-
1141
Multimodal representations of transfer learning with snake optimization algorithm on bone marrow cell classification using biomedical histopathological images
Published 2025-04-01“…Recently, with the fast growth of deep learning (DL) and machine learning (ML) methods, object detection methods have been progressively used for cell detection. …”
Get full text
Article -
1142
Efficient sepsis detection using deep learning and residual convolutional networks
Published 2025-07-01“…In this article, we present a new deep learning model to detect the occurrence of sepsis and the African vulture optimization algorithm (AVOA) to enhance the model performance. …”
Get full text
Article -
1143
A Drilling Debris Tracking and Velocity Measurement Method Based on Fine Target Feature Fusion Optimization
Published 2025-08-01“…Specifically, we enhance the multi-scale feature fusion capability of the YOLOv11 detection head by incorporating a lightweight feature extraction module, Ghost Conv, and a feature-aligned fusion module, FA-Concat, resulting in an improved model named YOLOv11-Dd (drilling debris). …”
Get full text
Article -
1144
Enhanced Infrared Defect Detection for UAVs Using Wavelet-Based Image Processing and Channel Attention-Integrated SSD Model
Published 2024-01-01“…In this paper, we develop a defect target detection algorithm based on image processing and feature matching to address background noise in the detection of defects in infrared images of Unmanned Aerial Vehicle (UAVs), as well as to improve real-time monitoring capabilities. …”
Get full text
Article -
1145
Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles
Published 2024-10-01“…Machine learning (ML) techniques cannot detect every new and complex malware variant. The deep learning (DL) model is an efficient tool for detecting various malware variants. …”
Get full text
Article -
1146
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…In addition, the binary grey wolf optimizer (BGWO) model is utilized to choose an optimal feature subset. Moreover, the Enhanced Elman Spike Neural Network (EESNN) model detects cyber-attacks. …”
Get full text
Article -
1147
A Statistical Framework to Detect and Quantify Operator-Learning Curves in Medical Device Safety Evaluation
Published 2025-07-01“…Correctly attributing safety signals to learning or device effects allows for appropriate corrective actions and recommendations to improve patient safety.Objective: To develop and assess the statistical performance of an analytic framework to detect the presence of LE and quantify the learning curve (LC).Design and Setting: We generated synthetic datasets based on observed clinical distributions and complex feature correlations among patients hospitalized at US Department of Veterans Affairs facilities. …”
Get full text
Article -
1148
Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection
Published 2024-09-01“…To address this issue, this study aims to develop and implement an artificial intelligence (AI)-driven system for electricity theft detection. Methodology used are data collection, data analysis, feature selection with Chi-Square, feature transformation with Principal Component Analysis (PCA), Support Vector Machine (SVM) and model for electricity theft detection. …”
Get full text
Article -
1149
A Sensor Data Prediction and Early-Warning Method for Coal Mining Faces Based on the MTGNN-Bayesian-IF-DBSCAN Algorithm
Published 2025-07-01“…By integrating original concentration data and residual features, gas anomalies are effectively identified by the proposed method, with the detection rate reaching a range of 93–96% and the false alarm rate controlled below 5%. …”
Get full text
Article -
1150
Detection of Foreign Bodies in Transmission Line Channels Based on Fusion of Swin Transformer and YOLOv5
Published 2025-03-01“…To address the challenges of complex detection background and poor detection performance for small targets, a transmission line channel security detection algorithm based on the fusion of window self-attention network and the YOLOv5 model is proposed. …”
Get full text
Article -
1151
Deep Learning for Detecting and Subtyping Renal Cell Carcinoma on Contrast-Enhanced CT Scans Using 2D Neural Network with Feature Consistency Techniques
Published 2025-07-01“… Objective The aim of this study was to explore an innovative approach for developing deep learning (DL) algorithm for renal cell carcinoma (RCC) detection and subtyping on computed tomography (CT): clear cell RCC (ccRCC) versus non-ccRCC using two-dimensional (2D) neural network architecture and feature consistency modules.…”
Get full text
Article -
1152
Temporal-Spatial Feature Extraction in IoT-Based SCADA System Security: Hybrid CNN-LSTM and Attention-Based Architectures for Malware Classification and Attack Detection
Published 2025-01-01“…This research presents a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model developed for malware classification from IoT devices in the SCADA system and for detecting anomalies in the network. The developed model identifies complex attacks in the network by taking advantage of the strengths of CNNs that reveal spatial features and LSTMs that detect temporal dependency. …”
Get full text
Article -
1153
YOLOv8-UCB: Visual Detection of Pouch Battery Using Improved YOLOv8
Published 2024-01-01“…Second, we constructed a distributed focal detection head CLLAHead, to better capture the features at different scales. …”
Get full text
Article -
1154
-
1155
GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection
Published 2025-06-01“…Traditional YOLO-series algorithms encounter challenges such as poor robustness in small object detection and significant interference from complex backgrounds. …”
Get full text
Article -
1156
A machine learning-based efficient anomaly detection system for enhanced security in compromised and maligned IoT Networks
Published 2025-06-01“…The proposed approach combines Modified Whale Transfer and Sine-Cosine algorithms along with feature selection techniques such as ANOVA, RFE, and RFA to detect malicious communications accurately. …”
Get full text
Article -
1157
Multi-Domain Controversial Text Detection Based on a Machine Learning and Deep Learning Stacked Ensemble
Published 2025-05-01“…Firstly, considering the multidimensional complexity of textual features, we integrate comprehensive feature engineering, i.e., encompassing word frequency, statistical metrics, sentiment analysis, and comment tree structure features, as well as advanced feature selection methodologies, particularly lassonet, i.e., a neural network with feature sparsity, to effectively address dimensionality challenges while enhancing model interpretability and computational efficiency. …”
Get full text
Article -
1158
CubicPat: Investigations on the Mental Performance and Stress Detection Using EEG Signals
Published 2025-02-01“…Classification results were obtained using the cumulative weighted iterative neighborhood component analysis (CWINCA) feature selector and the t-algorithm-based k-nearest neighbors (tkNN) classifier. …”
Get full text
Article -
1159
Research on Leak Detection and Localization Algorithm for Oil and Gas Pipelines Using Wavelet Denoising Integrated with Long Short-Term Memory (LSTM)–Transformer Models
Published 2025-04-01“…This paper introduces a novel leakage detection and localization algorithm for oil and gas pipelines, integrating wavelet denoising with a Long Short-Term Memory (LSTM)-Transformer model. …”
Get full text
Article -
1160
A Novel Long Short-Term Memory-Based Approach for Microgrid Fault Detection and Classification Using the Wavelet Scattering Transform
Published 2025-01-01“…During islanded operation, a common mode in microgrids, fault currents are often reduced, making fault detection and isolation even more difficult. These limitations underscore the urgent need for intelligent, adaptive, and fast-responding fault detection and classification algorithms tailored specifically to the nature of microgrids. …”
Get full text
Article