-
1
Discrepancies between physician review and algorithmic detection of the zoll rescuenet post-cardiac arrest case review
Published 2025-07-01“…These findings support manual review of raw data and improved algorithmic detection of compressions to ensure feedback to resuscitation teams is reliable.…”
Get full text
Article -
2
-
3
-
4
-
5
High resolution remote sensing image object detection algorithm based on improved YOLOv8
Published 2025-01-01“…Finally, combining NWD and WIoU loss functions, a new loss function NWD-WIoU was designed to accelerate the convergence speed of algorithm detection and improve the detection performance of the algorithm for small objects. …”
Get full text
Article -
6
Study of radioactive particle tracking using MCNP-X code and artificial neural network
Published 2021-07-01“…Counts obtained by an array of detectors properly positioned around the unit will be correlated to predict the instantaneous positions occupied by the radioactive particle by means of an appropriate mathematical search location algorithm. Detection geometry developed employs eight NaI(Tl) scintillator detectors and a Cs-137 (662 keV) source with isotropic emission of gamma-rays. …”
Get full text
Article -
7
Vehicle detection and classification for traffic management and autonomous systems using YOLOv10
Published 2025-08-01Get full text
Article -
8
GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection
Published 2025-06-01“…The combination of a graph attention network (GAT) and Dilated Encoder network significantly improves the algorithm detection and recognition performance for space remote sensing objects. …”
Get full text
Article -
9
Enhancing deep learning methods for brain metastasis detection through cross-technique annotations on SPACE MRI
Published 2025-02-01“…We hypothesize that this better conspicuity leads to high-quality annotation (HAQ), enhancing deep learning (DL) algorithm detection of BMs on MPRAGE images. Methods Retrospective contrast-enhanced (gadobutrol 0.1 mmol/kg) SPACE and MPRAGE data of 157 patients with BM were used, either annotated on MPRAGE resulting in normal annotation quality (NAQ) or on coregistered SPACE resulting in HAQ. …”
Get full text
Article -
10
Hadoop bottleneck detection algorithm based on information gain
Published 2016-07-01“…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
Get full text
Article -
11
ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION
Published 2020-06-01“…The experimental results show that the algorithm detects optimally the abnormal routes using historical data as a base. …”
Get full text
Article -
12
A System for the Real-Time Detection of the U-Shaped Steel Bar Straightness on a Production Line
Published 2025-06-01“…The experiment results show that the algorithm detects 123,128 steel bars in 193 h with an average accuracy of 99.64% for straight steel and an average recall of 95.70% for bent steel. …”
Get full text
Article -
13
Detection of Sentence Boundaries in Polish Based on Acoustic Cues
Published 2016-01-01“…In the first stage, the algorithm detects pauses and divides a speech signal into segments. …”
Get full text
Article -
14
Spam filtering algorithm based on geographic E-mail path analysis
Published 2007-01-01“…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
Get full text
Article -
15
Spam filtering algorithm based on geographic E-mail path analysis
Published 2007-01-01“…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
Get full text
Article -
16
Design and Test of an Embedded Real-Time Compact Voltage Fingerprinting Algorithm for Enhanced Automotive Cybersecurity
Published 2025-01-01“…The article proposes an algorithm for monitoring data traffic in CAN networks on board vehicles. This algorithm detects cyber-attacks through statistical analysis of voltage samples from the protocol’s physical layer. …”
Get full text
Article -
17
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
Published 2024-12-01“…Abstract In this paper, cyber-attacks in IOT-WSN are detected through proposed optimized-Neural Network algorithms such as (i) Equilibrium Optimizer Neural Network (EO-NN), (ii) Particle Swarm Optimization (PSO-NN), (iii) Single Candidate Optimizer Neural Network (SCO-NN) and (iv) Single Candidate Optimizer Long Short-Term Memory (SCO-LSTM) with different connecting, hidden neural network layers and threat intelligence data. The proposed algorithms detect the attacker node, which frequently changes the behaviour such as attacker node/ normal node. …”
Get full text
Article -
18
A Novel Complex Networks Clustering Algorithm Based on the Core Influence of Nodes
Published 2014-01-01“…The clustering process is a simulation of the process of cluster formation in sociology. The algorithm detects the nodes with core influence through their betweenness centrality, and builds the cluster’s core structure by discriminant functions. …”
Get full text
Article -
19
Research of neural network algorithms for recognizing railway infrastructure objects in video images
Published 2025-06-01“…Both algorithms are aimed at improving railway traffic safety. One algorithm detects foreign objects on railway tracks and objects relating to the railway infrastructure. …”
Get full text
Article -
20
Vibration-based gait analysis via instrumented buildings
Published 2019-10-01“…Signal-energy-based algorithms detect the heel strike of each step during trials. …”
Get full text
Article