Results for 'Pedestrian detection'

678 found
Order:
  1. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Omissive Overdetermination: Why the Act-Omission Distinction Makes a Difference for Causal Analysis.Yuval Abrams - 2022 - University of Western Australia Law Review 1 (49):57-86.
    Analyses of factual causation face perennial problems, including preemption, overdetermination, and omissions. Arguably, the thorniest, are cases of omissive overdetermination, involving two independent omissions, each sufficient for the harm, and neither, independently, making a difference. A famous example is Saunders, where pedestrian was hit by a driver of a rental car who never pressed on the (unbeknownst to the driver) defective (and, negligently, never inspected) brakes. Causal intuitions in such cases are messy, reflected in disagreement about which omission mattered. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Pedestrian Behaviour on Different Streets in Tirana's Context, Albania.Klodjan Xhexhi - 2023 - International Conference on Social Science Research Iconsr 2023 At: Budva, Montenegro 6.
    The aim of this paper is to make a comparison between different streets typology (with a distribution from center to suburb) specified in Tirana, taking into account the pedestrians' behavior on these streets. This paper will primarily focus on the following streets: “Myslym Shyri” street, “Bllok” area, “Kombinat” area, (an extension of Kavaja’s Street), and also “Ana Komnena” street (former “Fusha e Aviacionit”). The pedestrian actions, likeness, dissatisfaction, walking distance while transferring to another zone, greenery effects on pedestrians, time (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Study of Pedestrian Behavior on Various Streets, Tirana, Albania.Klodjan Xhexhi - 2024 - Academic Journal of History and Idea 11 (1):388-406.
    The purpose of this article is to compare several street typologies (distributed from center to suburb) in Tirana, Albania while taking into consideration pedestrian behavior on these pathways. The streets "Myslym Shyri," "Bllok," "Kombinat" (an extension of Kavaja's Street), and "Ana Komnena" (formerly "Fusha e Aviacionit") will be the primary focus of this study. The following variables will be taken into account such as pedestrian behaviors, street identity, dissatisfaction, walking distance when shifting to another zone, effects of greenery (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  6. The Sublime in the Pedestrian: Figures of the Incognito in Fear and Trembling.Martijn Boven - 2021 - History of European Ideas 47 (3):500-513.
    This article demonstrates a novel conceptualization of sublimity: the sublime in the pedestrian. This pedestrian mode of sublimity is exemplified by the Biblical Abraham, the central figure of Kierkegaard’s pseudonymous Fear and Trembling. It is rooted in the analysis of one of the foundational stories of the three monotheistic religions: Abraham’s averted sacrifice of his son Isaac. The defining feature of this new, pedestrian mode of sublimity is that is remains hidden behind what I call a total (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Deception Detection Research: Some Lessons for Epistemology.Peter Graham - 2024 - In Waldomiro J. Silva-Filho (ed.), Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   92 citations  
  9. Rule following: A pedestrian approach.Masahiro Yamada - 2010 - Philosophy and Phenomenological Research 80 (2):283-311.
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  10. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. True Detective : Pessimism, Buddhism or Philosophy?Finn Janning - 2015 - Journal of Philosophy of Life 5 (1).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  15.  24
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  43
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  73
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Introspection Is Signal Detection.Jorge Morales - forthcoming - British Journal for the Philosophy of Science.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  19. (1 other version)External Human–Machine Interfaces for Autonomous Vehicle-to-Pedestrian Communication: A Review of Empirical Work. [REVIEW]Alexandros Rouchitsas & Håkan Alm - 2019 - Frontiers in Psychology 10.
    Interaction between drivers and pedestrians is often facilitated by informal communicative cues, like hand gestures, facial expressions, and eye contact. In the near future, however, when semi- and fully autonomous vehicles are introduced into the traffic system, drivers will gradually assume the role of mere passengers, who are casually engaged in non-driving-related activities and, therefore, unavailable to participate in traffic interaction. In this novel traffic environment, advanced communication interfaces will need to be developed that inform pedestrians of the current state (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  22. Breakthroughs in Breast Cancer Detection: Emerging Technologies and Future Prospects.Ola I. A. Lafi, Rawan N. A. Albanna, Dina F. Alborno, Raja E. Altarazi, Amal Nabahin, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Health and Medical Research (IJAHMR) 8 (9):8-15.
    Abstract: Early detection of breast cancer is vital for improving patient outcomes and reducing mortality rates. Technological advancements have significantly enhanced the accuracy and efficiency of screening methods. This paper explores recent innovations in early detection, focusing on the evolution of digital mammography, the benefits of 3D mammography (tomosynthesis), and the application of advanced imaging techniques such as molecular imaging and MRI. It also examines the role of artificial intelligence (AI) in diagnostic tools, showing how machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. In defence of gullibility: The epistemology of testimony and the psychology of deception detection.Kourken Michaelian - 2010 - Synthese 176 (3):399-427.
    Research in the psychology of deception detection implies that Fricker, in making her case for reductionism in the epistemology of testimony, overestimates both the epistemic demerits of the antireductionist policy of trusting speakers blindly and the epistemic merits of the reductionist policy of monitoring speakers for trustworthiness: folk psychological prejudices to the contrary notwithstanding, it turns out that monitoring is on a par (in terms both of the reliability of the process and of the sensitivity of the beliefs that (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  24. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   116 citations  
  25.  50
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  70
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  66
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Lung Cancer Detection Using Artificial Neural Network.Ibrahim M. Nasser & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):17-23.
    In this paper, we developed an Artificial Neural Network (ANN) for detect the absence or presence of lung cancer in human body. Symptoms were used to diagnose the lung cancer, these symptoms such as Yellow fingers, Anxiety, Chronic Disease, Fatigue, Allergy, Wheezing, Coughing, Shortness of Breath, Swallowing Difficulty and Chest pain. They were used and other information about the person as input variables for our ANN. Our ANN established, trained, and validated using data set, which its title is “survey lung (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  32. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Detecting the Factors Affecting Classroom Dialogue Quality.Chrysi Rapanta, Merce Garcia-Milà, Andrea Miralda Banda & Fabrizio Macagno - 2023 - Linguistics and Education 77:101223.
    Despite the emphasis on dialogue and argumentation in educational settings, still not much is known about how best we can support learners in their interthinking, reasoning, and metadialogic understanding. The goal of this classroom intervention study is to explore the degree of students’ dialogicity and its possible increase during a learning programme implementing dialogic and argument-based teaching goals and principles. In particular, we focus on how students from 5 to 15 years old engage with each other's ideas, and whether/how this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  67
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  88
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  39.  54
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  40. Wave detected by LIGO is not gravitational wave.Alfonso Leon Guillen Gomez - manuscript
    General Relativity defines gravity like the metric of a Lorentzian manifold. Einstein formulated spacetime as quality structural of gravity, i.e, circular definition between gravity and spacetime, also Einstein denoted "Space and time are modes by which we think, not conditions under which we live" and “We denote everything but the gravitational field as matter”, therefore, spacetime is nothing and gravity in first approximation an effect of coordinates, and definitely a geometric effect. The mathematical model generates quantitative predictions coincident in high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Advancements in Early Detection of Breast Cancer: Innovations and Future Directions.Izzeddin A. Alshawwa, Hosni Qasim El-Mashharawi, Fatima M. Salman, Mohammed Naji Abu Al-Qumboz, Bassem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (8):15-24.
    Abstract: Early detection of breast cancer plays a pivotal role in improving patient prognosis and reducing mortality rates. Recent technological advancements have significantly enhanced the accuracy and effectiveness of breast cancer screening methods. This paper explores the latest innovations in early detection, including the evolution of digital mammography, the impact of 3D mammography (tomosynthesis), and the use of advanced imaging techniques such as molecular imaging and MRI. Furthermore, the integration of artificial intelligence (AI) in diagnostic tools is discussed, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Using Deep Learning to Detect the Quality of Lemons.Mohammed B. Karaja & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):97-104.
    Abstract: Lemons are an important fruit that have a wide range of uses and benefits, from culinary to health to household and beauty applications. Deep learning techniques have shown promising results in image classification tasks, including fruit quality detection. In this paper, we propose a convolutional neural network (CNN)-based approach for detecting the quality of lemons by analysing visual features such as colour and texture. The study aims to develop and train a deep learning model to classify lemons based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Predicting Fire Alarms in Smoke Detection using Neural Networks.Maher Wissam Attia, Baraa Akram Abu Zaher, Nidal Hassan Nasser, Ruba Raed Al-Hour, Aya Haider Asfour & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):26-33.
    Abstract: This research paper presents the development and evaluation of a neural network-based model for predicting fire alarms in smoke detection systems. Using a dataset from Kaggle containing 15 features and 3487 samples, we trained and validated a neural network with a three-layer architecture. The model achieved an accuracy of 100% and an average error of 0.0000003. Additionally, we identified the most influential features in predicting fire alarms.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web page phishing attacks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Emerging Neurotechnologies for Lie-Detection: Where Are We Now? An Appraisal of Wolpe, Foster and Langleben's “Emerging Neurotechnologies for Lie-Detection: Promise and Perils” Five Years Later.Steven E. Hyman - 2010 - American Journal of Bioethics 10 (10):49-50.
    Download  
     
    Export citation  
     
    Bookmark  
  47. Autism spectrum and cheaters detection.Miguel Lopez Astorga - 2014 - Dialogues in Philosophy, Mental and Neuro Sciences 7 (1):1-10.
    Rutherford and Ray think that human beings have mental mechanisms that help them to detect individuals that, deliberately, do not follow a rule. In the same way, they hold that autism is not a disorder in which these mechanisms are damaged. This idea seems contrary to the thesis, supported by some researchers, that autistic people have a theory of mind deficit. This is because of, if Rutherford and Ray are right, autistic people can detect other people’s intentions. In this paper, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  17
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Automatic Face Mask Detection Using Python.M. Madan Mohan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):91-100.
    The corona virus COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing facemasks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 678