-
3861
Graph-Based COVID-19 Detection Using Conditional Generative Adversarial Network
Published 2024-01-01“…The proposed methodology encompasses four distinct phases: initial segmentation of raw chest radiographs employing Conditional Generative Adversarial Networks (CGAN), followed by feature extraction through a tailored pipeline integrating both manual computer vision algorithms and pre-trained Deep Neural Network (DNN) models. …”
Get full text
Article -
3862
LCFC-Laptop: A Benchmark Dataset for Detecting Surface Defects in Consumer Electronics
Published 2025-07-01“…The resulting dataset has been made publicly available to support the research community in developing, testing, and refining advanced surface defect detection algorithms under realistic conditions. To the best of our knowledge, this is the first comprehensive, multiclass, multi-defect dataset for surface defect detection in the consumer electronics domain that provides pixel-level ground-truth annotations and is explicitly designed for real-world applications.…”
Get full text
Article -
3863
Drought Detection in Satellite Imagery: A Layered Ensemble Machine Learning Approach
Published 2025-06-01“…The proposed approach combines conventional machine learning algorithms (Support Vector Machine (SVM), Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), and k-Nearest Neighbor (k-NN)) with ensemble methods (Bagging and Voting) in a layered fashion for detecting drought from satellite imagery. …”
Get full text
Article -
3864
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
Get full text
Article -
3865
Deep Attention Networks With Multi-Temporal Information Fusion for Sleep Apnea Detection
Published 2024-01-01“…Our experiment results demonstrate that (1) compared with benchmark methods, the proposed DAN-MTIF exhibits excellent performance with 0.9106 accuracy, 0.9396 precision, 0.8470 sensitivity, 0.9588 specificity, and 0.8909 <inline-formula><tex-math notation="LaTeX">$F_{1}$</tex-math></inline-formula> score at per-segment level; (2) DAN-MTIF can effectively extract features with a higher degree of discrimination from ECG segments of multiple timescales than those with a single time scale, ensuring a better SA detection performance; (3) the overall performance of deep learning methods is better than the classical machine learning algorithms, highlighting the superior performance of deep learning approaches for SA detection.…”
Get full text
Article -
3866
Machine Learning Models in the Detection of MB2 Canal Orifice in CBCT Images
Published 2025-06-01“…Conclusion: The success rates (AUC, precision, recall) of ML algorithms in the detection of MB2 were remarkable in our study. …”
Get full text
Article -
3867
A lightweight deep-learning model for parasite egg detection in microscopy images
Published 2024-11-01“…Abstract Background Intestinal parasitic infections are still a serious public health problem in developing countries, and the diagnosis of parasitic infections requires the first step of parasite/egg detection of samples. Automated detection can eliminate the dependence on professionals, but the current detection algorithms require large computational resources, which increases the lower limit of automated detection. …”
Get full text
Article -
3868
Tensor RT optimized driver drowsiness detection system using edge device
Published 2025-10-01“…The system uses transfer learning techniques for implementing CNN model algorithms to analyze live video from the camera module, allowing for real-time detection of driver behavior such as fatigue or distraction. …”
Get full text
Article -
3869
A Synergy Between Machine Learning and Formal Concept Analysis for Crowd Detection
Published 2025-01-01“…To enhance public safety, crowd detection and prevention systems have essentially become a natural means to manage diverse crowded areas, such as urban settings, transportation hubs, and event venues. …”
Get full text
Article -
3870
Automated Lightweight Model for Asthma Detection Using Respiratory and Cough Sound Signals
Published 2025-05-01“…<b>Methods:</b> To build an automated, lightweight model for asthma detection, tested separately with respiratory and cough sounds to assess their suitability for detecting asthma and COPD, the proposed AI models integrate the following ML algorithms: RF, SVM, DT, NN, and KNN, with an overall aim to demonstrate the efficacy of the proposed method for future clinical use. …”
Get full text
Article -
3871
Diagnostic Performance of Artificial Intelligence–Based Methods for Tuberculosis Detection: Systematic Review
Published 2025-03-01“…ObjectiveWe aimed to provide a comprehensive evaluation of AI-based algorithms for TB detection across various data modalities. …”
Get full text
Article -
3872
Automated Surface Crack Identification of Reinforced Concrete Members Using an Improved YOLOv4-Tiny-Based Crack Detection Model
Published 2024-10-01“…This paper employed an enhanced You Only Look Once (YOLO) v4-tiny algorithm, based on the Crack Detection Model (CDM), to accurately identify and classify crack types in reinforced concrete (RC) members. …”
Get full text
Article -
3873
Analysis of Interference Magnetic Field Characteristics of Underwater Gliders
Published 2025-02-01“…To meet the objective of equipping underwater gliders with magnetic field sensors for underwater target detection, this paper proposes an adaptive filtering method based on the Recursive Least Squares (RLS) algorithm. …”
Get full text
Article -
3874
Enhancing Real-Time Emotion Recognition in Classroom Environments Using Convolutional Neural Networks: A Step Towards Optical Neural Networks for Advanced Data Processing
Published 2024-11-01“…The algorithm encompasses four key steps: image acquisition, preprocessing, emotion detection, and emotion recognition. …”
Get full text
Article -
3875
Stationauxiliary operation technology for sonar digital image processing based on machine vision
Published 2025-06-01“…First, the transient signal detection algorithm is used to extract the threat target mutation signal. …”
Get full text
Article -
3876
Robust face mask detection in complex scenarios using YOLOv8 and context-aware convolutions
Published 2025-07-01“…Abstract Aiming to address the challenges of reduced detection accuracy in face mask applications due to mutual occlusion, lighting variations, and detection distance, this paper proposes a face mask detection algorithm tailored for complex environments. …”
Get full text
Article -
3877
Eye Movement Tracking Using Opencv Python
Published 2023-08-01“…For this reason, open-source libraries like OpenCV enable high-level programming to implement reliable and accurate detection algorithms like Haar Cascade. Since everything is processed in real-time, payment must be made quickly. …”
Get full text
Article -
3878
Region-of-Interest Extraction Method to Increase Object-Detection Performance in Remote Monitoring System
Published 2025-05-01“…Then it is used as the reference to be compared with a target image to extract the ROIs by our DSSIM-based area filtering algorithm. The background areas beside the ROIs in the image are filled with a single color—either black or white to reduce data size, or a highly saturated color to improve object detection performance. …”
Get full text
Article -
3879
FedAware: a distributed IoT intrusion detection method based on fractal shrinking autoencoder
Published 2025-08-01“…Abstract The goal of intrusion detection is to prevent potential security threats by analysing activities in a network or system and identifying abnormal or malicious behaviours in a timely manner. …”
Get full text
Article -
3880
A Novel Multi-Step Forecasting-Based Approach for Enhanced Burst Detection in Water Distribution Systems
Published 2024-09-01“…For an online burst detection method based on flow time series data, the challenge arises in the variability of anomaly definitions across different datasets, rendering a one-size-fits-all anomaly detection algorithm impossible. …”
Get full text
Article