Showing 901 - 920 results of 3,033 for search 'data detection learning algorithm', query time: 0.24s Refine Results
  1. 901

    Machine Learning-Based Approach for HIV/AIDS Prediction: Feature Selection and Data Balancing Strategy by Abdul Mizwar A Rahim, Ahmad Ridwan, Bambang Pilu Hartato, Firman Asharudin

    Published 2025-03-01
    “…The study concludes that combining feature selection, data balancing, and machine learning techniques significantly improves predictive performance, making it a valuable approach for early detection and clinical decision support in HIV/AIDS diagnosis. …”
    Get full text
    Article
  2. 902

    Assessment of the Solar Potential of Buildings Based on Photogrammetric Data by Paulina Jaczewska, Hubert Sybilski, Marlena Tywonek

    Published 2025-02-01
    “…This paper describes also the Detecting Photovoltaic Panels algorithm with the use of deep learning techniques. …”
    Get full text
    Article
  3. 903

    Adaptive Dynamic Thresholding Method for Fault Detection in Diesel Engine Lubrication Systems by Tingting Wu, Hongliang Song, Hongli Gao, Zongshen Wu, Feifei Han

    Published 2024-12-01
    “…Extensive diesel engine tests and actual fault data demonstrate that the proposed method can address the issues of missed faults encountered by static threshold methods and the low detection accuracy of machine learning approaches without the need for fault samples. …”
    Get full text
    Article
  4. 904

    A Novel Approach to Road Safety: Detecting Illegal Overtaking Using Smartphone Cameras and Deep Learning for Vehicle Auditing by Karem Daiane Marcomini, Vitória de Carvalho Brito, Gregori da Cruz Balestra, Vitor Tosetto, Luiz Carlos Duarte, Antonio Roberto Donadon

    Published 2025-01-01
    “…We used dashboard-mounted smartphone cameras and geolocation data to filter the analysis areas. We used the state-of-the-art deep learning model You Only Look Once version 8 (YOLOv8) to detect yellow road lanes. …”
    Get full text
    Article
  5. 905

    Using Machine Learning and Nationwide Population-Based Data to Unravel Predictors of Treated Depression in Farmers by Pascal Petit, Vincent Bonneterre, Nicolas Vuillerme

    Published 2025-01-01
    “…To complement these traditional studies, big data and machine learning (ML) can advantageously be harnessed. …”
    Get full text
    Article
  6. 906
  7. 907

    Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG

    Published 2015-01-01
    “…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
    Get full text
    Article
  8. 908
  9. 909

    Improve the robustness of algorithm under adversarial environment by moving target defense by Kang HE, Yuefei ZHU, Long LIU, Bin LU, Bin LIU

    Published 2020-08-01
    “…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
    Get full text
    Article
  10. 910

    Comparing Models and Performance Metrics for Lung Cancer Prediction using Machine Learning Approaches. by Ruqiya, Noman Khan, Saira Khan

    Published 2024-12-01
    “…To achieve these goals, we explored many ML algorithms and compared them using a dataset with lifestyle and health data. …”
    Get full text
    Article
  11. 911

    Few-Shot Learning With Prototypical Networks for Improved Memory Forensics by Muhammad Fahad Malik, Ammara Gul, Ayesha Saadia, Faeiz M. Alserhani

    Published 2025-01-01
    “…Securing computer systems requires effective methods for malware detection. Memory forensics analyzes memory dumps to identify malicious activity, but faces challenges including large and complex datasets, constantly evolving malware threats, and limited labeled data for training algorithms among others. …”
    Get full text
    Article
  12. 912

    Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection by Jessica Fernandes Lopes, Sylvio Barbon Junior, Leonimer Flávio de Melo

    Published 2025-04-01
    “…With the increasing demand for time-series analysis, driven by the proliferation of IoT devices and real-time data-driven systems, detecting change points in time series has become critical for accurate short-term prediction. …”
    Get full text
    Article
  13. 913

    Driver drowsiness shield (DDSH): a real-time driver drowsiness detection system by Archita Bhanja, Dibyajyoti Parhi, Dipankar Gajendra, Kreetish Sinha, Arup Kumar Sahoo

    Published 2025-05-01
    “…This paper aims to develop an advanced real-time drowsiness detection system using deep learning algorithms. For this purpose, we utilized an eye image dataset from the MRL Eye Dataset and performed extensive feature engineering and preprocessing to prepare the data for analysis. …”
    Get full text
    Article
  14. 914

    Developing a Prediction Model for Real-Time Incident Detection Leveraging User-Oriented Participatory Sensing Data by Md Tufajjal Hossain, Joyoung Lee, Dejan Besenski, Branislav Dimitrijevic, Lazar Spasovic

    Published 2025-05-01
    “…Real crash data from the New Jersey Department of Transportation (NJDOT) and crowdsourced data from Waze were matched using the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm to differentiate true and false alerts. …”
    Get full text
    Article
  15. 915
  16. 916

    Secure Data Transmission Using GS3 in an Armed Surveillance System by Francisco Alcaraz-Velasco, José M. Palomares, Fernando León-García, Joaquín Olivares

    Published 2025-06-01
    “…Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. …”
    Get full text
    Article
  17. 917

    Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments by G. Nalinipriya, S. Rama Sree, K. Radhika, E. Laxmi Lydia, Faten Khalid Karim, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-07-01
    “…The insights and hidden trends detected from network data and the architecture of a data-driven ML to avoid this attack are essential to establishing an intelligent security system. …”
    Get full text
    Article
  18. 918

    Enhanced Peer-to-Peer Botnet Detection Using Differential Evolution for Optimized Feature Selection by Sangita Baruah, Vaskar Deka, Dulumani Das, Utpal Barman, Manob Jyoti Saikia

    Published 2025-05-01
    “…Apart from that, an ensemble learning algorithm is also employed to support and enhance the detection phase, providing a robust defense against the dynamic and sophisticated nature of modern P2P botnets. …”
    Get full text
    Article
  19. 919
  20. 920

    A labeled synthetic mobile money transaction datasetMendeley Data by Denish Azamuke, Marriette Katarahweire, Engineer Bainomugisha

    Published 2025-06-01
    “…The dataset is particularly suitable for training and testing machine learning algorithms to detect financial fraud. Additionally, it holds the potential for benchmarking fraud detection algorithms and systems and validating synthetic data generation methodologies.…”
    Get full text
    Article