112 results found

Xinlong Zhao, Qixiang Pang, Shan Du

Gas leaks pose severe risks to human health and industrial safety. However, accurate and timely monitoring of gas leaks remains a major challenge. Existing vision-based methods using infrared (IR) ima...

The Visual Computer 2026-04-21 rs-9331073
Gas leak segmentation Industrial safety monitoring Infrared video surveillance system Spatiotemporal perception Text-guided feature enhancement Vision language models (VLMs)

Helmi Mostafa Abdaljabbar Khatib

Background Artificial intelligence (AI), particularly large language models (LLMs), has emerged as a promising tool in healthcare, with potential applications in clinical decision support and dental e...

Research Square 2026-04-21 rs-9468440
Artificial intelligence Large language models Periodontology Dental education Clinical reasoning Multiple-choice questions

Aaron Danielson

 Clustering is widely used to discover interpretable structure in data, but  conventional unsupervised methods group examples by \emph{feature similarity}  alone, ignoring any available prediction tar...

Research Square 2026-04-21 rs-9163443
supervised clustering prototype learning cross-attention interpretable machine learning tabular data regime discovery

Shuai Zou, Linus Olofsson, Oualid Burström, Thomas Reichert, Olof Broman, Geir Isak Vestøl, Mohammad Jaber Hossain, Magnus Fredriksson, Johannes A. J. Huber

Reliable segmentation of live and dead knots in X-ray computed tomography images is crucial for automated wood grading and sawing yield optimisation in the timber industry. Segmentation in wet-state X...

Wood Science and Technology 2026-04-21 rs-9134377
Computer vision Deep learning Knot morphology Non-destructive evaluation Norway spruce

Rahul Nayak, Aditya Prasoon

Federated learning has emerged as the dominant paradigm for privacy-preserving intrusion detection across distributed networks, yet its vulnerability to adversarial manipulation of the training proces...

The Journal of Supercomputing 2026-04-21 rs-9275643
Federated learning Intrusion detection Non-IID heterogeneity Byzantine resilience Adversarial machine learning Multi-agent systems Non-stationary distribution attack

Venkat Alamuri

The current data validation systems are mostly reactive, static, and resource-heavy which may lead to interruptions of pipelines and will not be able to detect data corruption in real-time settings. T...

Research Square 2026-04-21 rs-9455603
Predictive Data Validation Self-Healing Data Pipelines Reinforcement Learning Graph-Based Validation Data Quality Assurance Autonomous Data Systems Spatio-Temporal Graphs Intelligent Data Engineering

Mian Muhammad Hamza, Ruhma Shahbaz

Background Esophageal abnormalities cause severe health complications. Diagnosis is traditionally performed on endoscopic imaging, but the method is highly subjective and prone to inter-observer varia...

Research Square 2026-04-21 rs-9399822
Esophagus Diseases Deep Learning Cohen’s Kappa score MCC SCORE Sea Shell SHAP Gradient-weighted Class Activation Mapping (Grad CAM) Integrated Gradients ResNet50V2

Md Rakibul Islam, Riad Hassan, Abdullah Nazib, Feroza Naznin, MD ZAHIDUL ISLAM, Clinton Fookes

Deep learning has achieved remarkable accuracy in medical image segmentation, particularly for larger structures with well-defined boundaries. However, its effectiveness can be challenged by factors s...

Scientific Reports 2026-04-21 rs-8651167

Saman M. Almufti, Amira Bibo Sallow

Engineering design optimization problems characterized by highly nonlinear, tightly constrained, and mixed-variable formulations remain challenging for conventional metaheuristic approaches, particula...

Discover Artificial Intelligence 2026-04-21 rs-9222545
Scuba Diver Optimization Algorithm car side impact design constrained structural optimization metaheuristics crashworthiness

Buddha Nath Sharma, Vishal Mandal, Salam Rabindrajit Luwang, Md. Nurujjaman, Atish J. Mitra, Sushovan Majhi

Persistent homology (PH)—the conventional method in topological data analysis—is computationally expensive, requires further vectorization of its signatures before machine learning (ML) can be applied...

Scientific Reports 2026-04-21 rs-9295091
Back to Top
Home
Browse
Submit
About
0.015925s