Search alternatives:
feature » features (Expand Search)
Showing 1,161 - 1,180 results of 4,166 for search 'Feature detection algorithms', query time: 0.18s Refine Results
  1. 1161

    Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks by Saad Said Alqahtany, Asadullah Shaikh, Ali Alqazzaz

    Published 2025-01-01
    “…Therefore, Enhanced Grey Wolf Optimization (EGWO) for Feature Selection (FS) is implemented. The function of EGWO is to remove unnecessary features from datasets used for intrusion detection. …”
    Get full text
    Article
  2. 1162

    A Drilling Debris Tracking and Velocity Measurement Method Based on Fine Target Feature Fusion Optimization by Jinteng Yang, Yu Bao, Zumao Xie, Haojie Zhang, Zhongnian Li, Yonggang Li

    Published 2025-08-01
    “…Specifically, we enhance the multi-scale feature fusion capability of the YOLOv11 detection head by incorporating a lightweight feature extraction module, Ghost Conv, and a feature-aligned fusion module, FA-Concat, resulting in an improved model named YOLOv11-Dd (drilling debris). …”
    Get full text
    Article
  3. 1163

    Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection by Nwamaka Georgenia Ezeji, Kingsley Ifeanyi Chibueze, Nnenna Harmony Nwobodo-Nzeribe

    Published 2024-09-01
    “…To address this issue, this study aims to develop and implement an artificial intelligence (AI)-driven system for electricity theft detection. Methodology used are data collection, data analysis, feature selection with Chi-Square, feature transformation with Principal Component Analysis (PCA), Support Vector Machine (SVM) and model for electricity theft detection.   …”
    Get full text
    Article
  4. 1164

    Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles by Naif Almakayeel

    Published 2024-10-01
    “…Machine learning (ML) techniques cannot detect every new and complex malware variant. The deep learning (DL) model is an efficient tool for detecting various malware variants. …”
    Get full text
    Article
  5. 1165

    PLY-SLAM: Semantic Visual SLAM Integrating Point–Line Features with YOLOv8-seg in Dynamic Scenes by Huan Mao, Jingwen Luo

    Published 2025-06-01
    “…On this basis, accurate 3D line-segment fitting is realized in combination with the RANSAC algorithm. Subsequently, we introduce Delaunay triangulation to construct the geometric relationships between map points, detect dynamic feature points by matching changes in the topological structure of feature points in adjacent frames, and combine them with the instance labels provided by the YOLOv8-seg to accurately remove dynamic feature points. …”
    Get full text
    Article
  6. 1166

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…In addition, the binary grey wolf optimizer (BGWO) model is utilized to choose an optimal feature subset. Moreover, the Enhanced Elman Spike Neural Network (EESNN) model detects cyber-attacks. …”
    Get full text
    Article
  7. 1167

    Efficient sepsis detection using deep learning and residual convolutional networks by Ahmed S. Almasoud, Ghada Moh Samir Elhessewi, Munya A. Arasi, Abdulsamad Ebrahim Yahya, Menwa Alshammeri, Donia Badawood, Faisal Mohammed Nafie, Mohammed Assiri

    Published 2025-07-01
    “…In this article, we present a new deep learning model to detect the occurrence of sepsis and the African vulture optimization algorithm (AVOA) to enhance the model performance. …”
    Get full text
    Article
  8. 1168

    Non-Destructive Detection of Silage pH Based on Colorimetric Sensor Array Using Extended Color Components and Novel Sensitive Dye Screening Method by Kai Zhao, Haiqing Tian, Jue Zhang, Yang Yu, Lina Guo, Jianying Sun, Haijun Li

    Published 2025-01-01
    “…Extended color components, a novel sensitive dye screening method, and a feature screening method were integrated and applied to enhance pH detection. …”
    Get full text
    Article
  9. 1169
  10. 1170

    Real-time Detection and Tracking for Operating Vehicles in Complex Mining Environments by KANG Gaoqiang, LIN Jun, LIU Shiwang, YUE Wei, XIONG Qunfang, TONG Hao

    Published 2022-10-01
    “…Aiming at the problems of poor detection effect and low tracking stability of multi-type vehicles in complex mining environment due to the similarity of operating vehicles and background images, this paper proposes a multi-category and multi-target real-time detection and tracking algorithm for operating vehicles in complex mining environments. …”
    Get full text
    Article
  11. 1171

    SH-SDS: a new static-dynamic strategy for substation host security detection by Yang Diao, Hui Chen, Wei Liu, Abdur Rasool

    Published 2024-11-01
    “…To reduce the subjectivity in manually selecting features, we combine classified protection for cybersecurity-related standards and construct the requirement generation algorithm to construct a network security detection standard library for the substation host. …”
    Get full text
    Article
  12. 1172

    A Statistical Framework to Detect and Quantify Operator-Learning Curves in Medical Device Safety Evaluation by Ssemaganda HC, Davis SE, Govindarajulu US, Koola JD, Mao J, Westerman DM, Perkins AM, Speroff T, Ramsay CR, Sedrakyan A, Ohno-Machado L, Matheny ME, Resnic FS

    Published 2025-07-01
    “…Correctly attributing safety signals to learning or device effects allows for appropriate corrective actions and recommendations to improve patient safety.Objective: To develop and assess the statistical performance of an analytic framework to detect the presence of LE and quantify the learning curve (LC).Design and Setting: We generated synthetic datasets based on observed clinical distributions and complex feature correlations among patients hospitalized at US Department of Veterans Affairs facilities. …”
    Get full text
    Article
  13. 1173
  14. 1174

    Deep Learning for Detecting and Subtyping Renal Cell Carcinoma on Contrast-Enhanced CT Scans Using 2D Neural Network with Feature Consistency Techniques by Amit Gupta, Rohan Raju Dhanakshirur, Kshitiz Jain, Sanil Garg, Neel Yadav, Amlesh Seth, Chandan J. Das

    Published 2025-07-01
    “… Objective The aim of this study was to explore an innovative approach for developing deep learning (DL) algorithm for renal cell carcinoma (RCC) detection and subtyping on computed tomography (CT): clear cell RCC (ccRCC) versus non-ccRCC using two-dimensional (2D) neural network architecture and feature consistency modules.…”
    Get full text
    Article
  15. 1175

    Temporal-Spatial Feature Extraction in IoT-Based SCADA System Security: Hybrid CNN-LSTM and Attention-Based Architectures for Malware Classification and Attack Detection by Onur Polat, Ali Ayid Ahmad, Saadin Oyucu, Enes Algul, Ferdi Dogan, Ahmet Aksoz

    Published 2025-01-01
    “…This research presents a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) model developed for malware classification from IoT devices in the SCADA system and for detecting anomalies in the network. The developed model identifies complex attacks in the network by taking advantage of the strengths of CNNs that reveal spatial features and LSTMs that detect temporal dependency. …”
    Get full text
    Article
  16. 1176

    AI-driven UAV with image processing algorithm for automatic visual inspection of aircraft external surface by Mohammed A. H. Ali, Muhammad Zamil A. Zulkifle, Nik Nazri Nik Ghazali, Retna Apsari, M. M. F. Meor Zulkifli, Mohammad Alkhedher

    Published 2025-06-01
    “…Meanwhile, the two stages of AI-algorithm demonstrate a good capability on classifying the extracted features by image processing into possible defect or noises which yields to accuracy rates of 86.67%, 66.67%, 80.0%, and 76.67% for cracks, dents, scratches, and rust, respectively. …”
    Get full text
    Article
  17. 1177

    SH-YOLO: Enhanced Real-Time Detection of Laparoscopic Surgical Instruments in Computer-Aided Surgery Based on Star Operation and Hybrid Attention Mechanisms by Yiping Shao, Zhilong Xu, Qicong Zhu

    Published 2025-01-01
    “…To meet the real-time detection requirements of laparoscopic surgical instruments, a dataset for laparoscopic surgery is established, and an enhanced YOLOv5 algorithm named SH-YOLO is proposed. …”
    Get full text
    Article
  18. 1178

    A method for detecting the rate of tobacco leaf loosening in tobacco leaf sorting scenarios by Yansong Wang, Yansong Wang, Chunjie Zhang, Chunjie Zhang, Mingjie Wu, Mingjie Wu, Ruilin Luo, Lin Lu, Zaiqing Chen, Zaiqing Chen, Lijun Yun, Lijun Yun

    Published 2025-06-01
    “…Subsequently, modifications were made to YOLOv8 to improve its multi-scale object detection capabilities. This was achieved by adding layers for detecting smaller objects and integrating a weighted bi-directional feature pyramid structure to reconstruct the feature fusion network. …”
    Get full text
    Article
  19. 1179

    Smartphone sensor-based depression detection in campus environments: a proof-of-concept study with small-sample behavioral analysis by Yichen Bai, Yueze Liu, Yang Zhang, Amr Tolba

    Published 2025-08-01
    “…Feature selection was conducted using Pearson correlation, and model validation was performed using leave-one-out cross-validation with common classification algorithms.ResultsThe results yielded accuracy rates between 73.11% and 88.24%. …”
    Get full text
    Article
  20. 1180

    A comparative analysis of binary and multi-class classification machine learning algorithms to detect current frailty status using the English longitudinal study of ageing (ELSA) by Charmayne Mary Lee Hughes, Yan Zhang, Ali Pourhossein, Terezia Jurasova

    Published 2025-04-01
    “…Multi-class classification was more challenging, with Gradient Boosting emerging as the top model, achieving the highest recall (0.666) and precision (0.663) on the external validation set, with a strong F1-score (0.664) and reasonable calibration (Brier Score = 0.223).ConclusionMachine learning algorithms show promise for the detection of current frailty status, particularly in binary classification. …”
    Get full text
    Article