Showing 2,421 - 2,440 results of 12,239 for search 'algorithm detection', query time: 0.21s Refine Results
  1. 2421

    FLWD:A Webshell detection method based on federated learning by ZENG Qingpeng, CHAI Jiangli, WU Shuixiu

    Published 2025-06-01
    “…Experimental results on the AMWD’22 dataset show that the model’s accuracy is 99.47%, with an F1 score of 99.67%, indicating better detection performance compared to basic algorithm models and existing research algorithm models. …”
    Get full text
    Article
  2. 2422

    Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection by Lu Haowen

    Published 2025-01-01
    “…Identifying the most effective algorithm for anomaly detection is essential for enhancing nidustrial productivity. …”
    Get full text
    Article
  3. 2423

    Unsupervised Detection of Suspicious Tissue Using Data Modeling and PCA by Ikhlas Abdel-Qader, Lixin Shen, Christina Jacobs, Fadi Abu Amara, Sarah Pashaie-Rad

    Published 2006-01-01
    “…Breast cancer is a major cause of death and morbidity among women all over the world, and it is a fact that early detection is a key in improving outcomes. Therefore development of algorithms that aids radiologists in identifying changes in breast tissue early on is essential. …”
    Get full text
    Article
  4. 2424

    An optimization-inspired intrusion detection model for software-defined networking by Hui Xu, Longtan Bai, Wei Huang

    Published 2025-01-01
    “…This paper proposes an enhanced spider wasp optimizer (ESWO) algorithm for feature dimensionality reduction of intrusion detection datasets and constructs a new intrusion detection model (IDM), namely ESWO-IDM, for SDN. …”
    Get full text
    Article
  5. 2425

    Study on the Lightweighting Strategy of Target Detection Model with Deep Learning by Junli Hu

    Published 2022-01-01
    “…Aiming at the high miss detection and false detection rate of traditional SSD (single shot multibox detector) target detection algorithm in target detection, this paper proposes a lightweight detection algorithm for deep learning target detection model in order to improve the detection accuracy. …”
    Get full text
    Article
  6. 2426

    Detection of water surface targets based on improved Deformable DETR by Pengjiu WANG, Junbin Gong, Wei LUO, Xiao HUANG, Junjie GUO

    Published 2025-06-01
    “…However, conventional detection methods encounter several challenges, and existing deep-learning-based algorithms have limitations in this field, including limited datasets and insufficient detection speed even after improvement. …”
    Get full text
    Article
  7. 2427

    Image Target Detection and Recognition Method Using Deep Learning by Hongyan Sun

    Published 2022-01-01
    “…Therefore, an image target detection and recognition algorithm based on the improved R-CNN network model is proposed. …”
    Get full text
    Article
  8. 2428

    Aviation Rivet Classification and Anomaly Detection Based on Deep Learning by Xiao-bo Zhu

    Published 2023-01-01
    “…And a method of aviation rivet classification and anomaly detection based on deep learning algorithm was proposed. …”
    Get full text
    Article
  9. 2429

    Detection and removal of “smacking” artefacts from lector speech records by Marek Jaskuła, Hanna Perużyńska

    Published 2014-01-01
    “…The algorithm performs detection of distortions in the time domain using differentiation of the signal. …”
    Get full text
    Article
  10. 2430
  11. 2431

    Spammer group detection based on cascading and clustering of core figures by Qianqian Jiang, Chunrong Zhang, Ning Li, Dickson K. W. Chiu, Xianwen Fang, Shujuan Ji

    Published 2025-07-01
    “…Thus, this research proposes a spammer group detection algorithm based on cascading and clustering of core figures. …”
    Get full text
    Article
  12. 2432

    Local Outlier Detection Method Based on Improved K-means by Yu ZHOU, Hao XIA, Xuezhen YUE, Peichong WANG

    Published 2024-07-01
    “…Compared to the KNN and LOF algorithms, KLOD also demonstrates high accuracy in outlier detection. …”
    Get full text
    Article
  13. 2433

    Seam-Carving forgery detection based on expanded Markov features by Guo-rui SHENG, Tie-gang GAO, Li FAN, Lin GAO, Fu-sheng YANG, Shun ZHANG

    Published 2014-06-01
    “…To deal with the digital image forgery using Seam-Carving, a detection algorithm based on expanded Markov features was proposed. …”
    Get full text
    Article
  14. 2434

    Circle Detection with Adaptive Parameterization: A Bottom-Up Approach by Lin Han, Yan Zhuang, Ke Chen, Yuhua Xie, Guoliang Liao, Guangfu Yin, Jiangli Lin

    Published 2025-04-01
    “…This paper presents a novel circle detection algorithm based on two perceptually grounded parameters: the perceptual length difference resolution λ, derived from human cognitive models, and the minimum distinguishable distance threshold K, determined through empirical observations. …”
    Get full text
    Article
  15. 2435

    Crowd abnormal behavior detection based on motion similar entropy by Fei LI, Ken CHEN, Meng LI, Chunmei GUO

    Published 2017-05-01
    “…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
    Get full text
    Article
  16. 2436

    Financial phishing detection method based on sensitive characteristics of webpage by Xiang-dong HU, Ke LIU, Feng ZHANG, Jia-fu LIN, Jun FU, Zhi-hui GUO

    Published 2017-02-01
    “…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). Then, the method locates and cuts logo image of webpage, and utilizes PCA-SIFT algorithm to extract image features and match features with library of webpage logo which was established beforehand. …”
    Get full text
    Article
  17. 2437

    Fractals and Independent Component Analysis for Defect Detection in Bridge Decks by Ikhlas Abdel-Qader, Fadi Abu-Amara, Osama Abudayyeh

    Published 2011-01-01
    “…Using Ground-Penetrating Radar (GPR) raw scans, this framework is composed of a feature extraction algorithm using fractals to detect defective regions and a deconvolution algorithm using banded-independent component analysis (ICA) to reduce overlapping between reflections and to estimate the radar waves travel time and depth of defects. …”
    Get full text
    Article
  18. 2438

    A Method for Detecting Tomato Maturity Based on Deep Learning by Song Wang, Jianxia Xiang, Daqing Chen, Cong Zhang

    Published 2024-11-01
    “…The algorithm employs several technical means to improve detection accuracy and efficiency. …”
    Get full text
    Article
  19. 2439

    Precision Detection of Infrared Small Target in Ground-to-Air Scene by Xiaona Dong, Huilin Jiang, Yansong Song, Keyan Dong

    Published 2024-11-01
    “…This paper proposes a non-window, structured algorithm for precision detection of infrared small targets under ground-to-air complex scenes. …”
    Get full text
    Article
  20. 2440

    Alzheimer’s Disease Detection Using Deep Learning and Federated Learning by Taha Bin Niaz, Usman Amjad, Humera

    Published 2025-07-01
    “…The success and accuracy of the proposed algorithm are established with empirically defined metrics such as accuracy and defined thresholds. …”
    Get full text
    Article