Showing 121 - 140 results of 554 for search 'negative detection algorithm', query time: 0.13s Refine Results
  1. 121

    Unsupervised Detection of Suspicious Tissue Using Data Modeling and PCA by Ikhlas Abdel-Qader, Lixin Shen, Christina Jacobs, Fadi Abu Amara, Sarah Pashaie-Rad

    Published 2006-01-01
    “…Evaluation of the algorithm is based on the percentage of correct classification, false positive (FP) and false negative (FN) in all experimental work using real data. …”
    Get full text
    Article
  2. 122

    Developing an Intelligent System for Efficient Botnet Detection in IoT Environment by Ramesh Singh Rawat, Manoj Diwakar, Umang Garg, Prakash Srivastava

    Published 2025-04-01
    “…We calculated each algorithm's Accuracy, True Positive, False Positive, False Negative, True Negative, Precision, and Recall. …”
    Get full text
    Article
  3. 123

    Spatial-Temporal Correlative Fault Detection in Wireless Sensor Networks by Zhiping Kang, Honglin Yu, Qingyu Xiong, Haibo Hu

    Published 2014-12-01
    “…Experiments using a real dataset from the Intel Berkeley Research Laboratory showed that the algorithm can give a high level of accuracy and a low false alarm rate when detecting faults even when there are many faulty sensors.…”
    Get full text
    Article
  4. 124

    Calibration and uncertainty quantification for deep learning-based drought detection by Mengxue Zhang, Miguel-Ángel Fernández-Torres, Kai-Hendrik Cohrs, Gustau Camps-Valls

    Published 2025-06-01
    “…To address this shortcoming, we introduce methodologies for model calibration and entropy-based uncertainty quantification for deep learning-based drought detection. The calibration algorithm can deal with calibration errors by reducing distributional shifts and alleviating overconfident predictions. …”
    Get full text
    Article
  5. 125

    Detecting phishing gangs via taint analysis on the Ethereum blockchain by Kangrui Huang, Weili Chen, Zibin Zheng

    Published 2023-01-01
    “…Based on this, we propose a heuristics algorithm for phishing gang detection. And we also summarize gang patterns and reveal money laundering in phishing activities. …”
    Get full text
    Article
  6. 126

    FDN: A Real-Time Ensemble Fire Detection Network by Dong Hwan Shin, Jang Mook Kang, Taesu Cheong

    Published 2025-01-01
    “…The proposed model effectively distinguishes between fog and clouds, similar to smoke, and light and sunlight, akin to a real fire using the Partial-Loss-Balanced Task Weighting (P-LBTW) algorithm we develop to reduce negative transfer by partially learning task-specific weights. …”
    Get full text
    Article
  7. 127

    Design of an Intelligent Pear Bagging End-Effector Based on Yolov8 and SGBM Algorithm by Jing Ruijun, Liu JingKai, LiXin, ZhiguoZhao

    Published 2024-01-01
    “…We describe an intelligent bagging end-effector for pears, which employs the Yolov8 algorithm for fruitlets detection and the Semi-Global Block Matching (SGBM) algorithm to acquire three-dimensional spatial information of the targets. …”
    Get full text
    Article
  8. 128
  9. 129

    THANTD: Triplet Hybrid Attention Network for Hyperspectral Target Detection by Ju Liu, Haoqian Wang, Xiangai Cheng, Zhongyang Xing, Zhongjie Xu

    Published 2025-01-01
    “…This structure captures both global spectral features and relationships between spectral channels. Utilizing a coarse detection and radiation transmission model for data augmentation, we introduce a method to construct positive and negative samples, enabling better selection of pure target and background samples, which simulates real-world spectral variations to support triplet network training. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132

    qHBsAg for the Identification of Liver Histological Abnormalities in HBeAg-Negative Chronic Hepatitis B Patients with Normal and Mildly Elevated ALT Levels by Qinyi Gan, Yan Huang, Chuanwu Zhu, Shuang Zhao, Haoshuang Fu, Minghao Cai, Jiexiao Wang, Chenxi Zhang, Simin Guo, Zhujun Cao, Qing Xie

    Published 2022-01-01
    “…Backgrounds. Noninvasive detection of histological abnormalities remains challenging in patients with HBeAg-negative chronic HBV infection with normal or mildly elevated levels of alanine aminotransferase (ALT). …”
    Get full text
    Article
  13. 133

    Enhanced object detection in low-visibility haze conditions with YOLOv9s. by Yang Zhang, Bin Zhou, Xue Zhao, Xiaomeng Song

    Published 2025-01-01
    “…Low-visibility haze environments, marked by their inherent low contrast and high brightness, present a formidable challenge to the precision and robustness of conventional object detection algorithms. This paper introduces an enhanced object detection framework for YOLOv9s tailored for low-visibility haze conditions, capitalizing on the merits of contrastive learning for optimizing local feature details, as well as the benefits of multiscale attention mechanisms and dynamic focusing mechanisms for achieving real-time global quality optimization. …”
    Get full text
    Article
  14. 134

    An update on multimodal imaging strategies for nipple discharge: from detection to decision by Mireia Pitarch, Rodrigo Alcantara, Laura Comerma, Ivonne Vázquez de Las Heras, Javier Azcona, Antonia Wiedemann, Maja Prutki, Eva Maria Fallenberg

    Published 2025-03-01
    “…With its high sensitivity and negative predictive value of almost 100%, a negative MRI can often obviate the need for surgery. …”
    Get full text
    Article
  15. 135

    Detection of sugar beet seed coating defects via deep learning by Abdullah Beyaz, Zülfi Saripinar

    Published 2025-05-01
    “…Using the YOLO algorithm, it is possible to detect and categorize coating defects on sugar beet seeds, thereby enhancing seed quality and production swiftly, and effectively. …”
    Get full text
    Article
  16. 136

    Detecting Anomalies in Sequences of Short Text Using Iterative Language Models by Cynthia Freeman, Ian Beaver, Abdullah Mueen

    Published 2021-04-01
    “…Unfortunately, anomaly detection is a challenging problem because of the subjective nature of what is defined as anomalous. …”
    Get full text
    Article
  17. 137
  18. 138

    BCAST IDS: A Novel Network Intrusion Detection System for Broadcast Networks by Javier Gombao

    Published 2025-01-01
    “…Network Intrusion Detection Systems (NIDSs) play a pivotal role in cybersecurity by identifying malicious activities through network traffic information to safeguard network infrastructures and digital assets from disruptions and other negative consequences. …”
    Get full text
    Article
  19. 139
  20. 140

    Augmented Reality for Learning Algorithms: Evaluation of Its Impact on Students’ Emotions Using Artificial Intelligence by Mónica Gómez-Ríos, Maximiliano Paredes-Velasco, J. Ángel Velázquez-Iturbide, Miguel Ángel Quiroz Martínez

    Published 2025-07-01
    “…This article inquires about the impact on students’ emotions of an augmented reality tool for learning Dijkstra’s algorithm. This investigation uses an artificial intelligence tool that detects emotions in real time through facial recognition. …”
    Get full text
    Article