Showing 1 - 20 results of 56 for search '"algorithm detection"', query time: 0.12s Refine Results
  1. 1

    Discrepancies between physician review and algorithmic detection of the zoll rescuenet post-cardiac arrest case review by Ayal Z. Pierce, Cody Couperus, Jordan Parker, Allison LaRocco, Michael Mazzeffi, Nicholas A. Morris

    Published 2025-07-01
    “…These findings support manual review of raw data and improved algorithmic detection of compressions to ensure feedback to resuscitation teams is reliable.…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    High resolution remote sensing image object detection algorithm based on improved YOLOv8 by ZHANG Xia, QIAO Huanyu, CAO Feng

    Published 2025-01-01
    “…Finally, combining NWD and WIoU loss functions, a new loss function NWD-WIoU was designed to accelerate the convergence speed of algorithm detection and improve the detection performance of the algorithm for small objects. …”
    Get full text
    Article
  6. 6

    Study of radioactive particle tracking using MCNP-X code and artificial neural network by Roos Sophia de Freitas Dam, César Marques Salgado

    Published 2021-07-01
    “…Counts obtained by an array of detectors properly positioned around the unit will be correlated to predict the instantaneous positions occupied by the radioactive particle by means of an appropriate mathematical search location algorithm. Detection geometry developed employs eight NaI(Tl) scintillator detectors and a Cs-137 (662 keV) source with isotropic emission of gamma-rays. …”
    Get full text
    Article
  7. 7
  8. 8

    GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection by Haifeng Zhang, Han Ai, Donglin Xue, Zeyu He, Haoran Zhu, Delian Liu, Jianzhong Cao, Chao Mei

    Published 2025-06-01
    “…The combination of a graph attention network (GAT) and Dilated Encoder network significantly improves the algorithm detection and recognition performance for space remote sensing objects. …”
    Get full text
    Article
  9. 9

    Enhancing deep learning methods for brain metastasis detection through cross-technique annotations on SPACE MRI by Tassilo Wald, Benjamin Hamm, Julius C. Holzschuh, Rami El Shafie, Andreas Kudak, Balint Kovacs, Irada Pflüger, Bastian von Nettelbladt, Constantin Ulrich, Michael Anton Baumgartner, Philipp Vollmuth, Jürgen Debus, Klaus H. Maier-Hein, Thomas Welzel

    Published 2025-02-01
    “…We hypothesize that this better conspicuity leads to high-quality annotation (HAQ), enhancing deep learning (DL) algorithm detection of BMs on MPRAGE images. Methods Retrospective contrast-enhanced (gadobutrol 0.1 mmol/kg) SPACE and MPRAGE data of 157 patients with BM were used, either annotated on MPRAGE resulting in normal annotation quality (NAQ) or on coregistered SPACE resulting in HAQ. …”
    Get full text
    Article
  10. 10

    Hadoop bottleneck detection algorithm based on information gain by Zaole TAN, Zhifeng HAO, Ruichu CAI, Xiaojun XIAO, Yu LU

    Published 2016-07-01
    “…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
    Get full text
    Article
  11. 11

    ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION by Alexis J. LOPEZ, Perfecto M. QUINTERO, Ana K. HERNANDEZ

    Published 2020-06-01
    “…The experimental results show that the algorithm detects optimally the abnormal routes using historical data as a base. …”
    Get full text
    Article
  12. 12

    A System for the Real-Time Detection of the U-Shaped Steel Bar Straightness on a Production Line by Yen-Jen Chen, Yu-Hsiu Yeh, Jen-Fu Yang

    Published 2025-06-01
    “…The experiment results show that the algorithm detects 123,128 steel bars in 193 h with an average accuracy of 99.64% for straight steel and an average recall of 95.70% for bent steel. …”
    Get full text
    Article
  13. 13

    Detection of Sentence Boundaries in Polish Based on Acoustic Cues by Magdalena IGRAS, Bartosz ZIÓŁKO

    Published 2016-01-01
    “…In the first stage, the algorithm detects pauses and divides a speech signal into segments. …”
    Get full text
    Article
  14. 14

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  15. 15

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  16. 16

    Design and Test of an Embedded Real-Time Compact Voltage Fingerprinting Algorithm for Enhanced Automotive Cybersecurity by Pierpaolo Dini, Ettore Soldaini, Sergio Saponara

    Published 2025-01-01
    “…The article proposes an algorithm for monitoring data traffic in CAN networks on board vehicles. This algorithm detects cyber-attacks through statistical analysis of voltage samples from the protocol’s physical layer. …”
    Get full text
    Article
  17. 17

    Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures by S. Nandhini, A. Rajeswari, N. R. Shanker

    Published 2024-12-01
    “…Abstract In this paper, cyber-attacks in IOT-WSN are detected through proposed optimized-Neural Network algorithms such as (i) Equilibrium Optimizer Neural Network (EO-NN), (ii) Particle Swarm Optimization (PSO-NN), (iii) Single Candidate Optimizer Neural Network (SCO-NN) and (iv) Single Candidate Optimizer Long Short-Term Memory (SCO-LSTM) with different connecting, hidden neural network layers and threat intelligence data. The proposed algorithms detect the attacker node, which frequently changes the behaviour such as attacker node/ normal node. …”
    Get full text
    Article
  18. 18

    A Novel Complex Networks Clustering Algorithm Based on the Core Influence of Nodes by Chao Tong, Jianwei Niu, Bin Dai, Zhongyu Xie

    Published 2014-01-01
    “…The clustering process is a simulation of the process of cluster formation in sociology. The algorithm detects the nodes with core influence through their betweenness centrality, and builds the cluster’s core structure by discriminant functions. …”
    Get full text
    Article
  19. 19

    Research of neural network algorithms for recognizing railway infrastructure objects in video images by E.V. Medvedeva, A.A. Perevoshchikova

    Published 2025-06-01
    “…Both algorithms are aimed at improving railway traffic safety. One algorithm detects foreign objects on railway tracks and objects relating to the railway infrastructure. …”
    Get full text
    Article
  20. 20

    Vibration-based gait analysis via instrumented buildings by Ellis Kessler, Vijaya VN Sriram Malladi, Pablo A Tarazaga

    Published 2019-10-01
    “…Signal-energy-based algorithms detect the heel strike of each step during trials. …”
    Get full text
    Article