Showing 21 - 40 results of 68 for search 'priority detection algorithm', query time: 0.12s Refine Results
  1. 21

    Clinical Validation of a Program for Diagnosing Vision-Threatening Diabetic Retinopathy Based on Automatic Segmentation Algorithms by G. M. Gabaraev, E. N. Ponomareva, I. A. Loskutov, E. A. Katalevskaya, M. R. Khabazova

    Published 2023-07-01
    “…In the process of analyzing fundus photographs with Retina AI algorithms, a high efficiency of automatic detection of vision-threatening retinopathy was revealed. …”
    Get full text
    Article
  2. 22

    Enhancing Risk Prioritization in Healthcare Informatics: A Combined Vulnerability Scoring and Operational Framework Approach by Cecilio Jr GARCIANO

    Published 2025-05-01
    “…Developed using Python and PyQt5, the standalone application was validated using 20 synthesized hospital IT (Information Technology) issues at Peamount Healthcare, including examples such as system clock-in failures, annual leave miscalculations, and scheduling errors. The scoring algorithm employs weighted formulas: 60% weight is assigned to technical severity (CVSS), and 40% to operational urgency and impact (ITIL), providing a comprehensive view of each issue’s priority level. …”
    Get full text
    Article
  3. 23

    Development and Validation of a Machine Learning Model for Early Prediction of Sepsis Onset in Hospital Inpatients from All Departments by Pierre-Elliott Thiboud, Quentin François, Cécile Faure, Gilles Chaufferin, Barthélémy Arribe, Nicolas Ettahar

    Published 2025-01-01
    “…<b>Background:</b> With 11 million sepsis-related deaths worldwide, the development of tools for early prediction of sepsis onset in hospitalized patients is a global health priority. We developed a machine learning algorithm, capable of detecting the early onset of sepsis in all hospital departments. …”
    Get full text
    Article
  4. 24

    An Improved Unmanned Aerial Vehicle Forest Fire Detection Model Based on YOLOv8 by Bensheng Yun, Xiaohan Xu, Jie Zeng, Zhenyu Lin, Jing He, Qiaoling Dai

    Published 2025-03-01
    “…Taking into account efficiency and cost-effectiveness, deep-learning-driven UAV remote sensing fire detection algorithms have emerged as a favored research trend and have seen extensive application. …”
    Get full text
    Article
  5. 25

    Research on a Bone Stick Fragment Stitching Method Based on Improved Corner Detection by Jiahuan Liu, Huiqin Wang, Rui Liu, Ke Wang, Zhan Wang, Ting Wang

    Published 2025-04-01
    “…On this basis, the maximum outer contour is segmented using a region segmentation method based on corner features. Then, a priority matching strategy is used to perform multi-dimensional sequential priority matching of corner features for the densest segments and to match other contour segments in the order of density. …”
    Get full text
    Article
  6. 26

    IMPLEMENTATION OF THE DBSCAN ALGORITHM FOR CLUSTERING STUNTING PREVALENCE TYPOLOGY IN WEST JAVA, CENTRAL JAVA, AND EAST JAVA REGIONS by Bagus Sumargo, Kadir Kadir, Dena Safariza, Munawar Asikin, Dania Siregar, Nilam Novita Sari, Danu Umbara, Rizky Hilmianto, Robert Kurniawan, Irman Firmansyah

    Published 2025-07-01
    “…The group results can be valuable input for policy priorities in overcoming stunting. The study used the DBSCAN (Density-Based Spatial Clustering of Application with Noise) method, which can also detect noises (outliers). …”
    Get full text
    Article
  7. 27

    Study of high-speed malicious Web page detection system based on two-step classifier by Zheng-qi WANG, Xiao-bing FENG, Chi ZHANG

    Published 2017-08-01
    “…In view of the increasing number of new Web pages and the increasing pressure of traditional detection methods,the naive Bayesian algorithm and the support vector machine algorithm were used to design and implement a malicious Web detection system with both efficiency and function,TSMWD ,two-step malicious Web page detection.The first step of detection system was mainly used to filter a large number of normal Web pages,which was characterized by high efficiency,speed,update iteration easy,real rate priority.After the former filter,due to the limited number of samples,the main pursuit of the second step was the detection rate.The experimental results show that the proposed scheme can improve the detection speed of the system under the condition that the overall detection accuracy is basically the same,and can accept more detection requests in certain time.…”
    Get full text
    Article
  8. 28

    Blockchain enabled deep learning model with modified coati optimization for sustainable healthcare disease detection and classification by Heba G. Mohamed, Fadwa Alrowais, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel

    Published 2025-07-01
    “…For the optimal subset of features, the spotted hyena optimization algorithm (SHOA) model is used. Furthermore, the attention bidirectional gated recurrent unit (ABiGRU) method is implemented for disease detection and classification. …”
    Get full text
    Article
  9. 29

    Automatic detection and prediction of epileptic EEG signals based on nonlinear dynamics and deep learning: a review by Shixiao Tan, Zhen Tang, Qiang He, Ying Li, Yuliang Cai, Jiawei Zhang, Di Fan, Zhenkai Guo

    Published 2025-08-01
    “…Furthermore, this survey identifies persistent challenges including clinical translation barriers, algorithm performance trade-offs, and feature extraction/selection limitations. …”
    Get full text
    Article
  10. 30

    A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT by Zhong Li, Huimin Zhuang

    Published 2021-12-01
    “…Recently, the idea of applying the software-defined networking paradigm to industrial Internet of things is proposed by many scholars since this paradigm has the advantages of flexible deployment of intelligent algorithms and global coordination capabilities. These advantages prompt us to propose a multi-factor integration-based semi-supervised learning address resolution protocol detection method deployed in software-defined networking, called MIS, to specially solve the problems of limited labeled training data and incomplete features extraction in the traditional address resolution protocol detection methods. …”
    Get full text
    Article
  11. 31

    Optical Sensor-Based Approaches in Obesity Detection: A Literature Review of Gait Analysis, Pose Estimation, and Human Voxel Modeling by Sabrine Dhaouadi, Mohamed Moncef Ben Khelifa, Ala Balti, Pascale Duché

    Published 2025-07-01
    “…Optical sensor technologies are reshaping obesity detection by enabling non-invasive, dynamic analysis of biomechanical and morphological biomarkers. …”
    Get full text
    Article
  12. 32

    Automatic Detection for Mining Subsidence Areas Using the CBAM-Enhanced VGG-UNet Model With Long Time Series InSAR Interferograms by Kegui Jiang, Keming Yang, Mengting Gao, Liuguo Zhu, Chuang Jiang

    Published 2025-01-01
    “…The technical theories of monitoring and preventing mining subsidence have long been key challenges and research priorities in the mining field. The rapid advancements in remote sensing technology and deep learning algorithms have enabled significant breakthroughs in monitoring and accurately identifying mining subsidence. …”
    Get full text
    Article
  13. 33

    A comparative study of deepfake facial manipulation technique using generative adversarial networks by Wasin Al Kishri, Jabar H. Yousif, Mahmood Al Bahri, Muhammad Zakarya, Naveed Khan, Sanad Sulaiman Al Maskari, Ahmet Gurhanli

    Published 2025-06-01
    “…In recent years, Deepfake algorithms have been designed to exchange faces or modify facial features, potentially leading to more severe problems in this context. …”
    Get full text
    Article
  14. 34

    Multi-Temporal Remote Sensing Satellite Data Analysis for the 2023 Devastating Flood in Derna, Northern Libya by Roman Shults, Ashraf Farahat, Muhammad Usman, Md Masudur Rahman

    Published 2025-02-01
    “…High-resolution GEOEYE-1 images of Derna city were investigated for change detection algorithms. In addition, different indices (normalized difference vegetation index (NDVI), soil adjusted vegetation index (SAVI), transformed NDVI (TNDVI), and normalized difference moisture index (NDMI)) were calculated to facilitate the recognition of damaged regions. …”
    Get full text
    Article
  15. 35

    A Hybrid Deep Learning–Based Feature Selection Approach for Supporting Early Detection of Long-Term Behavioral Outcomes in Survivors of Cancer: Cross-Sectional Study by Tracy Huang, Chun-Kit Ngan, Yin Ting Cheung, Madelyn Marcotte, Benjamin Cabrera

    Published 2025-03-01
    “…ObjectiveThis study aimed to create a new feature selection algorithm to improve the performance of machine learning classifiers to predict negative long-term behavioral outcomes in survivors of cancer. …”
    Get full text
    Article
  16. 36

    From intensive care monitors to cloud environments: a structured data pipeline for advanced clinical decision supportResearch in context by Sijm H. Noteboom, Eline Kho, Maria Galanty, Clara I. Sánchez, Frans C.P. ten Bookum, Denise P. Veelo, Alexander P.J. Vlaar, Björn J.P. van der Ster

    Published 2025-01-01
    “…Summary: Background: Clinical decision-making is increasingly shifting towards data-driven approaches and requires large databases to develop state-of-the-art algorithms for diagnosing, detecting and predicting diseases. …”
    Get full text
    Article
  17. 37
  18. 38

    Research on the Key Issues of Big Data Quality Management, Evaluation, and Testing for Automotive Application Scenarios by Yingzi Wang, Ce Yu, Jue Hou, Yongjia Zhang, Xiangyi Fang, Shuyue Wu

    Published 2021-01-01
    “…To improve the operational efficiency of complex data quality management algorithms in large-scale data scenarios, corresponding parallelization algorithms are studied and implemented for detection and repair algorithms with long computation time, including priority-based multiconditional function-dependent detection and repair algorithms, entity detection, and extraction algorithms based on semantic information and chunking techniques, and plain Bayesian-based missing value filling algorithms, and this paper proposes a data validity evaluation algorithm and enhances the validity of the original data in practical applications by adding temporal weights, and finally it passed the experimental validation. …”
    Get full text
    Article
  19. 39

    Improving Multi-Class Classification for Recognition of the Prioritized Classes Using the Analytic Hierarchy Process by Algimantas Venčkauskas, Jevgenijus Toldinas, Nerijus Morkevičius

    Published 2025-06-01
    “…Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). …”
    Get full text
    Article
  20. 40

    Effective and fair cognitive terminal assignment scheme for cooperative spectrum sensing by WU Zhiqiang, LIU Qianli, LIU Jiabin, FENG Qing, XIAO Shanpeng, LIU Shang

    Published 2024-06-01
    “…For the perceived fairness among different sub-bands, two allocation algorithms were proposed: the arcuate allocation algorithm and the class division allocation algorithm. …”
    Get full text
    Article