Showing 1,181 - 1,200 results of 2,109 for search 'low detection algorithm', query time: 0.15s Refine Results
  1. 1181

    A Biologically Inspired Cost-Efficient Zero-Trust Security Approach for Attacker Detection and Classification in Inter-Satellite Communication Networks by Sridhar Varadala, Hao Xu

    Published 2025-07-01
    “…In next-generation Low-Earth-Orbit (LEO) satellite networks, securing inter-satellite communication links (ISLs) through strong authentication is essential due to the network’s dynamic and distributed structure. …”
    Get full text
    Article
  2. 1182

    AI‐ECG for early detection of atrial fibrillation: First‐year results from a stroke prevention study in Shimizu, Japan by Mayumi Masumura, Atsuyuki Ohno, Haruhiko Yoshinaga, Takeshi Sasaki, Yasuteru Yamauchi, Hitoshi Hachiya, Atsushi Takahashi, Yasushi Imai, Hideo Fujita, Kensuke Ihara, Yusuke Ebana, Toshihiro Tanaka, Tetsushi Furukawa, Tetsuo Sasano

    Published 2025-08-01
    “…Abstract Background An artificial intelligence algorithm‐guided electrocardiogram (AI‐ECG) has been developed to detect atrial fibrillation (AF) in patients with sinus rhythm (SR). …”
    Get full text
    Article
  3. 1183

    3D-Printed PLA Hollow Microneedles Loaded with Chitosan Nanoparticles for Colorimetric Glucose Detection in Sweat Using Machine Learning by Anastasia Skonta, Myrto G. Bellou, Haralambos Stamatis

    Published 2025-07-01
    “…The developed biosensor system exhibited a good linear response range toward glucose (0.025−0.375 mM), a low limit of detection (0.023 mM), a limit of quantification (0.078 mM), high specificity, and recovery rates ranging between 86–112%. …”
    Get full text
    Article
  4. 1184
  5. 1185

    An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios by Fujiu Xu, Jianqiang Li, Xi Xu

    Published 2025-02-01
    “…This paper proposes an encrypted speech integrity authentication method that can simultaneously address both of problems, and its main contributions are as follows: (1) A 2-least significant bit (2-LSB)-based dual fragile watermarking method is proposed to improve tampering detection performance. This method constructs correlations between encrypted speech sampling points by 2-LSB-based fragile watermarking embedding method and achieves low-error tampering detection of tampered sampling points based on four types of fragile watermarkings. (2) A speech self-recovery model based on residual recovery-based linear interpolation (R2-Lerp) is proposed to achieve tampering recovery under high tampering ratios. …”
    Get full text
    Article
  6. 1186

    Detection of mixed infection from bacterial whole genome sequence data allows assessment of its role in Clostridium difficile transmission. by David W Eyre, Madeleine L Cule, David Griffiths, Derrick W Crook, Tim E A Peto, A Sarah Walker, Daniel J Wilson

    Published 2013-01-01
    “…Given the relatively low density of single nucleotide polymorphisms within bacterial sequence data, direct reconstruction of mixed infection haplotypes from current short-read sequence data is not consistently possible. …”
    Get full text
    Article
  7. 1187

    Lateral Flow Loop-Mediated Isothermal Amplification Test with Stem Primers: Detection of Cryptosporidium Species in Kenyan Children Presenting with Diarrhea by Timothy S. Mamba, Cecilia K. Mbae, Johnson Kinyua, Erastus Mulinge, Gitonga Nkanata Mburugu, Zablon K. Njiru

    Published 2018-01-01
    “…The SAM-1 LAMP detected 27/39. On detection of Cryptosporidium DNA in 67 clinical samples, the stem LFD LAMP detected 16 samples and SAM-2 LAMP 14 and nested PCR identified 11. …”
    Get full text
    Article
  8. 1188

    MODEL OF ORGANIZATION OF KIDNEY CANCER EARLY DIAGNOSIS by V. G. Moreva, G. N. Alekseeva, P. F. Kiku, L. I. Gurina, K. M. Sabirova, V. N. Rasskazova

    Published 2021-05-01
    “…The model included a population questionnaire to identify risk factors and algorithm of patient routing («roadmap») with suspected kidney cancer for in-depth examination and treatment. …”
    Get full text
    Article
  9. 1189

    A Fish Target Identification and Counting Method Based on DIDSON Sonar and YOLOv5 Model by Wei Shen, Mengqi Liu, Quanshui Lu, Zhaowei Yin, Jin Zhang

    Published 2024-08-01
    “…In order to more accurately and quickly identify and count underwater fish targets, and to address the issues of excessive reliance on manual processes and low processing efficiency in the identification and counting of fish targets using sonar data, a method based on DIDSON and YOLOv5 for fish target identification and counting is proposed. …”
    Get full text
    Article
  10. 1190

    A combination of urinary biomarker panel and PancRISK score for earlier detection of pancreatic cancer: A case-control study. by Silvana Debernardi, Harrison O'Brien, Asma S Algahmdi, Nuria Malats, Grant D Stewart, Marija Plješa-Ercegovac, Eithne Costello, William Greenhalf, Amina Saad, Rhiannon Roberts, Alexander Ney, Stephen P Pereira, Hemant M Kocher, Stephen Duffy, Oleg Blyuss, Tatjana Crnogorac-Jurcevic

    Published 2020-12-01
    “…We have previously described a promising biomarker panel (LYVE1, REG1A, and TFF1) for earlier detection of PDAC in urine. Here, we aimed to establish the accuracy of an improved panel, including REG1B instead of REG1A, and an algorithm for data interpretation, the PancRISK score, in additional retrospectively collected urine specimens. …”
    Get full text
    Article
  11. 1191

    Identification of Mattic Epipedon Degradation on the Northeastern Qinghai–Tibetan Plateau Using Hyperspectral Data by Junjun Zhi, Hong Zhu, Jingwen Yang, Qiuchen Yan, Dandan Zhi, Zhongbao Sun, Liangwei Ge, Chengwen Lv

    Published 2025-06-01
    “…The characteristic bands were concentrated in the visible light range (446–450 nm) and short-wave infrared range (2134 nm, 2267–2269 nm), which are closely related to the spectral responses of organic carbon and mineral components. (2) Spectral reflectance was significantly negatively correlated with moisture content, and model accuracy decreased as moisture content increased. (3) After correction using the EPO algorithm, the model accuracy for the high-moisture group improved by 13.2–16.7%, whereas that for the low-moisture group (<15%) decreased by 7.5%, verifying 15% moisture content as the critical threshold for water interference. …”
    Get full text
    Article
  12. 1192
  13. 1193

    Rapid differentiation of patients with lung cancers from benign lung nodule based on dried serum Fourier-transform infrared spectroscopy combined with machine learning algorithms by Huanyu Li, Lixue Dai, Shaomei Guo, Hongluan Wang, Lei Lei, Jie Yu, Xiaoyun Li, Jun Wang

    Published 2025-08-01
    “…Lung cancer (LC) is associated with poor 5-year survival rates when diagnosed at advanced stages. While low-dose computed tomography (LDCT) screening enables earlier detection, its high false-positive rate, primarily due to benign lung nodules (BLN), necessitates more accurate diagnostic tools. …”
    Get full text
    Article
  14. 1194

    A Robust Multispectral Reconstruction Network from RGB Images Trained by Diverse Satellite Data and Application in Classification and Detection Tasks by Xiaoning Zhang, Zhaoyang Peng, Yifei Wang, Fan Ye, Tengying Fu, Hu Zhang

    Published 2025-05-01
    “…This study further reveals the potential of multispectral image reconstruction from natural color RGB images and its effectiveness in target detection, which promotes low-cost visual perception of intelligent unmanned systems.…”
    Get full text
    Article
  15. 1195

    Water tank and swimming pool detection based on remote sensing and deep learning: Relationship with socioeconomic level and applications in dengue control. by Higor Souza Cunha, Brenda Santana Sclauser, Pedro Fonseca Wildemberg, Eduardo Augusto Militão Fernandes, Jefersson Alex Dos Santos, Mariana de Oliveira Lage, Camila Lorenz, Gerson Laurindo Barbosa, José Alberto Quintanilha, Francisco Chiaravalloti-Neto

    Published 2021-01-01
    “…With mosaics of images obtained by a 12.1 MP Canon PowerShot S100 (5.2 mm focal length) carried by unmanned aerial vehicles, we developed deep learning algorithms in the scope of computer vision for the detection of water tanks and swimming pools. …”
    Get full text
    Article
  16. 1196

    ENHANCEMENT OF SENSOR PANEL TACTILE TOUCH INTERFACE by Oleksandr Karpin, Zinovii Liubun, Vasyl Mandziy, Oleh Tereshchuk, Nestor Hotsiy

    Published 2025-03-01
    “…Additionally, the algorithm's low computational requirements make it suitable for use in low-power devices, such as those powered by batteries or energy harvesting systems. …”
    Get full text
    Article
  17. 1197

    Advances in Aircraft Skin Defect Detection Using Computer Vision: A Survey and Comparison of YOLOv9 and RT-DETR Performance by Nutchanon Suvittawat, Christian Kurniawan, Jetanat Datephanyawat, Jordan Tay, Zhihao Liu, De Wen Soh, Nuno Antunes Ribeiro

    Published 2025-04-01
    “…Beyond a detailed review, we experimentally evaluate the accuracy and feasibility of existing low-cost, easily deployable hardware (drone) and software solutions (computer vision algorithms). …”
    Get full text
    Article
  18. 1198
  19. 1199

    A novel hybrid fuzzy logic and federated learning framework for enhancing cybersecurity and fraud detection in IoT-enabled metaverse transactions by Amjad Rehman, Kamran Ahmad Awan, Amal Al-Rasheed, Anees Ara, Fahad F. Alruwaili, Shaha Al-Otaibi, Tanzila Saba

    Published 2025-06-01
    “…The optimized federated learning model for IoT devices implements lightweight algorithms with hierarchical aggregation that reduce computational and communication overhead to enhance fraud detection capabilities. …”
    Get full text
    Article
  20. 1200

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article