Search alternatives:
feature » features (Expand Search)
Showing 541 - 560 results of 4,166 for search 'Feature detection algorithms', query time: 0.16s Refine Results
  1. 541

    An Improved Binary Spider Wasp Optimization Algorithm for Intrusion Detection for Industrial Internet of Things by Mousa'b Mohammad Shtayat, Mohammad Kamrul Hasan, Anil Kumar Budhati, Rossliawati Solaiman, Shayla Islam, Bishwajeet Pandey, Huda Saleh Abbas, Mamoon Mohammed Ali Saeed

    Published 2025-01-01
    “…The results demonstrate the superior classification accuracy, precision, recall, and F1-measure of IBSWO compared to established Metaheuristic (MH) algorithms and machine learning techniques. Furthermore, the incorporation of flat crossover and transfer functions presents promising advancements in feature selection methodologies for IIoT IDS, offering implications for enhancing network security, and effectively detecting and mitigating evolving cyber threats.…”
    Get full text
    Article
  2. 542
  3. 543

    Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine by Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable

    Published 2022-01-01
    “…In the first level, the firefly algorithm (FFA) and the CfsSubsetEval feature section method have been applied to optimize the subset of features, while in the second level, the support vector machine classifier has been used to build the training model for the detection of credit card fraud cases. …”
    Get full text
    Article
  4. 544

    AReal-time Detection Method of Vehicle Target Based on Improved YOLOv5s Algorithm by CHEN Xiufeng, WANG Chengxin, WU Yuechen, GU Kexin

    Published 2024-02-01
    “…To improve the detection rate of small target vehicles,an optimization of the YOLOv5s algorithm network structure was established,which added a small target detection layer and spliced the shallow feature map with the deep feature map in the detection. …”
    Get full text
    Article
  5. 545

    Photovoltaic panel defect detection algorithm based on infrared imaging and improved YOLOv8 by Jingdong Wang, Zhu Cheng

    Published 2025-04-01
    “…To address the challenges of high missed detection rates, complex backgrounds, unclear defect features, and uneven difficulty levels in target detection during the industrial process of photovoltaic panel defect detection, this article proposes an infrared detection method based on computer vision, with enhancements built upon the YOLOv8 model. …”
    Get full text
    Article
  6. 546

    A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network by Zheng Yang, Hua Zhu, Zhao Li, Gang Wang, Meng Su

    Published 2024-01-01
    “…To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
    Get full text
    Article
  7. 547

    An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks by Taiwo Blessing Ogunseyi, Gogulakrishan Thiyagarajan

    Published 2025-04-01
    “…Specifically, we employ a hybrid approach using statistical methods and a metaheuristic algorithm for feature selection to identify the most relevant features and limit the overall feature set while building an LSTM-based model for intrusion detection. …”
    Get full text
    Article
  8. 548

    DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network by Peitao Cheng, Xuanjiao Lei, Haoran Chen, Xiumei Wang

    Published 2025-03-01
    “…As a computer vision task, object detection algorithms can be applied to various real-world scenarios. …”
    Get full text
    Article
  9. 549

    GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm by Xiangqiang Kong, Guangmin Liu, Yanchen Gao

    Published 2025-05-01
    “…Finally, the coordinate attention is introduced into the neck network to decompose the channel attention and aggregate the features, which can effectively retain the spatial information and thus improve the detection and localization accuracy of tiny defects (defect area less than 1% of total image area) in PCB defect images. …”
    Get full text
    Article
  10. 550
  11. 551

    Defect Detection Algorithm for Electrical Substation Equipment Based on Improved YOLOv10n by Qingkai Meng, Tianren Fu, Kangning Li, Long Huang, Shaoqiang Chen

    Published 2025-01-01
    “…Addressing the shortcomings of current algorithms in small target detection, complex background processing, and the balance between real-time and accuracy, this paper proposes several key improvements to the YOLOv10n framework to address these limitations. …”
    Get full text
    Article
  12. 552

    Complex Texture Contour Feature Extraction of Cracks in Timber Structures of Ancient Architecture Based on YOLO Algorithm by Jian Ma, Weidong Yan, Guoqi Liu, Shiyu Xing, Siqi Niu, Tong Wei

    Published 2022-01-01
    “…In order to find a better algorithm, this paper mainly adopts three models including YOLO v3, YOLO v4s-mish, and YOLO v5s to detect cracks in the timber structures of ancient architecture, and compares and analyzes the advantages and disadvantages of the three models. …”
    Get full text
    Article
  13. 553
  14. 554

    Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment by Faten Khalid Karim, José Varela-Aldás, Mohamad Khairi Ishak, Ayman Aljarbouh, Samih M. Mostafa

    Published 2024-11-01
    “…Additionally, the method utilizes the Chameleon Optimization Algorithm (COA)-based feature selection (FS) approach to identify the optimal feature set. …”
    Get full text
    Article
  15. 555

    ResNet18 facial feature extraction algorithm improved based on hybrid domain attention mechanism. by Yingying Mei

    Published 2025-01-01
    “…To solve these problems, based on the improvement of adaptive boosting to improve the accuracy of face detection, the study proposes a residual network 18-layer face feature extraction algorithm based on hybrid domain attention mechanism algorithm. …”
    Get full text
    Article
  16. 556
  17. 557

    Improved M-ORB based direct-loop closure detection algorithm for visual SLAM by Wei LI, Menghan REN, Weihao HUANG, Xiaoyu DU, Yi ZHOU

    Published 2021-12-01
    “…Most kinds of direct methods do not extract image feature points in the front end of SLAM system, resulting in that they cannot use loop closure detection with bag-of-words models to eliminate the cumulative error of the system.To resolve this problem, an improved mature-oriented fast and rotated BRIEF (M-ORB) based direct-loop closure detection algorithm for visual SLAM was proposed, which designed an improved M-ORB, generated the bag of words model required for loop closure detection, and then used the term frequency-inverse document frequency (TF-IDF) algorithm to adaptively assign weights to the visual words in each sub-node of the dictionary tree.Finally, an accurate representation of the scene information was obtained.In the end, the proposed algorithm and conducted comparative experiments were verified though two public data sets TUM and KITTI.The experimental results show that the algorithm proposed in this paper can effectively detect the loop closure, and has better real-time and robustness performance without reducing the accuracy.…”
    Get full text
    Article
  18. 558
  19. 559

    ALGORITHM OF UNMANNED AERIAL VEHICLES ACOUSTIC SIGNALS DETECTION BASED ON ANALYSIS OF FRACTAL DIMENSION by Leonid M. Artushin, Mykola V. Buhaiov

    Published 2018-08-01
    “…The proposed algorithm can be used in passive acoustic detection systems.…”
    Get full text
    Article
  20. 560