Search alternatives:
feature » features (Expand Search)
Showing 341 - 360 results of 4,166 for search 'Feature detection algorithms', query time: 0.12s Refine Results
  1. 341

    Study on Lightweight Bridge Crack Detection Algorithm Based on YOLO11 by Xuwei Dong, Jiashuo Yuan, Jinpeng Dai

    Published 2025-05-01
    “…In this study, a lightweight bridge crack detection algorithm, YOLO11-Bridge Detection (YOLO11-BD), is proposed based on the optimization of the YOLO11 model. …”
    Get full text
    Article
  2. 342

    A Defect Detection Algorithm for Optoelectronic Detectors Utilizing GLV-YOLO by Xinfang Zhao, Qinghua Lyu, Hui Zeng, Zhuoyi Ling, Zhongsheng Zhai, Hui Lyu, Saffa Riffat, Benyuan Chen, Wanting Wang

    Published 2025-02-01
    “…To meet the demands of real-time and accurate defect detection, this paper introduces an optimization algorithm based on the GLV-YOLO model tailored for photodetector defect detection in manufacturing settings. …”
    Get full text
    Article
  3. 343

    DS-YOLOv7: Dense Small Object Detection Algorithm for UAV by Tao Sun, Haonan Chen, Haiying Liu, Lixia Deng, Lida Liu, Shuang Li

    Published 2024-01-01
    “…In this paper, we propose an improved YOLOv7 UAV dense small object detection algorithm (DS-YOLOv7) to improve the UAV detection performance of dense small objects. …”
    Get full text
    Article
  4. 344

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article
  5. 345

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article
  6. 346

    Modified Whale Optimization Algorithm for Multiclass Skin Cancer Classification by Abdul Majid, Masad A. Alrasheedi, Abdulmajeed Atiah Alharbi, Jeza Allohibi, Seung-Won Lee

    Published 2025-03-01
    “…To address these challenges, this paper proposes an innovative deep learning-based framework that integrates an ensemble of two pre-trained convolutional neural networks (CNNs), SqueezeNet and InceptionResNet-V2, combined with an improved Whale Optimization Algorithm (WOA) for feature selection. The deep features extracted from both models are fused to create a comprehensive feature set, which is then optimized using the proposed enhanced WOA that employs a quadratic decay function for dynamic parameter tuning and an advanced mutation mechanism to prevent premature convergence. …”
    Get full text
    Article
  7. 347

    A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection by Mahdieh Maazalahi, Soodeh Hosseini

    Published 2025-03-01
    “…In this paper, a new IDS is proposed to detect IoT-Botnet DDoS attacks. This IDS is a new three-phase system, the first phase is related to preprocessing on the dataset and the second phase includes a new hybrid method for feature selection using filter and wrapper methods based on the Grey Wolf (GW) algorithm and genetics called GW-GA. …”
    Get full text
    Article
  8. 348

    Detection algorithm of electronic disguised voice based on convolutional neural network by Hongwei XU, Diqun YAN, Fan YANG, Rangding WANG, Chao JIN, Li XIANG

    Published 2018-02-01
    “…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
    Get full text
    Article
  9. 349
  10. 350

    A Tunnel Surface Diseases Detection Algorithm Based on YOLOv4 by LI Jia, QIU Xinhua, JI Yuwen

    Published 2021-01-01
    “…Experimental results show that the detection speed can reach 55fps by using this algorithm and NVIDIA GeForce 2080Ti. …”
    Get full text
    Article
  11. 351

    Semantic rule-based sentiment detection algorithm for Russian publicism sentences by Anatoliy Y. Poletaev, Ilya V. Paramonov, Elena I. Boychuk

    Published 2023-12-01
    “…To fill the gap, the authors developed a novel publisism sentences oriented sentiment detection algorithm. The algorithm recursively applies appropriate rules to sentence parts represented as constituency trees. …”
    Get full text
    Article
  12. 352

    Improving lameness detection in cows: A machine learning algorithm application by Elma Dervić, Caspar Matzhold, Christa Egger-Danner, Franz Steininger, Peter Klimek

    Published 2024-12-01
    “…A Random Forest classifier, using input features selected by the Boruta algorithm, was used for the prediction task; effects of individual features were further assessed using partial dependence plots. …”
    Get full text
    Article
  13. 353

    FI-SURF algorithm for image copy-flip-move forgery detection by IYan L, IUNian L, HANGBin Z, UANKai-guo Y, ANGYi-xian Y

    Published 2015-05-01
    “…FI-SURF (flip invariant SURF) algorithm was proposed,for the consideration of the copy-move forgery detec-tion of digital images.The arrangement of the SURF (speeded-up robust features) descriptor after image flip was studied.After extract the SURF interest points,rearrange the descriptors,the interest points can still be matched even under the condition of copy-flip-move.The experiment results show that FI-SURF not only reserved the advantage of SURF,but also can detect the copy-flip-move forgery,and can locate the duplicated region.…”
    Get full text
    Article
  14. 354
  15. 355

    Improved Hypernymy Detection Algorithm Based on Heterogeneous Graph Neural Network by Li Ren, Jing Huang, Hai-Tao Jia, Shu-Bao Sun, Kai-Shi Wang, Yi-Le Wu

    Published 2025-05-01
    “…To address the problem of overfitting in traditional graph attention networks, the calculation order of adjacency node aggregation is changed in the heterogeneous graph to capture dynamic attention features. In addition, a pipeline for hierarchical system construction is designed and implemented, combining the divide-and-conquer approach with loop detection algorithms. …”
    Get full text
    Article
  16. 356

    Stochastic algorithm for HDFS data theft detection based on MapReduce by Yuanzhao GAO, Binglong LI, Xingyuan CHEN

    Published 2018-10-01
    “…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
    Get full text
    Article
  17. 357

    A Closed-loop Detection Algorithm Based on Dynamic Time Warping by ZHU Tian, PENG Zhichuan, ZHANG Zhiteng, ZHU Zemin, XIE Yongbo, WANG Wenming

    Published 2021-01-01
    “…In the research of closed-loop detection, algorithms based on single image matching are drawing great research interests. …”
    Get full text
    Article
  18. 358

    Lightweight remote sensing ship detection algorithm based on YOLOv5s by Haochen WANG, Yuelan XIN, Jiang GUO, Qingqing WANG

    Published 2024-10-01
    “…ObjectiveThis paper proposes a lightweight remote sensing ship target detection algorithm LR-YOLO based on improved YOLOv5s to meet the lightweight and fast inference requirements of ship target detection tasks involving remote sensing images. …”
    Get full text
    Article
  19. 359

    Detection of Graduation Potential in Prospective Students using the Random Forest Algorithm by Puguh Hasta Gunawan, Irving Vitra Paputungan

    Published 2025-09-01
    “…Detecting students’ graduation potential is commonly performed by evaluating various academic and non-academic factors. …”
    Get full text
    Article
  20. 360

    Retracted: Image Target Detection Algorithm of Smart City Management Cases by Ping Tan, Kedun Mao, Sheng Zhou

    Published 2020-01-01
    “…The algorithm a hog-target detection describes the features of the object’s surface edges in areas such as graphics and image processing; and calculates the distribution of characteristics in the direction of inclination of the particular part of the image. …”
    Get full text
    Article