-
21
Clinical Validation of a Program for Diagnosing Vision-Threatening Diabetic Retinopathy Based on Automatic Segmentation Algorithms
Published 2023-07-01“…In the process of analyzing fundus photographs with Retina AI algorithms, a high efficiency of automatic detection of vision-threatening retinopathy was revealed. …”
Get full text
Article -
22
Enhancing Risk Prioritization in Healthcare Informatics: A Combined Vulnerability Scoring and Operational Framework Approach
Published 2025-05-01“…Developed using Python and PyQt5, the standalone application was validated using 20 synthesized hospital IT (Information Technology) issues at Peamount Healthcare, including examples such as system clock-in failures, annual leave miscalculations, and scheduling errors. The scoring algorithm employs weighted formulas: 60% weight is assigned to technical severity (CVSS), and 40% to operational urgency and impact (ITIL), providing a comprehensive view of each issue’s priority level. …”
Get full text
Article -
23
Development and Validation of a Machine Learning Model for Early Prediction of Sepsis Onset in Hospital Inpatients from All Departments
Published 2025-01-01“…<b>Background:</b> With 11 million sepsis-related deaths worldwide, the development of tools for early prediction of sepsis onset in hospitalized patients is a global health priority. We developed a machine learning algorithm, capable of detecting the early onset of sepsis in all hospital departments. …”
Get full text
Article -
24
An Improved Unmanned Aerial Vehicle Forest Fire Detection Model Based on YOLOv8
Published 2025-03-01“…Taking into account efficiency and cost-effectiveness, deep-learning-driven UAV remote sensing fire detection algorithms have emerged as a favored research trend and have seen extensive application. …”
Get full text
Article -
25
Research on a Bone Stick Fragment Stitching Method Based on Improved Corner Detection
Published 2025-04-01“…On this basis, the maximum outer contour is segmented using a region segmentation method based on corner features. Then, a priority matching strategy is used to perform multi-dimensional sequential priority matching of corner features for the densest segments and to match other contour segments in the order of density. …”
Get full text
Article -
26
IMPLEMENTATION OF THE DBSCAN ALGORITHM FOR CLUSTERING STUNTING PREVALENCE TYPOLOGY IN WEST JAVA, CENTRAL JAVA, AND EAST JAVA REGIONS
Published 2025-07-01“…The group results can be valuable input for policy priorities in overcoming stunting. The study used the DBSCAN (Density-Based Spatial Clustering of Application with Noise) method, which can also detect noises (outliers). …”
Get full text
Article -
27
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01“…In view of the increasing number of new Web pages and the increasing pressure of traditional detection methods,the naive Bayesian algorithm and the support vector machine algorithm were used to design and implement a malicious Web detection system with both efficiency and function,TSMWD ,two-step malicious Web page detection.The first step of detection system was mainly used to filter a large number of normal Web pages,which was characterized by high efficiency,speed,update iteration easy,real rate priority.After the former filter,due to the limited number of samples,the main pursuit of the second step was the detection rate.The experimental results show that the proposed scheme can improve the detection speed of the system under the condition that the overall detection accuracy is basically the same,and can accept more detection requests in certain time.…”
Get full text
Article -
28
Blockchain enabled deep learning model with modified coati optimization for sustainable healthcare disease detection and classification
Published 2025-07-01“…For the optimal subset of features, the spotted hyena optimization algorithm (SHOA) model is used. Furthermore, the attention bidirectional gated recurrent unit (ABiGRU) method is implemented for disease detection and classification. …”
Get full text
Article -
29
Automatic detection and prediction of epileptic EEG signals based on nonlinear dynamics and deep learning: a review
Published 2025-08-01“…Furthermore, this survey identifies persistent challenges including clinical translation barriers, algorithm performance trade-offs, and feature extraction/selection limitations. …”
Get full text
Article -
30
A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT
Published 2021-12-01“…Recently, the idea of applying the software-defined networking paradigm to industrial Internet of things is proposed by many scholars since this paradigm has the advantages of flexible deployment of intelligent algorithms and global coordination capabilities. These advantages prompt us to propose a multi-factor integration-based semi-supervised learning address resolution protocol detection method deployed in software-defined networking, called MIS, to specially solve the problems of limited labeled training data and incomplete features extraction in the traditional address resolution protocol detection methods. …”
Get full text
Article -
31
Optical Sensor-Based Approaches in Obesity Detection: A Literature Review of Gait Analysis, Pose Estimation, and Human Voxel Modeling
Published 2025-07-01“…Optical sensor technologies are reshaping obesity detection by enabling non-invasive, dynamic analysis of biomechanical and morphological biomarkers. …”
Get full text
Article -
32
Automatic Detection for Mining Subsidence Areas Using the CBAM-Enhanced VGG-UNet Model With Long Time Series InSAR Interferograms
Published 2025-01-01“…The technical theories of monitoring and preventing mining subsidence have long been key challenges and research priorities in the mining field. The rapid advancements in remote sensing technology and deep learning algorithms have enabled significant breakthroughs in monitoring and accurately identifying mining subsidence. …”
Get full text
Article -
33
A comparative study of deepfake facial manipulation technique using generative adversarial networks
Published 2025-06-01“…In recent years, Deepfake algorithms have been designed to exchange faces or modify facial features, potentially leading to more severe problems in this context. …”
Get full text
Article -
34
Multi-Temporal Remote Sensing Satellite Data Analysis for the 2023 Devastating Flood in Derna, Northern Libya
Published 2025-02-01“…High-resolution GEOEYE-1 images of Derna city were investigated for change detection algorithms. In addition, different indices (normalized difference vegetation index (NDVI), soil adjusted vegetation index (SAVI), transformed NDVI (TNDVI), and normalized difference moisture index (NDMI)) were calculated to facilitate the recognition of damaged regions. …”
Get full text
Article -
35
A Hybrid Deep Learning–Based Feature Selection Approach for Supporting Early Detection of Long-Term Behavioral Outcomes in Survivors of Cancer: Cross-Sectional Study
Published 2025-03-01“…ObjectiveThis study aimed to create a new feature selection algorithm to improve the performance of machine learning classifiers to predict negative long-term behavioral outcomes in survivors of cancer. …”
Get full text
Article -
36
From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context
Published 2025-01-01“…Summary: Background: Clinical decision-making is increasingly shifting towards data-driven approaches and requires large databases to develop state-of-the-art algorithms for diagnosing, detecting and predicting diseases. …”
Get full text
Article -
37
Enhanced Flow Rate-Based Queuing Discipline for Contention Avoidance in SD-WANs
Published 2025-01-01Get full text
Article -
38
Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios
Published 2021-01-01“…To improve the operational efficiency of complex data quality management algorithms in large-scale data scenarios, corresponding parallelization algorithms are studied and implemented for detection and repair algorithms with long computation time, including priority-based multiconditional function-dependent detection and repair algorithms, entity detection, and extraction algorithms based on semantic information and chunking techniques, and plain Bayesian-based missing value filling algorithms, and this paper proposes a data validity evaluation algorithm and enhances the validity of the original data in practical applications by adding temporal weights, and finally it passed the experimental validation. …”
Get full text
Article -
39
Improving Multi-Class Classification for Recognition of the Prioritized Classes Using the Analytic Hierarchy Process
Published 2025-06-01“…Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). …”
Get full text
Article -
40
Effective and fair cognitive terminal assignment scheme for cooperative spectrum sensing
Published 2024-06-01“…For the perceived fairness among different sub-bands, two allocation algorithms were proposed: the arcuate allocation algorithm and the class division allocation algorithm. …”
Get full text
Article