Showing 6,381 - 6,400 results of 12,475 for search '"algorithms"', query time: 0.09s Refine Results
  1. 6381

    Vehicle speed measurement method using monocular cameras by Hao Lian, Meian Li, Ting Li, Yongan Zhang, Yanyu Shi, Yikun Fan, Wenqian Yang, Huilin Jiang, Peng Zhou, Haibo Wu

    Published 2025-01-01
    “…Finally, the algorithm is combined with You Only Look Once version 7 (YOLOv7) and Deep Simple Online and Realtime Tracking (DeepSORT) algorithms, integrating multiple model structures to optimize the network, achieving precise multi-target speed measurement. …”
    Get full text
    Article
  2. 6382

    Localization and detection of deepfake videos based on self-blending method by Junfeng Xu, Xintao Liu, Weiguo Lin, Wenqing Shang, Yuefeng Wang

    Published 2025-01-01
    “…Abstract Deepfake technology, which encompasses various video manipulation techniques implemented through deep learning algorithms-such as face swapping and expression alteration-has advanced to generate fake videos that are increasingly difficult for human observers to detect, posing significant threats to societal security. …”
    Get full text
    Article
  3. 6383

    Characterization of soundscapes with acoustic indices and clustering reveals phenology patterns in a subtropical rainforest by Yan-Tin Lai, Sheng-Shan Lu, Ming-Tang Shiao

    Published 2025-02-01
    “…Our study confirms that acoustic indices can extract meaningful ecological features, and unsupervised algorithms offer valuable insights into biodiversity exploration data-scarce regions. …”
    Get full text
    Article
  4. 6384

    Wind Energy Resource Prediction and Optimal Storage Sizing to Guarantee Dispatchability: A Case Study in the Kenyan Power Grid by Hampfrey Odero, Cyrus Wekesa, George Irungu

    Published 2022-01-01
    “…Therefore, this study aims to utilize backpropagation neural network (BPNN) algorithm to conduct hourly prediction of the generation output of Lake Turkana Wind Power Plant (LTWPP), a 310 MW plant connected to the Kenyan power grid, and optimally size its battery energy storage system (BESS) using genetic algorithm (GA) to guarantee its dispatchability. …”
    Get full text
    Article
  5. 6385

    Bidimensional Increment Entropy for Texture Analysis: Theoretical Validation and Application to Colon Cancer Images by Muqaddas Abid, Muhammad Suzuri Hitam, Rozniza Ali, Hamed Azami, Anne Humeau-Heurtier

    Published 2025-01-01
    “…Entropy algorithms are widely applied in signal analysis to quantify the irregularity of data. …”
    Get full text
    Article
  6. 6386

    Cross-Domain Person Re-Identification Based on Multi-Branch Pose-Guided Occlusion Generation by Pengnan Liu, Yanchen Wang, Yunlong Li, Deqiang Cheng, Feixiang Xu

    Published 2025-01-01
    “…Experimental results indicate that, compared to current mainstream algorithms, this method shows significant advantages in the first hit rate (Rank-1), mean average precision (mAP), and generalization performance. …”
    Get full text
    Article
  7. 6387

    Health system costs of providing outpatient care for diabetes in people with TB in the Philippines by T. Yamanaka, M.C. Castro, J.P. Ferrer, J.A. Solon, S.E. Cox, Y.V. Laurence, A. Vassall

    Published 2024-03-01
    “…The cost per case detected for different algorithms varied from USD17.43 to USD80.81. The monthly cost per patient was estimated at USD8.95 to USD12.36. …”
    Get full text
    Article
  8. 6388

    A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique by Omar Y. Abdulhammed, Pshtiwan J. Karim, Dashne R. Arif, Twana S. Ali, Avin O. Abdalrahman, Arkan A. Saffer

    Published 2022-10-01
    “…Firstly, to promote the hiding ability and to realize altitude standard of secrecy the mystery message is separated into four parts and the cover image is masked and also divided into four sections, then the edge detection algorithm and shark smell optimization is performed on each section respectively. …”
    Get full text
    Article
  9. 6389

    An Improved Tree Crown Delineation Method Based on a Gradient Feature-Driven Expansion Process Using Airborne LiDAR Data by Jiaxuan Jia, Lei Zhang, Kai Yin, Uwe Sörgel

    Published 2025-01-01
    “…However, the accuracy of current existing algorithms is limited due to the influence of understory vegetation and variations in tree crown geometry (e.g., the delineated crown boundaries consistently extend beyond their actual boundaries). …”
    Get full text
    Article
  10. 6390

    A Comparison of Machine Learning-Based Approaches in Estimating Surface PM<sub>2.5</sub> Concentrations Focusing on Artificial Neural Networks and High Pollution Events by Shijin Wei, Kyle Shores, Yangyang Xu

    Published 2025-01-01
    “…This study compares various machine learning models, including linear models, tree-based algorithms, and artificial neural networks (ANNs) for estimating PM<sub>2.5</sub> concentrations using the MERRA-2 dataset from 2012 to 2023. …”
    Get full text
    Article
  11. 6391

    Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley by Alaa Selim, Huadong Mo, Hemanshu Pota

    Published 2025-02-01
    “…Additionally, we introduce a verification case using a different battery model and estimation algorithm to enhance generalization. This case involves high-noise signals with defined thresholds for current and voltage noise levels, which cause significant disruptions to Kalman Filters. …”
    Get full text
    Article
  12. 6392

    Parameter Uncertainty Analysis for Streamflow Simulation Using SWAT Model in Nashe Watershed, Blue Nile River Basin, Ethiopia by Megersa Kebede Leta, Dessalegn Geleta Ebsa, Motuma Shiferaw Regasa

    Published 2022-01-01
    “…Model calibration, validation, and analysis of parameter uncertainty were conducted for both daily and monthly observed streamflows at the gauging stations through SUFI-2, which is one of the algorithms of the SWAT-Calibration and Uncertainty Program (SWAT_CUP). …”
    Get full text
    Article
  13. 6393

    Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model by Godfrey A. Mills, Daniel K. Acquah, Robert A. Sowah

    Published 2024-01-01
    “…Three machine learning algorithms comprising a multilayer perceptron neural network, a modified self-organizing map, and a decision tree were used for the detection framework. …”
    Get full text
    Article
  14. 6394

    Phylogenetic relationships between Palaearctic species of the Anopheles maculipennis complex (Diptera: Culicidae) revealed by different approaches and markers. The problem of conse... by O. V. Vaulin, Yu. M. Novikov

    Published 2016-12-01
    “…We constructed phylogenetic schemes on the sequences of a COI gene fragment, the D2 variable region of 28S rDNA and ITS2 of rRNA genes using various algorithms (Neighborjoining, Minimum Evolution, Maximum parsimony and Maximum likelihood). …”
    Get full text
    Article
  15. 6395

    Presentating a multi-objective optimization model for resource-constrained project scheduling regarding financial costs, time delays and the reliability function by Saeideh Naderi, Mohsen Vaez-Ghasemi, Farzad Movahedi Sobhani

    Published 2025-03-01
    “…The results of using these algorithms and the statistical analysis (with 95% reliability) indicated that the performance was suitable for the Genetic Algorithm (GA). …”
    Get full text
    Article
  16. 6396

    Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems by Denis Benka, Dusan Horvath, Lukas Spendla, Gabriel Gaspar, Maximilian Stremy

    Published 2025-01-01
    “…This paper proposes a machine learning (ML)-based approach to anomaly detection in ICS communication networks, focusing on techniques such as 1D Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Support Vector Machines (SVMs), and Isolation Forest (iForest) algorithms. We generated a dataset by capturing both normal and manipulated ICS communication patterns, including TCP/IP traffic. …”
    Get full text
    Article
  17. 6397

    Bayesian Regularized Neural Network Model Development for Predicting Daily Rainfall from Sea Level Pressure Data: Investigation on Solving Complex Hydrology Problem by Lu Ye, Saadya Fahad Jabbar, Musaddak M. Abdul Zahra, Mou Leong Tan

    Published 2021-01-01
    “…The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. …”
    Get full text
    Article
  18. 6398

    Prediction of Current and Future Distributions of Chalcophora detrita (Coleoptera: Buprestidae) Under Climate Change Scenarios by Arif Duyar, Muhammed Arif Demir, Mahmut Kabalak

    Published 2025-01-01
    “…An ensemble model was created by using 11 different algorithms (Artificial Neural Network, Classification Tree Analysis, eXtreme Gradient Boosting, Flexible Discriminant Analysis, Generalised Additive Model, Generalised Boosting Model, Generalised Linear Model, Multivariate Adaptive Regression Splines, Maximum Entropy, Random Forest, Surface Range Envelope) to predict the potential suitable habitats of C. detrita. …”
    Get full text
    Article
  19. 6399

    Information: on the question as for the meaningful evolution of the term by O. S. Bakumov, M. I. Marchuk, T. I. Gudz, О. О. Venglinskyi

    Published 2021-09-01
    “…The importance of the category "information" for jurisprudence is emphasized, because information is actually enshrined in law about the limits of what is allowed and the algorithms of human and state activities. The tools of modern legal methodology are used in the work, in particular formal legal, historical legal, systemic, logical semantic, method of analysis and synthesis, etc. …”
    Get full text
    Article
  20. 6400

    Modeling of Inscribed Dual Band Circular Fractal Antenna for Wi‐Fi Application Using Descartes Circle Theorem by SatheeshKumar Palanisamy, Anitha R. Vaddinuri, Arfat Ahmad Khan, Muhammad Faheem

    Published 2025-01-01
    “…The exploration of unconventional fractal shapes and the utilization of advanced optimization algorithms present promising avenues for enhancing antenna performance and achieving miniaturization. …”
    Get full text
    Article