-
901
A pulmonary hypertension targeted algorithm to improve referral to right heart catheterization: A machine learning approach
Published 2024-12-01“…Background: Pulmonary hypertension (PH) is a pathophysiological problem that may involve several clinical symptoms and be linked to various respiratory and cardiovascular illnesses. …”
Get full text
Article -
902
DVAEGMM: Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks
Published 2022-01-01“…Each input data point is represented by a low-dimensional representation and a probability of reconstruction by the algorithm. Lastly, the Gaussian Mixture Model, a distinct estimation network, is used to approximate the latent vector density, resulting in the detection of anomalies from measuring sample energy. …”
Get full text
Article -
903
DynaFusion-SLAM: Multi-Sensor Fusion and Dynamic Optimization of Autonomous Navigation Algorithms for Pasture-Pushing Robot
Published 2025-05-01“…Aiming to address the problems of fewer related studies on autonomous navigation algorithms based on multi-sensor fusion in complex scenarios in pastures, lower degrees of fusion, and insufficient cruising accuracy of the operation path in complex outdoor environments, a multimodal autonomous navigation system is proposed based on a loosely coupled architecture of Cartographer–RTAB-Map (real-time appearance-based mapping). …”
Get full text
Article -
904
APPROACH OF PROCESSING, CLASSIFICATION AND DETECTION OF NEW CLASSES AND ANOMALIES IN HETEROGENIOUS AND DIFFERENT STREAMS OF DATA
Published 2019-05-01“…Most of the research focuses on solving problems of infinite length and concept-drift.Method. …”
Get full text
Article -
905
Research on SeaTreasure Target Detection Technology Based on Improved YOLOv7-Tiny
Published 2025-01-01“…To address this challenge, this paper proposes a target detection algorithm for underwater sea treasures called UPA-YOLO, which aims to achieve accurate and efficient detection of underwater treasures and accelerates the inference through model transformation to enable the deployment of the detection model in edge devices. …”
Get full text
Article -
906
ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection
Published 2025-01-01“…To address this, we propose an innovative auto-selective approach and software tool based on meta-learning, called ASAD (Auto-Selective Anomaly Detection), to dynamically select the most appropriate model based on the unique features of a given dataset or problem domain. …”
Get full text
Article -
907
Improving Image Spam Detection Using a New Image Texture Features Selection
Published 2024-12-01“…The assumed algorithm in other articles shows a lower detection accuracy than the present article, but in the proposed method, it reaches 99.29% detection accuracy.…”
Get full text
Article -
908
An IoT-Driven Real-Time Skin Disease Detection System using Machine Learning
Published 2025-02-01“…Researchers have recommended various early detection methods for them. Their solutions through a range of machine learning algorithms like random forest, naive Bayes, logistic regression, kernel SVM, KNN, and CNN based on which they used detection methods for various skin diseases. …”
Get full text
Article -
909
Adaptive Granularity-Fused Keypoint Detection for 6D Pose Estimation of Space Targets
Published 2024-11-01“…Furthermore, our ADSAN implements the selective keypoint focus module (SKFM) algorithm to alleviate problems caused by partial occlusions and viewpoint alterations. …”
Get full text
Article -
910
Scene Text Detection Based on Multi-scale Feature Extraction and Bidirectional Feature Fusion
Published 2024-08-01“…To address the above problems, a scene text detection algorithm based on multi-scale feature extraction and bidirectional feature fusion is proposed. …”
Get full text
Article -
911
Lampsy: An Invisible Real-Time Epilepsy Video Monitoring and Automatic Seizure Detection Device
Published 2025-01-01“…This work seeks to solve this problem by exploring the feasibility of real-time video-based seizure detection on affordable edge devices. …”
Get full text
Article -
912
Target detection of helicopter electric power inspection based on the feature embedding convolution model.
Published 2024-01-01“…In the simulation experiment, the accuracy of the model in electric power circuit and equipment detection is improved by 30% compared with the traditional algorithm, and the inspection range is expanded by 26%. …”
Get full text
Article -
913
Acoustic Signal Aided Detection Method of Spiral Bevel Gears Based on PSO-MCKD
Published 2024-01-01“…Aiming at the problems of cumbersome operation and strong subjectivity of the traditional detection method for the transmission accuracy of spiral bevel gears, an acoustic signal-assisted detection method for judging the transmission accuracy of spiral bevel gears is proposed. …”
Get full text
Article -
914
An analytical assessment of credit card fraud detection techniques: Supervised, Unsupervised, and Reinforcement Learning
Published 2025-01-01“…Method. information-theoretical analysis of methods for detecting fraud with bank cards, machine learning algorithms in improving the accuracy of fraud detection. …”
Get full text
Article -
915
A novel feature extraction method based on dynamic handwriting for Parkinson's disease detection.
Published 2025-01-01“…Therefore, to solve the above problems, a new feature extraction approach for PD detection is proposed using handwriting. …”
Get full text
Article -
916
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
Published 2021-06-01“…These evolutionary-based algorithms are known to be effective in solving optimization problems. …”
Get full text
Article -
917
Surrounding Object Material Detection and Identification Method for Robots Based on Ultrasonic Echo Signals
Published 2023-01-01Get full text
Article -
918
Application of the D5 discipline from the G8D method in solving quality management problems for NOK parts
Published 2025-05-01“…The rationale for applying the G8D method and using the D5 discipline of this method was analyzed for the case of a NOK part, specifically a part with an undrilled hole. The algorithm that must be applied to correctly go through all the steps of the D5 discipline has been presented, in order to obtain verified corrective actions both for the point in the process where NOK parts are produced and for the control point where NOK was not detected. …”
Get full text
Article -
919
Enhancing Drone Detection via Transformer Neural Network and Positive–Negative Momentum Optimizers
Published 2025-06-01“…In this paper, we propose a Yolov12 architecture with positive–negative pulse-based optimization algorithms to solve the problem of drone detection on video data. …”
Get full text
Article -
920
Weirdnodes: centrality based anomaly detection on temporal networks for the anti-financial crime domain
Published 2025-04-01“…We address this problem with WeirdNodes, a centrality-based methodology for ranked anomaly detection in temporal networks. …”
Get full text
Article