Showing 2,121 - 2,140 results of 12,239 for search 'algorithm detection', query time: 0.25s Refine Results
  1. 2121
  2. 2122

    YOLO-HF: Early Detection of Home Fires Using YOLO by Bo Peng, Tae-Kook Kim

    Published 2025-01-01
    “…This gap causes object detection algorithms to produce high false positive and false negative rates in research on the early detection of such fires. …”
    Get full text
    Article
  3. 2123

    The incremental value of tuberculosis detecting African giant pouched rats over Smear microscopy and Xpert MTB/RIF for Tanzanian TB detection. by Tefera B Agizew, Joseph Soka, Stephen Mwimanzi, Cynthia D Fast, Gilbert Mwesiga, Nashon Edward, Marygiven Stephen, Rehema Kondo, Christophe Cox, Negussie Beyene

    Published 2025-01-01
    “…<h4>Background</h4>Prior studies that used Anti-Persoonsmijnen Ontmijnende Product Ontwikkeling (APOPO)-trained African giant pouched rats reported an annual average of 40% increase in sputum-smear-positive tuberculosis (TB) detection. Sputum-smear microscopy (smear) is being replaced by Xpert MTB/RIF (Xpert)-based diagnostic algorithms in many countries. …”
    Get full text
    Article
  4. 2124

    Photovoltaic module dataset for automated fault detection and analysis in large photovoltaic systems using photovoltaic module fault detectionMendeley Data by Rotimi-Williams Bello, Pius A. Owolawi, Etienne A. van Wyk, Chunling Du

    Published 2024-12-01
    “…Because the data comes from a single-day collection and one week laboratory experiment, it makes the data more suitable for testing algorithms designed for fault detection. The dataset is publicly and freely available to the scientific community at 10.17632/5ssmfpgrpc.1…”
    Get full text
    Article
  5. 2125

    Vehicle Detection and Shape Refinement Based on LiDAR by YU An, HU Dongfang, WANG Xuepeng, ZHANG Jin, ZHOU Yan, XIE Guotao, QIN Xiaohui, HU Manjiang

    Published 2022-12-01
    “…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
    Get full text
    Article
  6. 2126

    Grasp Detection under Occlusions Using SIFT Features by Zhaojun Ye, Yi Guo, Chengguang Wang, Haohui Huang, Genke Yang

    Published 2021-01-01
    “…There are two key steps for the proposed method in the process of grasping occluded object: generating template information and grasp detection using the matching algorithm. A neural network, trained by the RGB-D data from the Cornell Grasp Dataset, predicts multiple grasp rectangles on template images. …”
    Get full text
    Article
  7. 2127

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…Experiments confirm that with a slight increase in verification time, the number of atypical distances detected by the proposed algorithm can be significantly less than the number of atypical distances detected by the basic algorithm. …”
    Get full text
    Article
  8. 2128

    Research on pedestrian detection technology for mining unmanned vehicles by ZHOU Libing, YU Zhengqian, WEI Jianjian, JIANG Xueli, YE Baisong, ZHAO Yexin, YANG Siliang

    Published 2024-10-01
    “…To tackle issues of missed detections and low accuracy in pedestrian detection, an improved YOLOv3-based pedestrian detection algorithm for mining unmanned vehicles was introduced. …”
    Get full text
    Article
  9. 2129

    Low-complexity optimal MPSK detection for spatial modulation by Hong-zhi MEN, Ming-lu JIN

    Published 2015-08-01
    “…The low-complexity optimal SM detection algorithm for MQAM signal detection had been proposed,but no similar method was found for MPSK signal.The problem of low-complexity detection for MPSK signal was considered in SM systems.Utilizing 2-D vector quantization of ML demodulation and the property of MPSK constellation,a low-complexity optimal detection which is independent to modulation order was developed.Since the approach avoids the exhaustive searching on signal constellation space,the computational complexity can be significantly reduced.The proposed detection algorithm can provide the identical performance with ML-optimum detector and has lower computational complexity.Therefore,it has both theoretical and practical significance.The proposed algorithm is of great significance in the large antenna and green communication technology.…”
    Get full text
    Article
  10. 2130

    UAV-to-Ground Target Detection Based on YOLO-DSBE by Meng Pengshuai, Wang Feng, Zhai Weiguang, Ma Xingyu, Zhao Wei

    Published 2025-04-01
    “…To address the issues of complex background, small target scale, mutual occlusion and high missed detection rate in UAV captured images, this paper proposes a ground target detection algorithm based on YOLO-DSBE.The DC-ELAN and DC-MP modules based on deformable convolution are proposed to adapt to input features of different shapes and sizes, and to improve the network’s ability to parse features in complex backgrounds; A high-resolution multi-scale detection layer is designed to boost the algorithm’s capability in extracting small target features, thereby improving the detection accuracy of minute targets. …”
    Get full text
    Article
  11. 2131

    Night construction site detection based on ghost-YOLOX by Han Guijin, Wang Ruixuan, Xu WuYan, Li Jun

    Published 2024-12-01
    “…Existing target detection algorithms, when applied to night-time site monitoring, are limited by site hardware conditions, lighting conditions, fuzzy and small targets to be detected, etc., which makes it difficult to achieve good detection results. …”
    Get full text
    Article
  12. 2132

    Detection of Sentence Boundaries in Polish Based on Acoustic Cues by Magdalena IGRAS, Bartosz ZIÓŁKO

    Published 2016-01-01
    “…In the first stage, the algorithm detects pauses and divides a speech signal into segments. …”
    Get full text
    Article
  13. 2133
  14. 2134

    The effect of using Naive Bayes to detect spam email by Sun Zehui

    Published 2025-01-01
    “…This paper focuses on the spam detection method based on the plain Bayesian algorithm. …”
    Get full text
    Article
  15. 2135

    Hybrid edge detection method on TEM images of nanoparticles by Ratko Ivković, Lazar Kopanja

    Published 2018-03-01
    “…Taking into account the characteristics of nanoparticle materials, this paper gives some suggestions for a new edge detection algorithm. As an assessment of similarity of the proposed algorithm in the paper, the analysis was carried out both through the spatial and through the amplitude resolution of the digital image. …”
    Get full text
    Article
  16. 2136

    Automated detection of bicycle helmets using deep learning by Felix Wilhelm Siebert, Christoffer Riis, Kira Hyldekær Janstrup, Hanhe Lin, Jakob Kristensen, Oguzhan Gül, Frederik Boe Hüttel

    Published 2024-12-01
    “…We then train a state-of-the-art object detection algorithm on the detection of cyclists and helmet use. …”
    Get full text
    Article
  17. 2137
  18. 2138

    Method of detecting network anomaly on multi-time-scale by WANG Feng-yu1, YUN Xiao-chun1, CAO Zhen-zhong4

    Published 2007-01-01
    “…To detect anomaly timely and precisely in high-speed network,an algorithm,named DA-MTS(detecting anomaly on multi-time-scale synchronously),was proposed.Firstly,pre-process the time series of traffic with non-decimated Haar wavelet transform to produce detail signals,which approximately follow Gaussian white noise.Then detect anomaly based on "3σ" principal of normal distribution.Analysis and experiments reveal that this algorithm can detect anomaly on several time-scales recursively without delay,so it can detect anomaly precisely and timely.…”
    Get full text
    Article
  19. 2139

    Android malware detection method based on SimHash by Bo CHEN, Yong-tao PAN, Tie-ming CHEN

    Published 2017-11-01
    “…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
    Get full text
    Article
  20. 2140

    Community detection in multiplex networks via consensus matrix by Nianwen Ning, Bin Wu

    Published 2017-09-01
    “…In complex network of real world,there are many types of relationships between individuals,and the more effective research ways for this kind of network is to abstract these relationship as a multiplex network.More and more researchers are attracted to be engaged in multiplex network research.A novel framework of community detection of multiplex network based on consensus matrix was presented.Firstly,this framework merges the structure of multiplex network and the information of link between each node into monoplex network.Then,the community structure information of each layer network was obtained through consensus matrix,and the traditional community division algorithm was utilized to carry out community detection of combine networks.The experimental results show that the proposed algorithm can get better performance of community partition in the real network datasets.…”
    Get full text
    Article