Search alternatives:
feature » features (Expand Search)
Showing 3,821 - 3,840 results of 4,166 for search 'Feature detection algorithms', query time: 0.14s Refine Results
  1. 3821

    Application of Variational Mode Decomposition based on the FOA and in Bearing Fault Diagnosis by Chang Liu, Yanxue Wang, Jianwei Yang

    Published 2020-05-01
    “…Finally, the optimal modal component is selected based on the kurtosis maximization criterion for envelope demodulation analysis and extracting the frequency of the fault feature. The effectiveness of the presented method is verified by simulation signal analysis, detecting bearing fault signal and comparing with multi-resolution singular value decomposition (MRSVD) approach based on fruit fly optimization algorithm.…”
    Get full text
    Article
  2. 3822
  3. 3823

    An Approach for Predicting the Shape and Size of a Buried Basic Object on Surface Ground Penetrating Radar System by Nana Rachmana Syambas

    Published 2012-01-01
    “…The pattern of object under test will be known by comparing its data with the training data using a decision tree method. A simple powerful algorithm to extract feature parameters of object which is based on linear extrapolation is proposed. …”
    Get full text
    Article
  4. 3824

    Multi-camera video collaborative analysis method based on edge computing by Zhibo QI, Lei DU, Ru HUO, Fan YANG, Tao HUANG

    Published 2023-08-01
    “…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
    Get full text
    Article
  5. 3825

    Video Pulses: User-Based Modeling of Interesting Video Segments by Markos Avlonitis, Konstantinos Chorianopoulos

    Published 2014-01-01
    “…Previous research in video retrieval has focused on content-based techniques, such as pattern recognition algorithms that attempt to understand the low-level features of a video. …”
    Get full text
    Article
  6. 3826

    Automated Analysis of Fluorescence Microscopy Images to Identify Protein-Protein Interactions by S. Venkatraman, M. J. Doktycz, H. Qi, J. L. Morrell-Falvey

    Published 2006-01-01
    “…These features are used to relay quantitative values that aid in the automated scoring of positive interactions. …”
    Get full text
    Article
  7. 3827

    Real-Time Recognition of Loading Cycles’ Process Based on Electric Mining Shovel Monitoring by Bonan Wang, Yun Duan, Wei Xu

    Published 2022-01-01
    “…An automatic recognition algorithm based on the feature extraction of working parameters to recognize each state in the loading cycle process of an electric mining shovel was proposed. …”
    Get full text
    Article
  8. 3828

    Development and validation of a carotid plaque risk prediction model for coal miners by Yi-Chun Li, Yi-Chun Li, Yi-Chun Li, Tie-Ru Zhang, Tie-Ru Zhang, Tie-Ru Zhang, Fan Zhang, Fan Zhang, Fan Zhang, Chao-Qun Cui, Chao-Qun Cui, Chao-Qun Cui, Yu-Tong Yang, Yu-Tong Yang, Yu-Tong Yang, Jian-Guang Hao, Jian-Ru Wang, Jiao Wu, Hai-Wang Gao, Ying-Bo Liu, Ming-Zhong Luo, Li-Jian Lei, Li-Jian Lei, Li-Jian Lei

    Published 2025-05-01
    “…Finally, a nomogram was plotted to increase its interpretability.ResultsThe XGBoost algorithm demonstrated superior performance in feature screening, identifying the top five features as follows: age, systolic blood pressure, low-density lipoprotein cholesterol, white blood cell count, and body mass index (BMI). …”
    Get full text
    Article
  9. 3829

    Application Of K-Nearest Neighbor Algoritma for Customer Review Sentiment Analysis at Ngeboel Vapestore Shop by Muhammad Aryanda, Ita Arfyanti, Yulindawati Yulindawati

    Published 2025-06-01
    “… This study applies the K-Nearest Neighbor (K-NN) algorithm to classify customer sentiments from online reviews about Ngeboel Vapestore, a local MSME in the vape industry. …”
    Get full text
    Article
  10. 3830

    Moisture transport axes: a unifying definition for tropical moisture exports, atmospheric rivers, and warm moist intrusions by C. Spensberger, K. Konstali, T. Spengler

    Published 2025-04-01
    “…Here, we propose an algorithm that detects these various lines of moisture transport in instantaneous maps of the vertically integrated water vapour transport. …”
    Get full text
    Article
  11. 3831

    Whole slide image based prognosis prediction in rectal cancer using unsupervised artificial intelligence by Xuezhi Zhou, Jing Dai, Yizhan Lu, Qingqing Zhao, Yong Liu, Chang Wang, Zongya Zhao, Chong Wang, Zhixian Gao, Yi Yu, Yandong Zhao, Wuteng Cao

    Published 2024-12-01
    “…A tumor detection model was built by transfer learning. Then, on the basis of the tumor patches recognized by the tumor detection model, a convolutional autoencoder model was built for decoding the tumor patches into deep latent features. …”
    Get full text
    Article
  12. 3832

    Epidemiological, molecular, and evolutionary characteristics of G1P[8] rotavirus in China on the eve of RotaTeq application by Rui Peng, Rui Peng, Mengxuan Wang, Saleha Shahar, Guangping Xiong, Qing Zhang, Lili Pang, Hong Wang, Xiangyu Kong, Dandi Li, Zhaojun Duan

    Published 2024-12-01
    “…Phylogenetic and identity features of 11 genes were assessed by DNAStar and MEGA v.7.ResultsResults showed that the detection rate of G1P[8] in China from 2016 to 2018 was generally low with significant seasonality. …”
    Get full text
    Article
  13. 3833

    Anomaly-Aware Tropical Cyclone Track Prediction Using Multi-Scale Generative Adversarial Networks by He Huang, Difei Deng, Liang Hu, Nan Sun

    Published 2025-02-01
    “…The model is designed to handle diverse inputs, including satellite cloud imagery, vorticity, wind speed, and geopotential height, and it features an advanced center detection algorithm to ensure precise TC center identification. …”
    Get full text
    Article
  14. 3834

    Microc alcification Segmentation Using Modified U-net Segmentation Network from Mammogram Images by Md Shamim Hossain

    Published 2022-02-01
    “…The suspicious regions are detected using fuzzy C-means clustering algorithm and divided them into negative and positive patches. …”
    Get full text
    Article
  15. 3835

    Research on Sugar Concentration Sensing Based on Real-Time Polarization and Interaction Effects by Qiong Gong, Tongxiao Lyu, Song Ye, Xinqiang Wang

    Published 2025-03-01
    “…This paper presents a non-contact method for detecting the sugar concentration in solutions based on real-time polarization characteristics and an interaction effects model. …”
    Get full text
    Article
  16. 3836

    Probing cosmic voids with emission-line galaxies by Yuka Yamada, Naoki Yoshida, Naoki Yoshida

    Published 2025-06-01
    “…These features exhibit characteristic signatures that reflect both the underlying cosmology and the nature of the emission-line galaxies.DiscussionLIM-based void detection is a promising avenue for cosmological studies. …”
    Get full text
    Article
  17. 3837

    Artificial intelligence correctly classifies developmental stages of monarch caterpillars enabling better conservation through the use of community science photographs by Naresh Neupane, Rhea Goswami, Kyle Harrison, Karen Oberhauser, Leslie Ries, Colin McCormick

    Published 2024-11-01
    “…Despite advances in automated species identification, traits like developmental stage or health remain underexplored or manually annotated, with limited focus on automating these features. As a proof-of-concept, we developed a computer vision model utilizing the YOLOv5 algorithm to accurately detect monarch butterfly caterpillars in photographs and classify them into their five developmental stages (instars). …”
    Get full text
    Article
  18. 3838

    Fault Diagnosis of Rolling Bearing Using Improved Wavelet Threshold Denoising and Fast Spectral Correlation Analysis by Shaoning Tian, Dong Zhen, Junchao Guo, Haiyang Li, Hao Zhang, Fengshou Gu

    Published 2021-01-01
    “…This brings about difficulties to the extraction of its fault features. Therefore, there is a need to develop a reliable method for early fault detection of the bearing. …”
    Get full text
    Article
  19. 3839

    Decoding Anomalous Diffusion Using Higher-Order Spectral Analysis and Multiple Signal Classification by Miguel E. Iglesias Martínez, Òscar Garibo-i-Orts, J. Alberto Conejero

    Published 2025-02-01
    “…Recent advances using statistical methods and recurrent neural networks have made it possible to detect such phenomena, even in noisy conditions. In this work, we explore feature extraction through parametric and non-parametric spectral analysis methods to decode anomalously diffusing trajectories, achieving reduced computational costs compared with other approaches that require additional data or prior training. …”
    Get full text
    Article
  20. 3840

    Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography by Leihong Zhang, Xiao Yuan, Kaimin Wang, Dawei Zhang

    Published 2019-01-01
    “…In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for illumination, so that each light path is concentrated in a bucket detector to obtain intensity values of all images. Then, all the detected intensity values are encrypted by using public key cryptography algorithm to obtain the final ciphertext. …”
    Get full text
    Article