Showing 9,921 - 9,940 results of 12,239 for search 'algorithm detection', query time: 0.22s Refine Results
  1. 9921

    Possibilities of using artificial intelligence technologies in the morphological diagnosis of inflammatory bowel diseases (literature review) by E. G. Churilova, A. B. Kazumova, Kh. M. Akhrieva, N. V. Pachuasvili, A. S. Tertychnyy

    Published 2025-04-01
    “…Endocytoscopy and real-time visualization algorithms improve the accuracy of early detection of mucosal dysplasia. …”
    Get full text
    Article
  2. 9922

    Analysis of multiple faults in induction motor using machine learning techniques by Puja Pohakar, Ravi Gandhi, Surender Hans, Gulshan Sharma, Pitshou N. Bokoro

    Published 2025-06-01
    “…In order to surpass these limitations, a new approach by using state-of-the-art machine learning algorithms such as Extreme Gradient Boosting (XGBoost) combined with Fuzzy Inference Systems (FIS) presents a new perspective towards improved accuracy and comprehensibility in fault detection. …”
    Get full text
    Article
  3. 9923

    From Genomics to AI: Revolutionizing Precision Medicine in Oncology by Giulia Calvino, Juliette Farro, Stefania Zampatti, Cristina Peconi, Domenica Megalizzi, Giulia Trastulli, Sarah Andreucci, Raffaella Cascella, Claudia Strafella, Carlo Caltagirone, Federico Grifalchi, Emiliano Giardina

    Published 2025-06-01
    “…It examines their roles in identifying genetic variants, assessing cancer risk, guiding targeted therapies and immunotherapy, predicting treatment response, and enabling early detection through liquid biopsies. Results: Genomics and AI are revolutionizing oncology by enabling personalized treatment strategies, improving early detection, and overcoming drug resistance. …”
    Get full text
    Article
  4. 9924

    Automated Segmentation of Breast Cancer Focal Lesions on Ultrasound Images by Dmitry Pasynkov, Ivan Egoshin, Alexey Kolchev, Ivan Kliouchkin, Olga Pasynkova, Zahraa Saad, Anis Daou, Esam Mohamed Abuzenar

    Published 2025-03-01
    “…Therefore, it is necessary to develop effective algorithms for the segmentation, classification, and analysis of US images. …”
    Get full text
    Article
  5. 9925

    Integrated Ultrasound‐Enrichment and Machine Learning in Colorimetric Lateral Flow Assay for Accurate and Sensitive Clinical Alzheimer's Biomarker Diagnosis by Shuqing Wang, Yan Zhu, Zhongzeng Zhou, Yong Luo, Yan Huang, Yibiao Liu, Tailin Xu

    Published 2024-11-01
    “…The LFA device is integrated with a portable ultrasonic actuator to rapidly enrich microparticles using ultrasound, which is essential for sample pre‐enrichment to improve the sensitivity, followed by ML algorithms to classify and predict the enhanced colorimetric signals. …”
    Get full text
    Article
  6. 9926

    Intermittent Short Atrioventricular Delay in a Dual Chamber Pacemaker During Acute Pulmonary Edema by Ravi Vazirani, Miriam García Cocera, David Calvo

    Published 2025-01-01
    “…As most cardiologists and emergency department physicians are not familiar with brand‐specific algorithms, we believe that this case report will make these noncompetitive atrial pacing algorithms more accessible to non‐cardiologists.…”
    Get full text
    Article
  7. 9927

    Energy-Efficient Node Selection for Target Tracking in Wireless Sensor Networks by Yong Wang, Dianhong Wang

    Published 2013-01-01
    “…In the proposed method, the target detection probability is estimated by single-node processing based on particle filter. …”
    Get full text
    Article
  8. 9928

    Does the hepatologist still need to rely on aminotransferases in clinical practice? A reappraisal of the role of a classic biomarker in the diagnosis and clinical management of chr... by Patrizia Burra, Calogero Cammà, Pietro Invernizzi, Fabio Marra, Maurizio Pompili

    Published 2025-01-01
    “…Aminotransferases, particularly alanine aminotransferase (ALT), are commonly used in the detection, diagnosis, and management of chronic liver diseases. …”
    Get full text
    Article
  9. 9929

    Using intelligence techniques to automate Oracle testing by Nour Sulaiman, safwan hasson

    Published 2023-06-01
    “…The model was trained using the random forest algorithm and using the convolutional neural network. …”
    Get full text
    Article
  10. 9930

    An annotated high-content fluorescence microscopy dataset with EGFP-Galectin-3-stained cells and manually labelled outlineszenodo by Salma Kazemi Rashed, Malou Arvidsson, Rafsan Ahmed, Sonja Aits

    Published 2025-02-01
    “…Many forms of bioimage analysis involve the detection of objects and their outlines. In the context of microscopy-based high-throughput drug and genomic screening and even in smaller scale microscopy experiments, the objects that most often need to be detected are cells. …”
    Get full text
    Article
  11. 9931
  12. 9932

    Advanced Interpretation of Bullet-Affected Chest X-Rays Using Deep Transfer Learning by Shaheer Khan, Nirban Bhowmick, Azib Farooq, Muhammad Zahid, Sultan Shoaib, Saqlain Razzaq, Abdul Razzaq, Yasar Amin

    Published 2025-06-01
    “…Special deep learning algorithms went through a process of optimization before researchers improved their ability to detect and place objects. …”
    Get full text
    Article
  13. 9933

    Identification of the Dominant Harmonic Source Type in the Distribution Network Using the Soft Computing Technique by Sasmita Lenka, Pampa Sinha, Kaushik Paul, Chitrlekha Jena, Swagat Das, Baseem Khan

    Published 2022-01-01
    “…Detail power or harmonic power calculation at level 1 reduces the computational burden of the algorithm. The distinguishing harmonics concept can be used to detect a harmonic generating source from the distribution network. …”
    Get full text
    Article
  14. 9934

    Image Processing for Capturing Motions of Crowd and Its Application to Pedestrian-Induced Lateral Vibration of a Footbridge by Junji Yoshida, Yozo Fujino, Toshiyuki Sugiyama

    Published 2007-01-01
    “…Then, motions of detected human-heads, together with the bridge response, are tracked. …”
    Get full text
    Article
  15. 9935

    Application of artificial intelligence in the diagnosis of malignant digestive tract tumors: focusing on opportunities and challenges in endoscopy and pathology by Yinhu Gao, Peizhen Wen, Yuan Liu, Yahuang Sun, Hui Qian, Xin Zhang, Huan Peng, Yanli Gao, Cuiyu Li, Zhangyuan Gu, Huajin Zeng, Zhijun Hong, Weijun Wang, Ronglin Yan, Zunqi Hu, Hongbing Fu

    Published 2025-04-01
    “…Results In the field of endoscopy, multiple deep learning models have significantly improved detection rates in real-time polyp detection, early gastric cancer, and esophageal cancer screening, with some commercialized systems successfully entering clinical trials. …”
    Get full text
    Article
  16. 9936

    Analysing Time Series of Land Subsidence in the West of Tehran Province (Shahriar Plain) and its Relation to Groundwater Discharge by InSAR Technique by Ramin Papi, ُSara Attarchi, Masoud Soleimani

    Published 2020-06-01
    “…The Small BAseline Subset (SBAS) algorithm was applied to analyze the time series of land surface displacement and to generate the mean displacement velocity map. …”
    Get full text
    Article
  17. 9937

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  18. 9938

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  19. 9939

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  20. 9940

    Design of a Control Chart Based on COM-Poisson Distribution for the Uncertainty Environment by Muhammad Aslam, Ali Hussein Al-Marshadi

    Published 2019-01-01
    “…The structure of the control chart under the neutrosophic statistical interval method will be given. The algorithm to determine the average run length under neutrosophic statistical interval system will be given. …”
    Get full text
    Article