Search alternatives:
feature » features (Expand Search)
Showing 1,501 - 1,520 results of 4,166 for search 'Feature detection algorithms', query time: 0.19s Refine Results
  1. 1501

    Detecting malware based on expired command-and-control traffic by Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li

    Published 2017-07-01
    “…In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. …”
    Get full text
    Article
  2. 1502
  3. 1503

    Railway safety monitoring algorithm based on distributed optical fiber vibration sensor by Fuyang CHEN, Bin JIANG, Yu SHA

    Published 2020-09-01
    “…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
    Get full text
    Article
  4. 1504

    Obfuscated malicious traffic detection based on data enhancement by Ke Ye, Tao Zeng, Yubing Duan, Jun Han, Guoxin Zhong, Zhi Chen, Yulong Wang

    Published 2025-07-01
    “…Although existing methods combine unencrypted statistical features, e.g., average packet length, with machine learning algorithms to achieve encrypted malicious traffic detection, it is difficult to escape the influence of artificially forged noise, e.g., adding dummy packets. …”
    Get full text
    Article
  5. 1505

    Review on Sound-Based Industrial Predictive Maintenance: From Feature Engineering to Deep Learning by Tongzhou Ye, Tianhao Peng, Lidong Yang

    Published 2025-05-01
    “…However, existing reviews focus more on the structures and results of the detection model, while neglecting the impact of the differences in feature engineering on subsequent detection models. …”
    Get full text
    Article
  6. 1506

    Detection and tracking of mask wearing based on deep learning by Wang Lin, Nan Gaigai

    Published 2022-05-01
    “…The tracking module adopts the multiple object tracking algorithm Deep SORT to track the detected objects in actual time, which can effectively avoid repeated detection and better the tracking effect of the occluded targets. …”
    Get full text
    Article
  7. 1507

    An optimization model of computer network security based on GABP neural network algorithm by Jiangang Wang, Xiaoyan Wang

    Published 2025-04-01
    “…Independent component analysis (ICA) was employed for feature extraction to improve the model’s efficiency. …”
    Get full text
    Article
  8. 1508

    Vehicle Detection and Shape Refinement Based on LiDAR by YU An, HU Dongfang, WANG Xuepeng, ZHANG Jin, ZHOU Yan, XIE Guotao, QIN Xiaohui, HU Manjiang

    Published 2022-12-01
    “…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
    Get full text
    Article
  9. 1509

    On the effect of sampling frequency on the electricity theft detection performance by Fatemeh Soleimani Nasab, Foad Ghaderi

    Published 2022-12-01
    “…However, based on technological and operational limitations, the rate of metre reading is too low in many countries, which can affect detection performance. To investigate the effect of sampling frequency on the performance of detection methods, we designed a processing framework to evaluate different classification algorithms on versions of a challenging dataset obtained by down‐sampling the original data at various rates. …”
    Get full text
    Article
  10. 1510

    Keypoint Detection Based on Curvature Grouping and Adaptive Sampling by Bifu Li, Yu Cheng, Weitong Li

    Published 2025-01-01
    “…In the keypoint detection algorithm, the farthest point sampling methods and random sampling methods are usually used to select candidate points, then keypoints are screened out from the neighborhood of the candidate points. …”
    Get full text
    Article
  11. 1511

    Automated detection of complex zebrafish seizure behavior at scale by Paige Whyte-Fagundes, John Efromson, Anjelica Vance, Samuel Carpenter, Aurélien Bègue, Aloe Carroll, Thomas Jedidiah Jenks Doman, Mark Harfouche, Scott C. Baraban

    Published 2025-06-01
    “…Abstract Convulsive seizure behaviors are a hallmark feature of epilepsy, but automated detection of these events in freely moving animals is difficult. …”
    Get full text
    Article
  12. 1512

    Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology by Bin Li, Hai Yin, A-kun Yang, Ai-guo Ouyang

    Published 2022-01-01
    “…The modeling and prediction sets are divided by 3 : 1 by class. The feature information of models is extracted by elimination of uninformative variable (UVE) method and successive projection algorithm (SPA); combining with back propagation neural network (BPNN), the UVE-BPNN and SPA-BPNN qualitative models are established, respectively. …”
    Get full text
    Article
  13. 1513

    Effective Detection of Malicious Uniform Resource Locator (URLs) Using Deep-Learning Techniques by Yirga Yayeh Munaye, Aneas Bekele Workneh, Yenework Belayneh Chekol, Atinkut Molla Mekonen

    Published 2025-06-01
    “…By effectively extracting and utilizing informative features, the model accurately classified URLs into benign and malicious categories, thereby improving detection capabilities. …”
    Get full text
    Article
  14. 1514

    Strawberry Disease Detection Using Multispectral UAV Imagery by A. F. Cheshkova, V. S. Riksen

    Published 2025-07-01
    “…A disease detection model developed using the Random Forest algorithm, achieved a classification accuracy of 77%. …”
    Get full text
    Article
  15. 1515

    Circulating Tumor Cells Count and Morphological Features in Breast, Colorectal and Prostate Cancer. by Sjoerd T Ligthart, Frank A W Coumans, Francois-Clement Bidard, Lieke H J Simkens, Cornelis J A Punt, Marco R de Groot, Gerhardt Attard, Johann S de Bono, Jean-Yves Pierga, Leon W M M Terstappen

    Published 2013-01-01
    “…In one patient with benign tumor 2 and another 9 aCTC were detected.<h4>Significance of the study</h4>CTC can be identified and morphological features extracted by an algorithm on images stored by the CellSearch system and strongly correlate with clinical outcome in metastatic breast, colorectal and prostate cancer.…”
    Get full text
    Article
  16. 1516

    Back pain: from pathophysiological mechanisms and clinical features to modern approaches to therapy by N. V. Titova, Yu. N. Bezdolny, A. A. Slipko

    Published 2025-06-01
    “…Signs of inflammatory pain may be detected in patients with nonspecific low back pain due to the development of osteoarthritis in facet joints, sacroiliac joints, as well as vertebral osteitis. …”
    Get full text
    Article
  17. 1517

    Enhancement of Underwater Images through Parallel Fusion of Transformer and CNN by Xiangyong Liu, Zhixin Chen, Zhiqiang Xu, Ziwei Zheng, Fengshuang Ma, Yunjie Wang

    Published 2024-08-01
    “…Finally, the image’s high and low frequency information are utilized to fuse different features. To demonstrate the algorithm’s effectiveness, underwater images with various levels of color distortion are selected for both qualitative and quantitative analyses. …”
    Get full text
    Article
  18. 1518

    An edge awareness-enhanced visual SLAM method for underground coal mines by Qi MU, Xin LIANG, Yuanjie GUO, Yuhao WANG, Zhanli LI

    Published 2025-03-01
    “…Specifically, line features were extracted using the EDLines algorithm, while point features were extracted using the Oriented FAST and Rotated BRIEF (ORB) algorithms. …”
    Get full text
    Article
  19. 1519

    Improving Mountainous DSM Accuracy Through an Innovative Opposite-Side Radargrammetry Algorithm by Jian Wang, Huiming Chai, Xiaoshuai Li, Xiaolei Lv

    Published 2025-01-01
    “…Second, a triangle affine matching algorithm is developed to match the simulated SAR and real SAR images based on feature points. …”
    Get full text
    Article
  20. 1520

    YOLO-DLHS-P: A Lightweight Behavior Recognition Algorithm for Captive Pigs by Changhua Zhong, Hao Wu, Junzhuo Jiang, Chaowen Zheng, Hong Song

    Published 2024-01-01
    “…Firstly, the C2f-DRB structure is introduced at the Backbone position, and the sizeable convolutional kernel is used to extend the receptive field to enhance the spatial perception ability of the model, and to enhance the network&#x2019;s ability to capture spatial information while maintaining the number of learnable parameters and computational efficiency; The LSKA attention mechanism is then introduced to be integrated into the SPPF module to construct the SPPF-LSKA structure, which significantly improves the ability of the SPPF module to aggregate features at multiple scales; Then, the downsampling at the Neck position is optimised to the HWD algorithm, which reduces the spatial resolution of the feature map while retaining more useful information and reduces the uncertainty of the information compared with the downsampling method of the baseline model; finally, the Shape-IoU is used to replace the original CIoU, which significantly improves the detection efficiency and accuracy of the model without increasing the extra computational burden. …”
    Get full text
    Article