Search alternatives:
feature » features (Expand Search)
Showing 881 - 900 results of 4,166 for search 'Feature detection algorithms', query time: 0.12s Refine Results
  1. 881

    Fatigue Detection Algorithm for Nuclear Power Plant Operators Based on Random Forest and Back Propagation Neural Networks by Yuhang Jiang, Junsong Li, Yu Zhang

    Published 2025-02-01
    “…First, the random forest algorithm is used to classify the feature data according to different scenarios. …”
    Get full text
    Article
  2. 882

    Enhancement of Breast Cancer Classification Using Bat Feature Selection with Recurrent Deep Learning by Ali Nafaa Jaafar

    Published 2024-01-01
    “…The bat algorithm assists in selecting the best relevant feature when integrated with recurrent deep learning models, which improves breast cancer classification by leveraging training datasets. …”
    Get full text
    Article
  3. 883
  4. 884
  5. 885

    Accurate localization of indoor high similarity scenes using visual slam combined with loop closure detection algorithm. by Zhuoheng Xiang, Jiaxi Guo, Jin Meng, Xin Meng, Yan Li, Jonghyuk Kim, Shifeng Wang, Bo Lu, Yu Chen

    Published 2024-01-01
    “…To address this issue, this paper proposes an improved visual SLAM loop closure detection algorithm that integrates deep learning techniques. …”
    Get full text
    Article
  6. 886

    Unsupervised Binary Classifier-Based Object Detection Algorithm with Integrated Background Subtraction Suitable for Use with Aerial Imagery by Gabija Veličkaitė, Ignas Daugėla, Ivan Suzdalev

    Published 2025-08-01
    “…This research presents the development of a novel object detection algorithm designed to identify humans in natural outdoor environments using minimal computational resources. …”
    Get full text
    Article
  7. 887
  8. 888

    A Fault Detection Method for Multi-Sensor Data of Spring Circuit Breakers Based on the RF-Adaboost Algorithm by Chuang Wang, Peijie Cong, Sifan Yu, Jing Yuan, Nian Lv, Yu Ling, Zheng Peng, Haoyan Zhang, Hongwei Mei

    Published 2025-07-01
    “…This paper proposes a multi-sensor data fusion fault detection method based on the RF-Adaboost algorithm for spring-operated circuit breakers. …”
    Get full text
    Article
  9. 889

    EAD-YOLOv10: Lightweight Steel Surface Defect Detection Algorithm Research Based on YOLOv10 Improvement by Hu Haoyan, Tong Jinwu, Wang Haibin, Lu Xinyun

    Published 2025-01-01
    “…The experimental results show that the improved EAD-YOLOv10 network model achieves an average precision of 94.2% for detecting six types of defects in the NEU-DET dataset, which is an improvement of 7.6% over the baseline model, with a 9.75% reduction in model size and a 12.5% decrease in computational load, outperforming other mainstream object detection algorithms and meeting the requirements for SD detection in industrial production. …”
    Get full text
    Article
  10. 890
  11. 891

    YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes by Yiliang Zeng, Xiuhong Wang, Jinlin Zou, Hongtao Wu

    Published 2025-06-01
    “…The algorithm further leverages an improved multi-attention detection head, Dyhead_v3, to refine the representation of small-target features. …”
    Get full text
    Article
  12. 892

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…Visually impaired persons (VIPs) can utilize the OD approach for detecting problems and recognizing services to offer secure and informative navigation. …”
    Get full text
    Article
  13. 893

    YOLO-IRS: Infrared Ship Detection Algorithm Based on Self-Attention Mechanism and KAN in Complex Marine Background by Limin Guo, Yuwu Wang, Muran Guo, Xiaohai Zhou

    Published 2024-12-01
    “…Compared to mainstream detection algorithms, YOLO-IRS achieves higher detection accuracy while requiring relatively fewer computational resources, verifying the superiority of the proposed algorithm and enhancing the detection performance of infrared ship targets.…”
    Get full text
    Article
  14. 894

    Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms by S. Jayanthi, Swathi Sowmya Bavirthi, P. Murali, K. Vijaya Kumar, Hend Khalid Alkahtani, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-08-01
    “…Initially, the data normalization stage leverages linear scaling normalization (LSN) for converting input data into a beneficial format. Furthermore, the feature selection process uses the RIME optimization algorithm (ROA) model to select the most relevant features from the data. …”
    Get full text
    Article
  15. 895

    A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm by Fadhil Abbas Fadhil, Farah Tawfiq Abdul Hussien, Teba Walaa Aldeen Khairi, Nikolai Safiullin

    Published 2024-07-01
    “…   Text encryption in video is a vital tool in many industries where protecting sensitive information is of highest concern. Algorithms and automated detection methods commonly struggle to locate hidden text in video frames. …”
    Get full text
    Article
  16. 896

    Detection and Pattern Recognition of Chemical Warfare Agents by MOS-Based MEMS Gas Sensor Array by Mengxue Xu, Xiaochun Hu, Hongpeng Zhang, Ting Miao, Lan Ma, Jing Liang, Yuefeng Zhu, Haiyan Zhu, Zhenxing Cheng, Xuhui Sun

    Published 2025-04-01
    “…In summary, the proposed MOS-based MEMS sensor array driven by pattern recognition algorithms can be integrated into portable devices, showing great potential and practical applications in the rapid, in situ, and on-site detection and identification of CWAs.…”
    Get full text
    Article
  17. 897

    An airport apron ground service surveillance algorithm based on improved YOLO network by Yaxi Xu, Yi Liu, Ke Shi, Xin Wang, Yi Li, Jizong Chen

    Published 2024-06-01
    “…The improved algorithm can efficiently extract the information features of small-sized objects, medium-sized objects, and moving objects in large scenes, and it achieves effective detection of activities of ground service in the apron area. …”
    Get full text
    Article
  18. 898

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  19. 899

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  20. 900

    Assessing the quality of whole slide images in cytology from nuclei features by Paul Barthe, Romain Brixtel, Yann Caillot, Benoît Lemoine, Arnaud Renouf, Vianney Thurotte, Ouarda Beniken, Sébastien Bougleux, Olivier Lézoray

    Published 2025-04-01
    “…To address these challenges, this article introduces a straightforward, interpretable, and computationally efficient quality control module to ensure optimal algorithmic performance. Methods: The proposed quality control module ensures algorithmic performance by representing an algorithm by a reference whole slide image preparation protocol validated on it. …”
    Get full text
    Article