Showing 10,621 - 10,640 results of 12,239 for search 'algorithm detection', query time: 0.22s Refine Results
  1. 10621

    Prediction of Early Diagnosis in Ovarian Cancer Patients Using Machine Learning Approaches with Boruta and Advanced Feature Selection by Tuğçe Öznacar, Tunç Güler

    Published 2025-04-01
    “…Objectives: Ovarian cancer continues to be one of the most prevalent gynecological cancers diagnosed. Early detection is highly critical for increasing survival chances. …”
    Get full text
    Article
  2. 10622

    Applications of Machine Learning in Human Factors and Ergonomics: A Comprehensive Review of Research From the Past Decade by Erman Cakit, Waldemar Karwowski

    Published 2025-01-01
    “…This review not only benchmarks algorithmic performance but also identifies research gaps and provides guidance for future machine-learning applications in human factors, ergonomics, and human-centered systems design.…”
    Get full text
    Article
  3. 10623

    Adversarial attacks dataset for low light image enhancementMendeley Data by Axel Martinez, Matthieu Olague, Gustavo Olague, Emilio Hernandez, Julio Cesar Lopez-Arredondo

    Published 2025-06-01
    “…Enhancement tasks for low-light images are an open problem whose solutions can impact downstream tasks in fields like surveillance, medicine, autonomous driving, or object detection. As a result, the necessity to create algorithms that can withstand harmful and subtle disturbances has garnered interest, as both humans and machines can significantly influence how programs perform. …”
    Get full text
    Article
  4. 10624

    Edge-aware multisensor brain image fusion via guided filtering in Laplacian domain by Shweta Sharma, Shalli Rani, Ayush Dogra, Mohammed Wasim Bhatt

    Published 2025-07-01
    “…This work presents a new edge-aware multi-sensor brain image fusion technique using Laplacian energy maps for edge preservation, guided filtering for image decomposition, and adaptive fusion algorithms for integration of base and detail layers. …”
    Get full text
    Article
  5. 10625

    Enhanced Underwater Image Restoration and Clarity Optimization Using Advanced Digital Image Processing Techniques by Gopirajan Punniyakotti Varadharajan, Pradeep T., Charan R.

    Published 2025-01-01
    “…Underwater image enhancement is essential in various tasks such as underwater detection, surveillance, and exploration given that the images these activities produce usually have poor quality because of the influence of some factors (low contrast, noise, and color distortion caused by light absorption and scattering). …”
    Get full text
    Article
  6. 10626

    SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks by Qiushi Li, Shenghai Luo, Shunquan Tan, Zhenjun Li

    Published 2025-08-01
    “…Abstract In recent years, the increasing computational and storage demands of deep steganalysis models have drawn attention to lightweight architectures. While pruning algorithms for image steganalysis networks have been proposed, they often do not apply to networks equipped with mobile inverted bottleneck (MBConv) structures, such as EfficientNet. …”
    Get full text
    Article
  7. 10627

    The diagnostic performance evaluation of the SD BIOLINE HIV/syphilis Duo rapid test in southern Ethiopia: a cross-sectional study by Techalew Shimelis, Endale Tadesse

    Published 2015-04-01
    “…The performance of the test to detect HIV was evaluated using 400 sera (200 HIV positives and 200 HIV negatives). …”
    Get full text
    Article
  8. 10628

    Experimental analysis of polymorphic microsatellite loci in Cladocera: mixed breeding strategy and population dynamics by Poroshina A.A., Sherbakov D.Yu.

    Published 2025-03-01
    “…We use primers predicted by an algorithm for DNA amplification from Daph- nia samples and capillary electrophoresis to detect polymorphic loci. …”
    Get full text
    Article
  9. 10629

    False-positive tolerant model misconduct mitigation in distributed federated learning on electronic health record data across clinical institutions by Maxim Edelson, Anh Pham, Tsung-Ting Kuo

    Published 2025-07-01
    “…Future work can apply our methodology to more sophisticated machine learning algorithms or scale the experiments in a large-scale learning scenario with more participating sites and larger sample sizes.…”
    Get full text
    Article
  10. 10630

    Artificial Intelligence-Assisted Selection Strategies in Sheep: Linking Reproductive Traits with Behavioral Indicators by Ebru Emsen, Muzeyyen Kutluca Korkmaz, Bahadir Baran Odevci

    Published 2025-07-01
    “…Recent advancements in artificial intelligence (AI), including video tracking, wearable sensors, and machine learning (ML) algorithms, offer new opportunities to identify behavior-based indicators linked to key reproductive traits such as estrus, lambing, and maternal behavior. …”
    Get full text
    Article
  11. 10631

    Enhancing DDoS Attack Classification through SDN and Machine Learning: A Feature Ranking Analysis by Aymen AlAwadi, Kawthar Rasoul ALesawi

    Published 2025-04-01
    “…Due to their high accuracy and lower complexity, KNN and NB outperform ML algorithms in this study…”
    Get full text
    Article
  12. 10632

    Systematic Security Analysis of Sensors and Controls in PV Inverters: Threat Validation and Countermeasures by Fengchen Yang, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu

    Published 2025-02-01
    “…These vulnerabilities can lead to incorrect sensor readings, disrupting control algorithms. We propose an IEMI attack that results in three potential outcomes: Denial of Service (DoS), physical damage to the inverter, and power output reduction. …”
    Get full text
    Article
  13. 10633

    Implementation of automation tools for test analysis in the Radiotherapy Quality Assurance Programs by João Guilherme Rivera Santiago, Laura Furnari, Marcus Vinicius Saad de Paula Rodrigues, Victor Augusto Bertotti Ribeiro

    Published 2025-08-01
    “…The findings highlight the importance of conducting studies during the implementation phase of such tools to understand the algorithms used and establish appropriate usage and control measures for routine practice. …”
    Get full text
    Article
  14. 10634

    Security-centric node identification in complex networks by Lanying Liu, Ning Du, Duyong Sheng

    Published 2025-05-01
    “…To achieve this, we develop a mathematical model to compute SC, introduce efficient algorithms for identifying critical nodes, and implement an incremental update mechanism to enhance adaptability in real-time networks. …”
    Get full text
    Article
  15. 10635

    PreSCAN: A Comprehensive Review of Pre-Silicon Physical Side-Channel Vulnerability Assessment Methodologies by Md Kawser Bepary, Tao Zhang, Farimah Farahmandi, Mark Tehranipoor

    Published 2024-10-01
    “…We explore the intricacies of cryptographic algorithms, various side-channel attacks, and the latest mitigation techniques. …”
    Get full text
    Article
  16. 10636

    Neural networks for the analysis of traced particles in kinetic plasma simulations by G. Torralba Paz, A. Bohdan, J. Niemiec

    Published 2025-02-01
    “…We perform classification, regression, and anomaly detection algorithms on the dataset by using a convolutional neural network, a multi-layer perceptron, and an autoencoder. …”
    Get full text
    Article
  17. 10637

    Source reconstruction accuracy of MEG and EEG Bayesian inversion approaches. by Paolo Belardinelli, Erick Ortiz, Gareth Barnes, Uta Noppeney, Hubert Preissl

    Published 2012-01-01
    “…Still, no correct network detection is possible without reliable source localization. …”
    Get full text
    Article
  18. 10638

    Machine Learning for Chinese Corporate Fraud Prediction: Segmented Models Based on Optimal Training Windows by Chang Chuan Goh, Yue Yang, Anthony Bellotti, Xiuping Hua

    Published 2025-05-01
    “…We propose a comprehensive and practical framework for Chinese corporate fraud prediction which incorporates classifiers, class imbalance, population drift, segmented models, and model evaluation using machine learning algorithms. Based on a three-stage experiment, we first find that the random forest classifier has the best performance in predicting corporate fraud among 17 machine learning models. …”
    Get full text
    Article
  19. 10639

    Developing a Non-Invasive Intelligent System for Blood Glucose Level Estimation Using Reflective Optical Sensors by Mihaela MARIN, Teodora Alexandra DOBRIN, Florin Bogdan MARIN

    Published 2024-12-01
    “…The TCRT5000 sensor detects light reflectivity changes caused by blood flow, indirectly estimating glucose levels without the discomfort of invasive techniques. …”
    Get full text
    Article
  20. 10640

    Beyond the Leak: Analyzing the Real-World Exploitation of Stolen Credentials Using Honeypots by Matej Rabzelj, Urban Sedlar

    Published 2025-06-01
    “…We examine generative algorithms (e.g., keywalk patterns, hashcat rules), finding they are widely used by users but not attackers—unless included in wordlists. …”
    Get full text
    Article