Search alternatives:
feature » features (Expand Search)
Showing 1,381 - 1,400 results of 4,166 for search 'Feature detection algorithms', query time: 0.16s Refine Results
  1. 1381

    Detection of communities with Naming Game-based methods. by Thais Gobet Uzun, Carlos Henrique Costa Ribeiro

    Published 2017-01-01
    “…We show that the separate addition of each social feature in the Naming Game results in gradual improvements with respect to community detection. …”
    Get full text
    Article
  2. 1382

    Systematic Review: Malware Detection and Classification in Cybersecurity by Sebastian Berrios, Dante Leiva, Bastian Olivares, Héctor Allende-Cid, Pamela Hermosilla

    Published 2025-07-01
    “…These studies cover a variety of detection techniques, including machine learning, deep learning and hybrid models, with a focus on feature extraction, malware behavior analysis and the application of advanced algorithms to improve detection accuracy. …”
    Get full text
    Article
  3. 1383

    Ensemble Method for Anomaly Detection On the Internet of Things by Kurniabudi Kurniabudi, Eko Arip Winanto, Lola Yorita Astri, Sharipuddin Sharipuddin

    Published 2024-01-01
    “…High data dimensions and unbalanced data are one of the challenges in detecting attacks. To overcome the large data dimensions, Chi-square was chosen as a feature selection technique. …”
    Get full text
    Article
  4. 1384

    Dynamic Collaborative Optimization Method for Real-Time Multi-Object Tracking by Ziqi Li, Dongyao Jia, Zihao He, Nengkai Wu

    Published 2025-05-01
    “…To tackle these issues, this paper proposes a multi-modal fusion tracking framework that realizes high-precision tracking in complex scenarios by collaboratively optimizing feature enhancement and motion prediction. Firstly, a multi-scale feature adaptive enhancement (MS-FAE) module is designed, integrating multi-level features and introducing a small object adaptive attention mechanism to enhance the representation ability for small objects. …”
    Get full text
    Article
  5. 1385

    An advanced method for surface damage detection of concrete structures in low-light environments based on image enhancement and object detection networks by Tianyong Jiang, Lin Liu, Chunjun Hu, Lingyun Li, Jianhua Zheng

    Published 2024-12-01
    “…Abstract Surface damage detection in concrete structures is critical for maintaining structural integrity, yet current object detection algorithms often struggle in low-light environments. …”
    Get full text
    Article
  6. 1386

    Detecting anomalies in graph networks on digital markets. by Agata Skorupka

    Published 2024-01-01
    “…It compares different graph algorithms to extract feature sets for anomaly detection models. …”
    Get full text
    Article
  7. 1387

    Optimizing Deep Learning Algorithms for Effective Chicken Tracking through Image Processing by Saman Abdanan Mehdizadeh, Allan Lincoln Rodrigues Siriani, Danilo Florentino Pereira

    Published 2024-08-01
    “…The complexity of these environments demands robust and adaptive algorithmic approaches for the accurate detection and tracking of birds over time, ensuring reliable data analysis. …”
    Get full text
    Article
  8. 1388

    MRP-YOLO: An Improved YOLOv8 Algorithm for Steel Surface Defects by Shuxian Zhu, Yajie Zhou

    Published 2024-12-01
    “…The existing detection algorithms are unable to achieve a suitable balance between detection accuracy and inference speed. …”
    Get full text
    Article
  9. 1389

    Evaluation of Human Action Based on Feature-Weighted Dynamic Time Warping by Mingdie Yan, Xia Liu, Zhaoyang Li, Naiyu Guo

    Published 2024-11-01
    “…Firstly, we collected human skeletal key-point data based on a depth camera and processed these data with gap filling and filtering; then, the effective data segments were segmented from the whole action dataset, angle and distance features were extracted, and the feature matrix was obtained; then, we used the Euclidean Barycenter Dynamic Time Warping–Barycenter Averaging algorithm to produce action templates; finally, we proposed a Feature-Weighted Dynamic Time Warping algorithm to calculate the similarity between the detected action and the template action and established an action achievement score mechanism to evaluate the rehabilitation action. …”
    Get full text
    Article
  10. 1390

    Development of data driven models to accurately estimate density of fatty acid ethyl esters by Walid Abdelfattah, Munthar Kadhim Abosaoda, Hardik Doshi, H. S. Shreenidhi, Manoranjan Parhi, Devendra Singh, Prabhjot Singh, Abdolali Yarahmadi Kandahari

    Published 2025-08-01
    “…The reliability of the dataset, consisting of 1307 experimental datapoints gathered from the literature, was ensured through the application of a Monte Carlo outlier detection algorithm, which validated its suitability for model training and validation. …”
    Get full text
    Article
  11. 1391

    Crop classification with deep convolutional neural network based on crop feature by Mohamad Reza Gili, Davoud Ashourloo, Hosein Aghighi, Ali Akbar Matkan, Alireza SHakiba

    Published 2022-12-01
    “…Then the algorithm was implemented using these feature channels in the test area and the overall accuracy was upgraded to 86% and the kappa coefficient to 0.82 compared to which indicated a significant improvement in the results compared to the previous case.Conclusion:The deep convolutional neural network is very sensitive to the type of input channels for detecting agricultural crops and selecting the channels with suitable tempo-spectral characteristics for different types of crops, has a great impact on the accuracy of network training and can reduce the loss of training network and increase its efficiency in the classification of various crops.…”
    Get full text
    Article
  12. 1392

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  13. 1393

    Security situational awareness of power information networks based on machine learning algorithms by Chao Wang, Jia-han Dong, Guang-xin Guo, Tian-yu Ren, Xiao-hu Wang, Ming-yu Pan

    Published 2023-12-01
    “…To properly predict the security posture of these networks, we provide a method based on machine learning algorithms to detect the security condition of power information networks. …”
    Get full text
    Article
  14. 1394

    Predicting diabetes using supervised machine learning algorithms on E-health records by Sulaiman Afolabi, Nurudeen Ajadi, Afeez Jimoh, Ibrahim Adenekan

    Published 2025-03-01
    “…Methods: This study investigates the early detection and management of diabetes by applying machine learning techniques to electronic health records. …”
    Get full text
    Article
  15. 1395

    An automatic classification of breast cancer using fuzzy scoring based ResNet CNN model by Nisha Y., Jagadeesh Gopal

    Published 2025-07-01
    “…Further, this research concentrates on improving computation time based on the detection process. So, this research introduces a hybrid DL model for improving prediction performance andreducing time consumption compared to the machine learning (ML)model.Describing a pre-processing method utilizing statistical co-relational evaluation to improve the classifier’s accuracy.The features are then extracted from the Region of Interest (ROI) images using the wrapping technique and a fast discrete wavelet transform (FDWT). …”
    Get full text
    Article
  16. 1396
  17. 1397

    Improve the robustness of algorithm under adversarial environment by moving target defense by Kang HE, Yuefei ZHU, Long LIU, Bin LU, Bin LIU

    Published 2020-08-01
    “…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
    Get full text
    Article
  18. 1398

    Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm. by Zongjin Li, Liqin Tian, Libing Bai, Zeyu Jia, Xiaoming Wu, Changxin Song

    Published 2025-01-01
    “…The algorithm then uses hybrid clustering methods for gene module detection. …”
    Get full text
    Article
  19. 1399

    An experimental method for detecting objects in an aqueous environment by Kuzmin Yuri, Proshkin Stanislav

    Published 2025-01-01
    “…To facilitate this process, the researchers developed a specialized algorithm designed to filter out pulse and fluctuation interference. …”
    Get full text
    Article
  20. 1400

    Unsupervised detection of semantic correlations in big data by Santiago Acevedo, Alex Rodriguez, Alessandro Laio

    Published 2025-05-01
    “…Abstract In real-world data, information is stored in extremely large feature vectors. These variables are typically correlated due to complex interactions involving many features simultaneously. …”
    Get full text
    Article