Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Aim  Automatic CT dataset classification is important to efficiently create reliable database annotations, especially when large collections of scans must be analyzed. Method  An automated segmentation and labeling algorithm was developed... more
    • by 
    •   12  
      AlgorithmsComputed TomographyHumansContent based image retrieval
    • by 
    •   9  
      Computer VisionMachine LearningCollision AvoidanceObstacle Detection
    • by 
    •   17  
      BritishNeural NetworkBritish medical historyHumans
    • by 
    •   7  
      Computer ScienceDocument AnalysisWord SegmentationExtraction Method
    • by 
    •   7  
      Computer GraphicsVirtual RealityAction RecognitionBayesian hierarchical model
    • by  and +1
    •   15  
      Natural HistoryCancer PreventionBiological SciencesHUMAN PAPILLOMAVIRUS
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks... more
    • by 
    •   6  
      AdaBoostWekaArtificial Intelligence applicationsKDD (Knowledge Discovery Databases)
    • by  and +1
    •   15  
      Cognitive ScienceComputer VisionImage ProcessingPattern Recognition
    • by 
    •   25  
      Nonparametric StatisticsStatistical AnalysisTreatment OutcomeRisk assessment
    • by 
    •   12  
      Colorectal cancerHumansAdvisory CommitteesIron
    • by 
    •   5  
      Quantum PhysicsGeneral RelativityBlack HoleDetection Rate
Acute kidney injury (AKI) is associated with significantly increased morbidity and mortality. To provide a uniformly accepted definition, the RIFLE classification was introduced by the Acute Dialysis Quality Initiative, recently modified... more
    • by 
    •   15  
      Acute kidney injuryHumansINTENSIVE CAREFemale
    • by 
    •   20  
      Animal BehaviorAnimal reproductionBiological SciencesAnimal Feed
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
    • by  and +1
    •   15  
      MicrobiologyPolymorphismLeishmaniaExperimental parasitology
    • by  and +1
    •   10  
      RadiologyProstate CancerUltrasoundMR spectroscopy
    • by 
    •   16  
      Computer ScienceInformation SecurityComputational ModelingComputer Networks
    • by  and +1
    •   11  
      Decision MakingSoftware TestingMathematical ProgrammingLinear Programming
    • by 
    •   6  
      Computer VisionFace DetectionImage RepresentationObject Detection
    • by 
    •   13  
      Forest fireSeasonalityLook up TableBoreal Forest
    • by 
    •   19  
      Health ManagementColorectal cancerGeneral SurgeryIndia
    • by  and +2
    •   6  
      Content AnalysisInspection TimeVisual ImpairmentQuality assessment
    • by  and +1
    •   15  
      AcousticsPattern RecognitionNeural NetworksNeural Network
    • by 
    •   13  
      Computer VisionFace DetectionImage RepresentationColor
    • by 
    •   9  
      Cognitive SciencePerformance EvaluationImage DenoisingImpulse Noise
    • by 
    •   20  
      EthicsInformed ConsentPublic HealthHealth Policy
Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks... more
    • by 
    •   5  
      AdaBoostWekaKDD (Knowledge Discovery Databases)NSL KDD
    • by 
    •   13  
      European UnionLeukemiaT cell receptorHumans
In this paper QRS complex detection algorithms based on the first and second derivatives have been studied and implemented. The threshold values for detecting R-peak candidate points mentioned in previous work have been modified for... more
    • by 
    •   4  
      Biomedical EngineeringPoint of ViewDetection RateDetection Algorithm
    • by 
    •   6  
      IntegrationOutlier detectionData Mining and Knowledge DiscoveryHigh Dimensionality
Automation of oral reading assessment and of feedback in a read-ing tutor is a very challenging task. This paper describes our re-search aiming at developing such automated systems. First topic is the recording and annotation of CHOREC,... more
    • by 
    •   4  
      Technology EducationReading StrategiesAutomatic AssessmentDetection Rate
    • by 
    •   14  
      Molecular BiologySurvival AnalysisImmunohistochemistryHumans
    • by 
    •   17  
      ObstetricsAdolescentCongenital Heart DefectsProspective studies
Laser scanning or LiDAR data are increasingly used in forestry applications but also e.g. in urban environments or for building reconstructions. Huge point clouds are usually converted to a grid or are pre-processed in specific software... more
    • by  and +1
    •   10  
      Region growingField SurveyLaser ScanningUrban Environment
    • by 
    •   10  
      AlgorithmsElectrocardiographySignal AnalysisHumans
    • by 
    •   6  
      Machine LearningIntrusion DetectionInformation GainFalse Positive Rate
    • by 
    •   32  
      PsychologyPrimary CareMental HealthPrimary Health Care
    • by 
    •   15  
      EpidemiologyControlPublic HealthAnimal Production
A method for blink detection from video sequences gathered with a commercial camera is presented. This is used as a view-based remote eye gaze tracker (REGT) component performing two relevant functions, i.e. initialization and automatic... more
    • by 
    •   9  
      Cognitive ScienceAssistive TechnologyReal TimeEye Gaze
    • by 
    •   8  
      Data MiningHealth insuranceNeural NetworkCase Study
    • by 
    •   17  
      Statistical ModellingDown SyndromeProspective studiesPregnancy
    • by 
    •   8  
      Network SecuritySecurity and PrivacyClassifier SystemSpam Filtering
    • by 
    •   11  
      Neural NetworkIntrusion DetectionIndustrial electronicsFeedforward Neural Network
    • by 
    •   16  
      PsychologyErgonomicsAttentionCell Phones
    • by 
    •   11  
      Prospective studiesHumansMaleProstate
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
    • by 
    •   6  
      Data MiningOPERATING SYSTEMRegression TestingMalware Detection
Illegal logging is a major environmental and economic problem, and exceeds in some countries the amounts of legally harvested timber. In Eastern Europe and the former Soviet Union, illegal logging increased and reforestation on abandoned... more
    • by 
    •   25  
      Eastern EuropeRemote SensingStatistical AnalysisSupport Vector Machines
    • by 
    •   8  
      Image segmentationX RaysImage ClassificationKnowledge Based Systems