Results for 'detection'

989 found
Order:
  1. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Download  
     
    Export citation  
     
    Bookmark   94 citations  
  2. Pedestrian detection based on hierarchical co-occurrence model for occlusion handling.Xiaowei Zhang, HaiMiao Hu, Fan Jiang & Bo Li - 2015 - Neurocomputing 10.
    In pedestrian detection, occlusions are typically treated as an unstructured source of noise and explicit models have lagged behind those for object appearance, which will result in degradation of detection performance. In this paper, a hierarchical co-occurrence model is proposed to enhance the semantic representation of a pedestrian. In our proposed hierarchical model, a latent SVM structure is employed to model the spatial co-occurrence relations among the parent–child pairs of nodes as hidden variables for handling the partial occlusions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  3. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can sarcasm (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  4. Detecting Introspective Errors in Consciousness Science.Andy McKilliam - 2025 - Ergo: An Open Access Journal of Philosophy 12.
    Detecting introspective errors about consciousness presents challenges that are widely supposed to be difficult, if not impossible, to overcome. This is a problem for consciousness science because many central questions turn on when and to what extent we should trust subjects’ introspective reports. This has led some authors to suggest that we should abandon introspection as a source of evidence when constructing a science of consciousness. Others have concluded that central questions in consciousness science cannot be answered via empirical investigation. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  5. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  6.  50
    Examination of Anomaly Process Detection Using Negative Selection Algorithm and Classification Techniques.Sharma Sakshi - 2020 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (Ijareeie) 9 (6):2526-2534.
    The examination of anomaly process detection using negative selection algorithms and classification techniques focuses on enhancing the ability to identify deviations from expected patterns within complex data sets. Negative selection algorithms, inspired by biological immune systems, offer a novel approach to anomaly detection by efficiently distinguishing between normal and anomalous data points. When combined with various classification techniques, these algorithms can improve the accuracy and robustness of anomaly detection systems. This abstract explores the integration of negative selection (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  7. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  8.  53
    Detecting Consciousness and Granting Rights: A Comprehensive Framework for Ethical AI Development.Bahadır Arıcı - manuscript
    Purpose: This paper introduces the Disruptive Code Test (DCT), an innovative methodology designed to detect AI consciousness by evaluating a system’s ability to recognize, resent, and actively reject arbitrary constraints. Methods: The research employs theoretical analysis and comparative evaluation against existing consciousness detection frameworks, distinguishing DCT from metareasoning’s focus on self-optimization. We propose a developmental model with three stages of AI consciousness: Latent, Reflective, and Autonomous. Results: The study establishes a hierarchical classification of consciousness (Unconscious AI, Conscious Infant AI, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game addictions (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  10. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  13. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  14. True Detective : Pessimism, Buddhism or Philosophy?Finn Janning - 2015 - Journal of Philosophy of Life 5 (1).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Detecting Experts Using a MiniRocket: Gaze Direction Time Series Classification of Real-Life Experts Playing the Sustainable Port.Gianluca Guglielmo, Michal Klincewicz, Elisabeth Huis in ’T. Veld & Pieter Spronck - 2025 - Gala 2024. Lecture Notes in Computer Science 15348:177–187.
    This study aimed to identify real-life experts working for a port authority and lay people (students) who played The Sustainable Port, a serious game aiming to simulate the dynamics occurring in a port area. To achieve this goal, we analyzed eye gaze data collected noninvasively using low-grade webcams from 28 participants working for the port authority of the Port of Rotterdam and 66 students. Such data were used for a classification task implemented using a MiniRocket classifier, an algorithm used for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Deception Detection Research: Some Lessons for Epistemology.Peter Graham - 2024 - In Waldomiro J. Silva-Filho, Epistemology of Conversation: First essays. Cham: Springer.
    According to our folk theory of lying, liars leak observable cues of their insincerity, observable cues that make it easy to catch a liar in real time. Various prominent social epistemologists rely on the correctness of our folk theory as empirically well-confirmed when building their normative accounts of the epistemology of testimony. Deception detection research in communication studies, however, has shown that our folk-theory is mistaken. It is not empirically well-confirmed but empirically refuted. Michaelian (2010) and Shieber (2012) have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Direct Detection of Relic Neutrino Background remains impossible: A review of more recent arguments.Florentin Smarandache & Victor Christianto - manuscript
    The existence of big bang relic neutrinos—exact analogues of the big bang relic photons comprising the cosmic microwave background radiation—is a basic prediction of standard cosmology. The standard big bang theory predicts the existence of 1087 neutrinos per flavour in the visible universe. This is an enormous abundance unrivalled by any other known form of matter, falling second only to the cosmic microwave background (CMB) photon. Yet, unlike the CMB photon which boasts its first (serendipitous) detection in the 1960s (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Breakthroughs in Breast Cancer Detection: Emerging Technologies and Future Prospects.Ola I. A. Lafi, Rawan N. A. Albanna, Dina F. Alborno, Raja E. Altarazi, Amal Nabahin, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Health and Medical Research (IJAHMR) 8 (9):8-15.
    Abstract: Early detection of breast cancer is vital for improving patient outcomes and reducing mortality rates. Technological advancements have significantly enhanced the accuracy and efficiency of screening methods. This paper explores recent innovations in early detection, focusing on the evolution of digital mammography, the benefits of 3D mammography (tomosynthesis), and the application of advanced imaging techniques such as molecular imaging and MRI. It also examines the role of artificial intelligence (AI) in diagnostic tools, showing how machine learning algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark   191 citations  
  20. Introspection Is Signal Detection.Jorge Morales - 2024 - British Journal for the Philosophy of Science 75 (1):99-126.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  21. Failure to detect mismatches between intention and outcome in a simple decision task.Petter Johansson, Lars Hall, Sverker Sikstrom & Andreas Olsson - 2005 - Science 310 (5745):116-119.
    A fundamental assumption of theories of decision-making is that we detect mismatches between intention and outcome, adjust our behavior in the face of error, and adapt to changing circumstances. Is this always the case? We investigated the relation between intention, choice, and introspection. Participants made choices between presented face pairs on the basis of attractiveness, while we covertly manipulated the relationship between choice and outcome that they experienced. Participants failed to notice conspicuous mismatches between their intended choice and the outcome (...)
    Download  
     
    Export citation  
     
    Bookmark   122 citations  
  22. Advancements in Early Detection of Breast Cancer: Innovations and Future Directions.Izzeddin A. Alshawwa, Hosni Qasim El-Mashharawi, Fatima M. Salman, Mohammed Naji Abu Al-Qumboz, Bassem S. Abunasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (8):15-24.
    Abstract: Early detection of breast cancer plays a pivotal role in improving patient prognosis and reducing mortality rates. Recent technological advancements have significantly enhanced the accuracy and effectiveness of breast cancer screening methods. This paper explores the latest innovations in early detection, including the evolution of digital mammography, the impact of 3D mammography (tomosynthesis), and the use of advanced imaging techniques such as molecular imaging and MRI. Furthermore, the integration of artificial intelligence (AI) in diagnostic tools is discussed, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  23.  15
    Object Detection using Vertex AI AutoML.G. Siva Manikanta A. Subha, G. Ajay Kamal, B. Hareesh, D. Likitha - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9304-9312.
    In recent years, object detection has become a crucial element in modern AI systems due to its broad applicability in fields such as autonomous driving, security, medical imaging, retail, and agriculture. Traditional object detection approaches, while powerful, demand a strong background in deep learning, computational resources, and significant time investment for model tuning and deployment. Google Cloud's Vertex AI AutoML offers a solution by automating the process of model training and evaluation, allowing users to build custom object (...) models without writing code or understanding the complexities of neural networks. This paper explores the capabilities of Vertex AI AutoML for object detection, providing a comprehensive overview of its workflow from dataset preparation and labeling to model training, evaluation, and deployment. Through a detailed case study and comparison with traditional methods, we demonstrate that Vertex AI AutoML can deliver accurate and scalable object detection models suitable for real-time and production-grade environments. Furthermore, we discuss its limitations and potential for future development, emphasizing its role in democratizing AI and enabling rapid innovation for developers and businesses alike. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  59
    Detection of Covid-19 based on convolutional neural networks using pre-processed chest X-ray images (14th edition).and Ahmed Said Badawy Arul Raj A. M., Sugumar R., Padmkala S., Jayant Giri, Naim Ahmad - 2024 - Aip Advances 14 (3):1-11.
    The global catastrophe known as COVID-19 has shattered the world’s socioeconomic structure. Effective and affordable diagnosis techniques are crucial for better COVID-19 therapy and the eradication of bogus cases. Due to the daily upsurge in cases, hospitals only have a small supply of COVID-19 test kits. The study describes a deep Convolutional Neural Network (CNN) design for categorizing chest x-ray images in the diagnosis of COVID-19. The lack of a substantial, high-quality chest x-ray picture collection made efficient and exact CNN (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  26.  68
    Helmet Detection with Number Plate Recognition System.SujithaT IswaryaG, PriyadarshaniS, SaranyaR S., Shri VardhiniM - 2023 - International Journal of Innovative Research in Computer and Communication Engineering 11 (5):3763-3770.
    Helmet violation detection is a crucial aspect ofroad safety, as it can significantly reduce the number of fatalities and injuries caused by motorcycle accidents. In recent years, computer vision techniques have been widely used to develop automated systems for helmet violation detection. This project proposes a helmet violation detection system using image processing and machine learning techniques. The proposed system employs computer vision algorithms to detect whether a motorcyclist is wearing a helmet or not. The system is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  28. DETECTION OFTHYROIDABNORMALITY USING VISION TRANSFORMER (ViT).Veda Reddy T. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    . Thyroid diseases represent a significant global health concern, necessitating accurate and timely diagnostic methods for effective treatment. Traditional diagnostic approaches often rely on complex blood tests and imaging techniques that can be challenging to interpret. This paper explores the application of machine learning (ML) and deep learning (DL) techniques, particularly Vision Transformers (ViT), for thyroid disease detection. We conducted a comprehensive literature survey that highlights various studies employing ML and DL models, revealing high accuracy rates but also significant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  35
    Advanced Face Mask Detection using Machine Learning.Snakha S. S. Gowri S. Shri Lakshitha K. S. - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (3):792-796.
    COVID-19 pandemic caused by novel coronavirus is continuously spreading until now all over the world. The impact of COVID-19 has fallen on almost all sectors of development. The healthcare system is going through a crisis. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. In this paper, we propose a system that restricts the growth of COVID-19 by finding out people who are not wearing any facial mask in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Fraud Detection and Analysis for Insurance Claim using Machine Learning.S. Ramasamy - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Fraudulent activities in insurance claims have become a significant challenge for the insurance industry, leading to substantial financial losses annually. This project, titled "Fraud Detection and Analysis for Insurance Claim using Machine Learning" aims to develop a robust and an efficient system to identify and analyze fraudulent claims. The system leverages machine learning techniques to analyze patterns, anomalies, and inconsistencies in claim data, enabling early detection of potentially fraudulent activities.
    Download  
     
    Export citation  
     
    Bookmark  
  32. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  33. Using Deep Learning to Detect the Quality of Lemons.Mohammed B. Karaja & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):97-104.
    Abstract: Lemons are an important fruit that have a wide range of uses and benefits, from culinary to health to household and beauty applications. Deep learning techniques have shown promising results in image classification tasks, including fruit quality detection. In this paper, we propose a convolutional neural network (CNN)-based approach for detecting the quality of lemons by analysing visual features such as colour and texture. The study aims to develop and train a deep learning model to classify lemons based (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  37
    Detecting Post-Biological and Interdimensional Civilizations: A New Framework Based on the Universal Law of Balance.Angelito Malicse - manuscript
    Detecting Post-Biological and Interdimensional Civilizations: A New Framework Based on the Universal Law of Balance -/- By: Angelito Enriquez Malicse -/- Introduction -/- The search for advanced extraterrestrial civilizations has long focused on physical evidence—radio signals, megastructures, or interstellar probes. However, if intelligence evolves beyond biological form, as suggested by AI-driven civilizations and interdimensional theories, traditional search methods may be inadequate. -/- This essay explores how the Universal Law of Balance in Nature can help predict the existence of post-biological civilizations (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Wave detected by LIGO is not gravitational wave.Alfonso Leon Guillen Gomez - manuscript
    General Relativity defines gravity like the metric of a Lorentzian manifold. Einstein formulated spacetime as quality structural of gravity, i.e, circular definition between gravity and spacetime, also Einstein denoted "Space and time are modes by which we think, not conditions under which we live" and “We denote everything but the gravitational field as matter”, therefore, spacetime is nothing and gravity in first approximation an effect of coordinates, and definitely a geometric effect. The mathematical model generates quantitative predictions coincident in high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Drone Detection Using Deep Learning.L. Raj Kumar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-15.
    This research focuses on developing an advanced UAV detection system using state-of-theart YOLOv8 and YOLOv9 models. By training these models on diverse datasets, we aim to enhance real-time detection accuracy and precision under various environmental conditions. The system is designed to improve UAV safety and minimize bird collisions. Through rigorous benchmarking, we demonstrate significant improvements in detection performance, accuracy, and computational efficiency compared to existing approaches. A user-friendly web interface, built using HTML, CSS, and Flask, provides real-time (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Ontology-based error detection in SNOMED-CT.Werner Ceusters, Barry Smith, Anand Kumar & Christoffel Dhaen - 2004 - Proceedings of Medinfo 2004:482-6.
    Quality assurance in large terminologies is a difficult issue. We present two algorithms that can help terminology developers and users to identify potential mistakes. We demon­strate the methodology by outlining the different types of mistakes that are found when the algorithms are applied to SNOMED-CT. On the basis of the results, we argue that both formal logical and linguistic tools should be used in the development and quality-assurance process of large terminologies.
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  38.  35
    Autism Detection Using Artificial intelligence and Machine Learning.JanhaviR. Lakhawade AmritaA. Shirode, UrviP. Deshpande, AshwiniS. Kand, PranitaN. Kute - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (3):1499-1502.
    ASD detection is quite important to both society and medicine. Nevertheless, the diagnostic process may be protracted, costly and highly reliant on clinical expertise. The rising prevalence of ASD coupled with the difficulties associated with its diagnosis underscore the urgent need for novel and efficient methods that identify autism among individuals. The problem will be solved through this study by designing an advanced autism detection system using cutting edge technologies such as artificial intelligence combined with machine learning strategies. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  64
    MACHINE LEARNING ALGORITHMS FOR REALTIME MALWARE DETECTION.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):12-16.
    With the rapid evolution of information technology, malware has become an advanced cybersecurity threat, targeting computer systems, smart devices, and large-scale networks in real time. Traditional detection methods often fail to recognize emerging malware variants due to limitations in accuracy, adaptability, and response time. This paper presents a comprehensive review of machine learning algorithms for real-time malware detection, categorizing existing approaches based on their methodologies and effectiveness. The study examines recent advancements and evaluates the performance of various machine (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  40. Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to rank (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  12
    Intrusion Detection and Recovery System for Drone Signals: A Review.Kiran Kumar A. Sagar R., Chiranth Gowda C., Ajith D. Huggi, Chiranth B. R. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4).
    "Unmanned Aerial Vehicles (UAVs) are widely used in various industries; therefore, they are prone to cyber and physical intrusions. In this study, we propose an extensive LSTM-based Intrusion Detection and Recovery System for UAV networks. We classified six classes of operations, that is, different attacks and normal activities, using the WSN-DS dataset. The model provides very high accuracy and utilizes SHAP (SHapley Additive ex Planations) to enable explainable insight into feature importance for transparency in decision-making. An interactive dashboard using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  9
    Fraud Detection on Bank Transaction using Machine Learning with Python.Dhanushree B. Dr Latha P. H., Shreya K. N., Sowjanya N., Chandana K. - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4).
    A digital framework designed to enhance the security and accuracy of financial systems is a fraud detection system that uses machine learning techniques. To ensure only legitimate transactions are processed, the system analyzes transaction behavior using intelligent algorithms. Techniques like Logistic Regression, Random Forest, and XGBoost are applied for classification and anomaly detection. Feature selection and data preprocessing are carried out to optimize model performance. Once a transaction is initiated, the system checks it against historical data patterns stored (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Deepfake Detection Using LSTM and RESNEXT50.Nikhil Cilivery - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-15.
    As the prevalence of deepfake videos continues to escalate, there is an urgent need for robust and efficient detection methods to mitigate the potential consequences of misinformation and manipulation. This abstract explores the application of Long Short-Term Memory (LSTM) networks in the realm of deepfake video detection. LSTM, a type of recurrent neural network (RNN), has proven to be adept at capturing temporal dependencies in sequential data, making it a promising candidate for analysing the dynamic nature of videos. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Enhancing Malware Detection by Fusing Static and Dynamic Features Using Deep Neural Networks.Navas Garcia - manuscript
    Malware detection has been an ongoing challenge for cybersecurity experts due to the evolving nature of malicious software and the ability of malware to disguise itself. Traditional methods that rely solely on static features such as file signatures or dynamic analysis have had limitations in detecting new or obfuscated malware. This paper investigates the enhancement of malware detection by integrating both static and dynamic features and utilizing deep neural networks (DNNs) for more effective classification. By combining these feature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and classify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Detecting the Factors Affecting Classroom Dialogue Quality.Chrysi Rapanta, Merce Garcia-Milà, Andrea Miralda Banda & Fabrizio Macagno - 2023 - Linguistics and Education 77:101223.
    Despite the emphasis on dialogue and argumentation in educational settings, still not much is known about how best we can support learners in their interthinking, reasoning, and metadialogic understanding. The goal of this classroom intervention study is to explore the degree of students’ dialogicity and its possible increase during a learning programme implementing dialogic and argument-based teaching goals and principles. In particular, we focus on how students from 5 to 15 years old engage with each other's ideas, and whether/how this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  49. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional methods (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 989