Search alternatives:
feature » features (Expand Search)
Showing 1,461 - 1,480 results of 4,166 for search 'Feature detection algorithms', query time: 0.16s Refine Results
  1. 1461

    Improved YOLO for long range detection of small drones by Sicheng Zhou, Lei Yang, Huiting Liu, Chongqin Zhou, Jiacheng Liu, Yang Wang, Shuai Zhao, Keyi Wang

    Published 2025-04-01
    “…Abstract The timely and accurate detection of unidentified drones is crucial for public safety. …”
    Get full text
    Article
  2. 1462

    GE-YOLO for Weed Detection in Rice Paddy Fields by Zimeng Chen, Baifan Chen, Yi Huang, Zeshun Zhou

    Published 2025-03-01
    “…It introduces the Neck network with the Gold-YOLO feature aggregation and distribution network to enhance the network’s ability to fuse multi-scale features and detect weeds of different sizes. …”
    Get full text
    Article
  3. 1463

    Recurrent Neural Network Optimized by Grasshopper for Accurate Audio Data-Based Diagnosis of Parkinson's Disease by Saif Wali Ali Alsudani, Ghassan Khudair Saud

    Published 2025-06-01
    “… Proposed here is a speech-based diagnostic framework for detecting Parkinson's disease that utilizes a Long Short-Term Memory neural network and the Grasshopper Optimization Algorithm. …”
    Get full text
    Article
  4. 1464

    Lithium Battery Thermal Runaway Warning Method Based on Multi-Feature Fusion by Mingwei DAI, Chunfu ZHANG, Jiawu YANG

    Published 2025-03-01
    “…[Conclusion] The early warning algorithm is able to accurately identify lithium batteries with abnormal temperature rise rates, and can promptly and precisely detect the timing and location of the opening of the safety valve in the lithium battery. …”
    Get full text
    Article
  5. 1465

    Enhancing radiomics robustness using bayesian penalized likelihood PET reconstruction: application to Phantom and non-small cell lung cancer patient studies by Zahra Valibeiglou, Jalil Pirayesh Islamian, Yunus Soleymani, Saeed Farzanehfar, Farahnaz Aghahosseini, Neda Gilani, Arman Rahmim, Peyman Sheikhzadeh

    Published 2025-07-01
    “…Abstract Purpose This study aims to enhance the diagnostic and prognostic capabilities of PET imaging through improved robustness of radiomics features, utilizing the Bayesian penalized likelihood (BPL) reconstruction algorithm. …”
    Get full text
    Article
  6. 1466

    Integration of Machine Learning and Wavelet Algorithms for Processing Probing Signals: An Example of Oil Wells by Zukhra Abdiakhmetova, Zhanerke Temirbekova

    Published 2025-01-01
    “…A key innovation of this study is the development of an algorithm that processes low-amplitude high-frequency signals, which are often difficult to detect with conventional methods. …”
    Get full text
    Article
  7. 1467

    A New Method for Weak Fault Feature Extraction Based on Improved MED by Junlin Li, Jingsheng Jiang, Xiaohong Fan, Huaqing Wang, Liuyang Song, Wenbin Liu, Jianfeng Yang, Liangchao Chen

    Published 2018-01-01
    “…Because of the characteristics of weak signal and strong noise, the low-speed vibration signal fault feature extraction has been a hot spot and difficult problem in the field of equipment fault diagnosis. …”
    Get full text
    Article
  8. 1468

    Graph-Based Radiomics Feature Extraction From 2D Retina Images by Ofelio Jorreia, Nuno Goncalves, Rui Cortesao

    Published 2025-01-01
    “…Based on predicted bifurcation points and blood vessel segments, we use the Graph-Based Radiomics Feature Extraction Algorithm (Graph-BRFExtract) to extract the adjacency matrix. …”
    Get full text
    Article
  9. 1469

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  10. 1470

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  11. 1471

    Investigate the Use of Deep Learning in IoT Attack Detection by Mohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar Laimeche

    Published 2025-06-01
    “…This study contributes a comprehensive comparative analysis of deep learning models for IoT security, focusing on the effectiveness of weighted features in improving detection accuracy. The results provide valuable information for the advancement of real-time IoT attack detection systems.…”
    Get full text
    Article
  12. 1472

    Change Detection Network Based on Transformer and Transfer Learning by Hua Li, Jingyu Li, Guanghao Luo, Liang Zhou, Hao Wu, Zhangcai Yin

    Published 2025-01-01
    “…Currently, deep learning based change detection algorithms have achieved excellent detection results through the meticulous design of feature extraction and change judgment modules. …”
    Get full text
    Article
  13. 1473

    Evaluation of different spectral indices for wheat lodging assessment using machine learning algorithms by Shikha Sharda, Sumit Kumar, Raj Setia, Prince Dhiman, N. R. Patel, Brijendra Pateriya, Ali Salem, Ahmed Elbeltagi

    Published 2025-07-01
    “…This study presented a systematic approach for detecting the wheat lodging occurred during the end of March and April 2023 in the Ludhiana district of Punjab (India) from multi-temporal Sentinel-2 data using the machine learning algorithms. …”
    Get full text
    Article
  14. 1474
  15. 1475

    Exploration of geo-spatial data and machine learning algorithms for robust wildfire occurrence prediction by Svetlana Illarionova, Dmitrii Shadrin, Fedor Gubanov, Mikhail Shutov, Usman Tasuev, Ksenia Evteeva, Maksim Mironenko, Evgeny Burnaev

    Published 2025-03-01
    “…The goal of this study is to explore the potential of predicting wildfire occurrences using various available environmental parameters - meteorological, geo-spatial, and anthropogenic - and machine learning (ML) algorithms. We developed a unified pipeline for data acquisition and subsequent ML-based algorithm development. …”
    Get full text
    Article
  16. 1476

    A Novel Method for Community Detection in Bipartite Networks by Ali Khosrozadeh, Ali Movaghar, Mohammad Mehdi Gilanian Sadeghi, Hamidreza Mahyar

    Published 2025-05-01
    “…Over the past years, community detection has drawn a lot of attention. Numerous methods for community detection have been put forth. …”
    Get full text
    Article
  17. 1477

    Detecting Unbalanced Network Traffic Intrusions With Deep Learning by S. Pavithra, K. Venkata Vikas

    Published 2024-01-01
    “…Furthermore, the Random Forest Regressor is used to ascertain the importance of features for enhancing detection accuracy and interpretability. …”
    Get full text
    Article
  18. 1478

    Automatic Fall Risk Detection Based on Imbalanced Data by Yen-Hung Liu, Patrick C. K. Hung, Farkhund Iqbal, Benjamin C. M. Fung

    Published 2021-01-01
    “…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
    Get full text
    Article
  19. 1479

    Improved RT-DETR Framework for Railway Obstacle Detection by Peng Li, Yanhui Peng, Su-Mei Wang, Cheng Zhong

    Published 2025-01-01
    “…However, existing algorithms face challenges related to insufficient multiscale object detection, high model redundancy, and poor real-time performance. …”
    Get full text
    Article
  20. 1480

    Research on Improved YOLOv7 for Traffic Obstacle Detection by Yifan Yang, Song Cui, Xuan Xiang, Yuxing Bai, Liguo Zang, Hongshan Ding

    Published 2024-12-01
    “…Object detection and recognition algorithms are widely used in applications such as real-time monitoring and autonomous driving. …”
    Get full text
    Article