Showing 10,041 - 10,060 results of 12,239 for search 'algorithm detection', query time: 0.18s Refine Results
  1. 10041

    Terminal ileitis: Questions of differential diagnosis and prospects for treatment. A review by Alexey M. Osadchuk, Oleg V. Golovenko, Irina D. Loranskaia

    Published 2025-01-01
    “…The article is devoted to the development of an algorithm for the diagnosis and treatment of ITI, which determines its relevance. …”
    Get full text
    Article
  2. 10042

    Uncovering causal graphs in air traffic control communication logs for explainable root cause analysis by Agneza Krajna, Ana Šarčević, Mario Brčić, Kristijan Poje

    Published 2025-07-01
    “…This paper presents a novel approach for identifying system topology and detecting causal relationships between servers in Air Traffic Control systems (ATC) by utilizing unstructured, raw communication logs. …”
    Get full text
    Article
  3. 10043

    Decoding Anomalous Diffusion Using Higher-Order Spectral Analysis and Multiple Signal Classification by Miguel E. Iglesias Martínez, Òscar Garibo-i-Orts, J. Alberto Conejero

    Published 2025-02-01
    “…Specifically, we propose the use of higher-order statistics, such as the bispectrum, and a hybrid algorithm that combines kurtosis with a multiple-signal classification technique. …”
    Get full text
    Article
  4. 10044

    Comparative Study of CNN Architectures for Brain Tumor Classification Using MRI: Exploring GradCAM for Visualizing CNN Focus by Areli Chinga, Wilden Bendezu, Antonio Angulo

    Published 2025-02-01
    “…Brain cancer, with its varied nature, demands early detection for timely treatment. This study aims to refine the diagnosis of brain tumors using convolutional neural network algorithms. …”
    Get full text
    Article
  5. 10045

    Pathogenesis and clinical significance of atrial fibrillation in myocardial infarction by M. V. Zykov, O. L. Barbarash

    Published 2021-03-01
    “…Currently, there is no information in novel clinical guidelines on the importance of active detection of atrial fibrillation (AF) in myocardial infarction (MI), as well as on the management of such patients. …”
    Get full text
    Article
  6. 10046

    Assessing Similarity Between Datasets Using Vector Representations by А. А. Usatoff, A. M. Nedzved, Guo Jiran

    Published 2025-07-01
    “…The article considers an approach to determining the similarity of datasets for training algorithms using datasets with human faces as an example. …”
    Get full text
    Article
  7. 10047

    Transverse cracking in glass fibre-reinforced composites monitored with synchrotron X-ray multi-projection imaging by Elise Van Vlierberghe, Jeroen Soete, Eleni Myrto Asimakopoulou, Zisheng Yao, Julia Rogalinski, Zhe Hu, Kannara Mom, Bratislav Lukić, Christian Breite, Pablo Villanueava Perez, Yentl Swolfs

    Published 2025-02-01
    “…An extensive data set was gathered to make a 3D reconstruction of the crack evolution over time using XMPI and machine learning-based reconstruction algorithms.  …”
    Get full text
    Article
  8. 10048

    Deep learning and hyperspectral features for seedling stage identification of barnyard grass in paddy field by Siqiao Tan, Qiang Xie, Wenshuai Zhu, Yangjun Deng, Lei Zhu, Xiaoqiao Yu, Zheming Yuan, Zheming Yuan, Yuan Chen, Yuan Chen

    Published 2025-02-01
    “…Barnyard grass, a pernicious weed thriving in rice fields, poses a significant challenge to agricultural productivity. Detection of barnyard grass before the four-leaf stage is critical for effective control measures. …”
    Get full text
    Article
  9. 10049

    Dark Energy Survey Year 6 Results: Synthetic-source Injection Across the Full Survey Using Balrog by Dhayaa Anbajagane, M. Tabbutt, J. Beas-Gonzalez, B. Yanny, S. Everett, M. R. Becker, M. Yamamoto, E. Legnani, J. De Vicente, K. Bechtol, J. Elvin-Poole, G. M. Bernstein, A. Choi, M. Gatti, G. Giannini, R. A. Gruendl, M. Jarvis, S. Lee, J. Mena-Fernández, A. Porredon, M. Rodriguez-Monroy, E. Rozo, E. S. Rykoff, T. Schutt, E. Sheldon, M. A. Troxel, N. Weaverdyck, V. Wetzell, M. Aguena, A. Alarcon, S. Allam, A. Amon, F. Andrade-Oliveira, D. Brooks, A. Carnero Rosell, J. Carretero, C. Chang, M. Crocce, L. N. da Costa, M. E. S. Pereira, T. M. Davis, S. Desai, H. T. Diehl, S. Dodelson, P. Doel, A. Drlica-Wagner, A. Ferté, J. Frieman, J. García-Bellido, E. Gaztanaga, D. Gruen, G. Gutierrez, W. G. Hartley, K. Herner, S. R. Hinton, D. L. Hollowood, K. Honscheid, D. Huterer, D. J. James, E. Krause, K. Kuehn, O. Lahav, J. L. Marshall, R. Miquel, J. Muir, J. Myles, A. Pieres, A. A. Plazas Malagón, J. Prat, M. Raveri, S. Samuroff, E. Sanchez, D. Sanchez Cid, I. Sevilla-Noarbe, M. Smith, E. Suchyta, G. Tarle, D. L. Tucker, A. R. Walker, P. Wiseman, Y. Zhang, The DES Collaboration

    Published 2025-05-01
    “…Within the Dark Energy Survey (DES), SSI plays a critical role in characterizing all necessary algorithms used in converting images to catalogs, and in deriving quantities needed for the cosmology analysis, such as object detection rates, galaxy redshift estimation, galaxy magnification, star-galaxy classification, and photometric performance. …”
    Get full text
    Article
  10. 10050

    Increasing use of artificial intelligence in genomic medicine for cancer care- the promise and potential pitfalls by Olivia O’Connor, Terri P. McVeigh

    Published 2025-04-01
    “…Artificial intelligence thrives on data, processing and learning from datasets with a degree of accuracy and efficiency that traditional computing algorithms can not achieve. Based on a patient’s genome sequence, AI could allow earlier detection of cancer, inform personalised treatment plans and provide insights into prognostication. …”
    Get full text
    Article
  11. 10051

    Dependable identity recognition and authorization based on visual information by Chunlei PENG, Xinbo GAO, Nannan WANG, Jie LI

    Published 2020-11-01
    “…Recently,deep learning has been widely applied to video and image based identity recognition and authorization tasks,including face recognition and person identification.However,machine learning models,especially deep learning models,can be easily fooled by adversarial attacks,which may cause the identity recognition systems to make a wrong decision.Therefore,dependable identity recognition and authorization has become one of the hot topics currently.Recent advances on dependable identity recognition and authorization from both information space and physical space were presented,where the development of the attack models on face detection,face recognition,person re-identification,and face anti-spoofing as well as printable adversarial patches were introduced.The algorithms of visual identity anonymization and privacy protection were further discussed.Finally,the datasets,experimental protocols and performance of dependable identity recognition methods were summarized,and the possible directions in the future research were presented.…”
    Get full text
    Article
  12. 10052

    Blockchain based solid waste classification with AI powered tracking and IoT integration by Aliaa M. Alabdali

    Published 2025-04-01
    “…IoT-connected bins transmit data to a central server, which uses blockchain to ensure secure, transparent data storage. AI algorithms, including machine learning (ML) and deep learning (DL), classify waste in real-time, optimizing waste collection and recycling. …”
    Get full text
    Article
  13. 10053

    Overbounding of Near Real-Time Estimated Ionospheric Gradient Slope in Low-Latitude Regions by Maria Caamano, Jose Miguel Juan, Jaume Sanz, Sam Pullen

    Published 2025-03-01
    “…This paper proposes to expand this approach by including the derivation of an uncertainty model for the estimated gradient slope, allowing the threat model to be substituted with the near real-time estimated and overbounded gradient slope in current GBAS algorithms. Evaluations with simulated and real anomalous gradients produced by equatorial plasma bubbles demonstrate the efficacy of this methodology, indicating its potential to enhance GBASs by dynamically detecting, estimating, and overbounding the estimated anomalous gradients instead of relying solely on worst-case models, thus improving system availability and continuity.…”
    Get full text
    Article
  14. 10054

    Enhanced Neutrosophic Set and Machine Learning Approach for Breast Cancer Prediction by Ashika T, Hannah Grace, Nivetha Martin, Florentin Smarandache

    Published 2024-11-01
    “…When trained on the N-dataset instead of traditional datasets, ML algorithms such as Decision Tree (DT), Random Forest (RF), and Adaptive Boosting (AdaBoost) perform better. …”
    Get full text
    Article
  15. 10055

    Les machines y voient-elles quelque chose ? by Denis Bonnay

    Published 2021-12-01
    “…But does this mean that machines really can see, or is computer vision just a fancy metaphor for object detection? This paper aims to provide a reasoned answer to the question. …”
    Get full text
    Article
  16. 10056

    Study of Driving Fatigue Alleviation by Transcutaneous Acupoints Electrical Stimulations by Fuwang Wang, Hong Wang

    Published 2014-01-01
    “…Performances of the two algorithms (θ+α)/(α+β) and θ/β are also assessed as possible indicators for fatigue detection. …”
    Get full text
    Article
  17. 10057

    Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography by Leihong Zhang, Xiao Yuan, Kaimin Wang, Dawei Zhang

    Published 2019-01-01
    “…In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for illumination, so that each light path is concentrated in a bucket detector to obtain intensity values of all images. Then, all the detected intensity values are encrypted by using public key cryptography algorithm to obtain the final ciphertext. …”
    Get full text
    Article
  18. 10058

    Bootstrap Confidence Intervals for Multiple Change Points Based on Two-Stage Procedures by Li Hou, Baisuo Jin, Yuehua Wu, Fangwei Wang

    Published 2025-05-01
    “…Specifically, we exploit an orthogonal greedy algorithm to recover the number of change points consistently in the cutting stage, and employ the sup-Wald-type test statistic to determine the locations of multiple change points in the refinement stage. …”
    Get full text
    Article
  19. 10059

    Web Spider Defense Technique in Wireless Sensor Networks by Alejandro Canovas, Jaime Lloret, Elsa Macias, Alvaro Suarez

    Published 2014-07-01
    “…Generally, when an intruder is detected in the WSN, its connection is immediately stopped. …”
    Get full text
    Article
  20. 10060

    Influence of Aerobic Exercise Load Intensity on Children’s Mental Health by Sihong Zhao

    Published 2022-01-01
    “…This technique includes several commonly used and improved video analysis algorithms. The use of moving target and tracking technology and algorithms can completely extract moving targets, eliminate the phenomenon of void and nothingness, and improve data acquisition and analysis capabilities. …”
    Get full text
    Article