Search alternatives:
detection based » detection system (Expand Search)
larger » large (Expand Search)
decrease » increase (Expand Search)
Showing 41 - 60 results of 309 for search '(( significant ((larger decrease) OR (largest decrease)) ) OR ( significant detection based ))', query time: 0.12s Refine Results
  1. 41

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…Many people can find difficulty accessing diagnostic healthcare services for many reasons including, but not limited to economical and regional factors. ML based informal diagnostic and decision support systems can provide a first line of detection to alert patients about potential disease risk. …”
    Get full text
  2. 42

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …”
    Get full text
  3. 43
  4. 44

    Deep Learning for Arabic Error Detection and Correction by ALKHATIB, MANAR

    Published 2020
    “…We introduce an approach that investigates employing deep neural network technology for error detection in Arabic text. We have developed a systematic framework for spelling and grammar error detection, as well as correction at the word level, based on a bidirectional long short-term memory mechanism and word embedding, in which a polynomial network classifier is at the top of the sys tem. …”
    Get full text
    Get full text
  5. 45

    Creating and detecting fake reviews of online products by Joni Salminen (7434770)

    Published 2022
    “…In this research, we address the creation and detection of fake reviews. First, we experiment with two language models, ULMFiT and GPT-2, to generate fake product reviews based on an Amazon e-commerce dataset. …”
  6. 46

    Early detection of struvite formation in wastewater treatment plants by Fattah, Kazi Parvez

    Published 2015
    “…Among the many possible phosphate-based precipitated, struvite is the most common. …”
    Get full text
    article
  7. 47

    Graphical Insight: Revolutionizing Seizure Detection with EEG Representation by Muhammad Awais (263096)

    Published 2024
    “…Our experimental results reveal that both models significantly improve seizure detection accuracy, surpassing previous methods. …”
  8. 48
  9. 49

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…In the new era of digital communications, cyberbullying is a significant concern for society. Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
    Get full text
  10. 50
  11. 51

    BTM: Boundary Trimming Module for Temporal Action Detection by Maher Hamdi (6207746)

    Published 2022
    “…This paper addresses this problem with a novel Boundary Trimming Module (BTM), a post-processing method that adjusts the temporal boundaries of the detected actions from existing TAD solutions. Specifically, BTM operates based on the classification of frames in the input video, aiming to detect the action more accurately by adjusting the surrounding frames of the start and end frames of the original detection results. …”
  12. 52

    Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE by ALSHAMSI, OMAR KHALIFA ALI ALREZI

    Published 2025
    “…Due to the rapid adoption of smart technologies in smart homes, the Open Web Application Security Project has identified weak or easily guessable passwords as a significant vulnerability in IoT devices, based on real-world incidents. …”
    Get full text
  13. 53
  14. 54
  15. 55

    Explainable phishing website detection for secure and sustainable cyber infrastructure by Tanzila Kehkashan (20748842)

    Published 2025
    “…To overcome this issue, this research applies feature selection techniques, specifically shapley additive explanations, with each model based primarily on the URL to improve the detection process. …”
  16. 56

    Network Packet Transformation Approaches for Intrusion Detection Systems: A Survey by Somaya Eltanbouly (22565864)

    Published 2025
    “…In a survey of recent popular papers, we identified four main categories of data representations: numerical, pixel-based, sequence-based, and graph-based approaches. …”
  17. 57

    Substrate Dependent Analysis of Printed Sensors for Detection of Volatile Organic Compounds by Saleem Khan (3556286)

    Published 2019
    “…The comparative studies show a strong dependence of the VOCs detection on the type of substrates. Pros and cons of all the substrates, based on the processability, wearability, sensitivity and response times etc. are evaluated. …”
  18. 58

    Classification and segmentation of kidney MRI images for chronic kidney disease detection by Md. Sakib Bin Islam (20494559)

    Published 2024
    “…<p>Chronic Kidney Disease (CKD) is a common ailment with significant public health implications, underscoring the critical importance of early detection and diagnosis for effective management. …”
  19. 59
  20. 60

    Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu by Ayesha Atif (22155133)

    Published 2024
    “…Manual detection of abnormal and bullying behavior within the realm of social media is inherently not scalable. …”