in clinical practice. …”
Get full text
Article -
2736
Siamese comparative transformer-based network for unsupervised landmark detection.
Published 2024-01-01“…Current landmark detection algorithms often train a sophisticated image pose encoder by reconstructing the source image to identify landmarks. …”
Get full text
Article -
2737
Exploring the Role of Artificial Intelligence in Detecting Advanced Persistent Threats
Published 2025-06-01“…This paper explores the pivotal role of Artificial Intelligence (AI) in enhancing the detection and mitigation of APTs. By leveraging machine learning algorithms and data analytics, AI systems can identify patterns and anomalies that are indicative of sophisticated cyber-attacks. …”
Get full text
Article -
2738
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
2739
Estimating the influence of accounting variables change on earnings management detection
Published 2017-05-01“…Neither of these two detection algorithms attempts to quantify earnings management and connect it with the infractions committed by the companies, charged by the regulator (in this case – U.S. …”
Get full text
Article -
2740
Sleep Spindles as an Electrographic Element: Description and Automatic Detection Methods
Published 2016-01-01“…To analyze spindle activity in a more robust way, automatic sleep spindle detection methods are essential. Various algorithms were developed, depending on individual research interest, which hampers direct comparisons and meta-analyses. …”
Get full text
Article