Showing 2,041 - 2,060 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 2041
  2. 2042

    PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS by Edin Osmanbegović, Anel Džinić, Mirza Suljić

    Published 2022-11-01
    “…The name "machine learning" refers to the automated detection of meaningful patterns in large data sets.  …”
    Get full text
    Article
  3. 2043

    PREDICTION OF TELECOM SERVICES CONSUMERS CHURN BY USING MACHINE LEARNING ALGORITHMS by Edin Osmanbegović, Anel Džinić, Mirza Suljić

    Published 2022-11-01
    “…The name "machine learning" refers to the automated detection of meaningful patterns in large data sets.  …”
    Get full text
    Article
  4. 2044

    RESEARCH ON DEEP NEURAL NETWORK LEARNING BASED ON IMPROVED BP ALGORITHM by HUANG Pei

    Published 2018-01-01
    “…Deep learning can make the computing model that contains a number of processing layers to learn the data that contains many levels of abstract representation.This kind of learning way in the most advanced speech recognition,visual object recognition,object detection and many other areas,such as biology,genetics and medicine brought significant improvement.Deep learning can find the complex structure of large data,and the convolution neural network as one of the important models of the depth study in the processing of voice,image,video and text,and other aspects of a new breakthrough.It is the use of BP algorithm to guide the machine how to get the error before the layer to adjust the parameters of this layer,so that these parameters are more conducive to the calculation of the model.In view of the shortcomings of traditional BP algorithm,a fast BP algorithm is proposed,which has the disadvantages of slow convergence speed and often falls into local minimum points.The improved convolutional neural network is used to validate the data set MNIST,English character recognition and medical image.The simulation results show the effectiveness of the proposed algorithm.…”
    Get full text
    Article
  5. 2045

    A Manipulator Pose Planning Algorithm Based on Matrix Information Geometry by Xiaomin Duan, Anqi Mu, Hao Guo, Xinyu Zhao

    Published 2024-01-01
    “…The matrix information geometry algorithm enabled not only the manipulator to accelerate and decelerate uniformly along the detection trajectory, but also the angular acceleration of the end effector to accelerate uniformly at first, then keep a uniform velocity, and finally decelerate uniformly. …”
    Get full text
    Article
  6. 2046

    A Biphase Code Sidelobe Suppression Method Based on the CLEAN Algorithm by Yiding Liang, Liyu Tian

    Published 2025-01-01
    “…To address this issue, this paper proposes a sidelobe suppression method based on the CLEAN algorithm. First, the digital moving target detection (DMTD) algorithm is employed to estimate the target velocity, and the phase of the echo signal is dynamically adjusted to eliminate straddle loss. …”
    Get full text
    Article
  7. 2047

    Quantum secure communication algorithm based on cyclic code and information compression by Hongyang MA, Xin ZHANG, Peng’ao XU, Fen LIU, Xingkui FAN

    Published 2020-03-01
    “…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
    Get full text
    Article
  8. 2048

    Application of computer vision algorithm in ceramic surface texture analysis and prediction by Yao Tian, Feifei Zhu

    Published 2025-03-01
    “…In order to improve the surface quality of ceramic products, this paper proposes a ceramic surface texture recognition analysis and texture generation prediction method based on computer vision algorithm. In this method, laser lines are used to scan along the radial direction of ceramic, and the position of laser stripe is located by straight line detection algorithm. …”
    Get full text
    Article
  9. 2049

    A Scoring Algorithm for the Early Prediction of Academic Risk in STEM Courses by Vanja Čotić Poturić, Sanja Čandrlić, Ivan Dražić

    Published 2025-03-01
    “…Prospective validation of the model demonstrated excellent predictive performance (accuracy = 0.93, sensitivity = 0.95, specificity = 0.92), confirming its effectiveness in early risk detection. The resulting scoring algorithm is distinguished by its methodological simplicity, ease of implementation, and adaptability to different educational settings, making it a practical tool for timely interventions.…”
    Get full text
    Article
  10. 2050
  11. 2051

    Dynamic primary user spectrum sensing algorithm based on deep learning by Li Xinyu, Zhao Zhijin

    Published 2024-01-01
    “…The proposed algorithm can maintain a high detection probability for the primary users who randomly arrive or leave following different distributions.…”
    Get full text
    Article
  12. 2052

    A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks by Songhwai Oh

    Published 2012-09-01
    “…The algorithm is based on a rigorous probabilistic model and an approximation scheme for the optimal Bayesian filter. …”
    Get full text
    Article
  13. 2053

    Research on lightweight weed recognition algorithm based on improved YOLOv8 by Zhang Chao, Liu Bin, Li Kun

    Published 2025-01-01
    “…Meanwhile, the size and computation amount of the model are reduced to 68.2% and 62.6% of the original model, respectively, reflecting the effectiveness of the improved algorithm in this paper.…”
    Get full text
    Article
  14. 2054

    Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor by Baghdad Science Journal

    Published 2017-09-01
    “…The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that it operates on a big number of key-points, the only drawback it has is that it is rather time consuming. …”
    Get full text
    Article
  15. 2055

    A High-Quality Underwater Acoustic Dataset for Algorithm Development and Analysis by Victor Lobo, Nuno Pessanha Santos, Ricardo Moura

    Published 2025-07-01
    “…This dataset uses a systematic approach to demonstrate the diversity and accuracy needed for effective algorithm development.…”
    Get full text
    Article
  16. 2056

    Blind Deconvolution for Ultrasound Sequences Using a Noninverse Greedy Algorithm by Liviu-Teodor Chira, Corneliu Rusu, Clovis Tauber, Jean-Marc Girault

    Published 2013-01-01
    “…Secondly, the data are reconstructed in a nonblind way using proposed algorithm. The algorithm is a nonlinear blind deconvolution which works as a greedy algorithm. …”
    Get full text
    Article
  17. 2057

    Scale-Invariant Feature Transform Algorithm with Fast Approximate Nearest Neighbor by Ekhlas Khalaf Gbash, Suha Mohammed Saleh

    Published 2017-09-01
    “…The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that it operates on a big number of key-points, the only drawback it has is that it is rather time consuming. …”
    Get full text
    Article
  18. 2058

    Research on Semantic Segmentation Algorithm for Infrared Moving Targets in Complex Backgrounds by Ji Haoyu, Meng Weihua, Zhang Xinchao, Duan Jingfei, Zhang Meng

    Published 2025-04-01
    “…Based on the publicly available target detection and tracking dataset, an infrared image semantic segmentation dataset is annotated and constructed. …”
    Get full text
    Article
  19. 2059

    Automatic construction and verification algorithm for smart contracts based on formal verification by Rui Xie, Xuejiao Zhong, Xin Chen, Shaohui Xu, Haiyang Yu, Xinyuan Guo

    Published 2024-11-01
    “…Finally, a probability model detection method is used to verify the constructed smart contract model. …”
    Get full text
    Article
  20. 2060

    A Fast Hybrid Classification Algorithm with Feature Reduction for Medical Images by Hanan Ahmed Hosni Mahmoud, Abeer Abdulaziz AlArfaj, Alaaeldin M. Hafez

    Published 2022-01-01
    “…In this paper, we are introducing a fast hybrid fuzzy classification algorithm with feature reduction for medical images. …”
    Get full text
    Article