Showing 2,481 - 2,500 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 2481
  2. 2482
  3. 2483
  4. 2484

    Novel topic detection method for microblog based on SVM filtration by Jun-xia CHENG, Zhi-tang LI, Ming-guang ZOU, Jin XIAO

    Published 2013-09-01
    “…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
    Get full text
    Article
  5. 2485

    High-Precision Centroid Localization Algorithm for Star Sensor Under Strong Straylight Condition by Jindong Yuan, Junfeng Wu, Guohua Kang

    Published 2025-03-01
    “…The results show that the proposed algorithm outperforms the TOP-HAT, MAX-BACKG (Max-Background Filtering), LCM (Local Contrast Measure), MPCM (Multiscale Patch-Based Contrast Measure), and CMLCM (Curvature-Based Multidirectional Local Contrast Method for Star Detection of Star Sensor) algorithms in terms of star point detection rate. …”
    Get full text
    Article
  6. 2486

    An Anomaly Detection Method for Multivariate Statistical Process Based on POT by Dazhi ZHANG, Xiaoyu LUO, Sheng ZHENG

    Published 2025-07-01
    “…Considering the limitations of fixed thresholds and manual detection methods, which are difficult to adapt to the dynamic changes in time series data, this paper proposes an anomaly detection method based on peaks-over-threshold (POT) algorithm for multivariate statistical processes. …”
    Get full text
    Article
  7. 2487

    Out-of-hospital multimodal seizure detection: a pilot study by Martin Ballegaard, Troels Wesenberg Kjær, Ivan Chrilles Zibrandtsen, Jonas Munch Nielsen, Ástrós Eir Kristinsdóttir, Paolo Masulli, Tobias Søren Andersen

    Published 2023-10-01
    “…A support vector machine based seizure detection algorithm was applied using both in-patient seizures and out-of-hospital electrographic seizures in one patient. …”
    Get full text
    Article
  8. 2488

    Research on lightweight tunnel cable fire recognition algorithm based on multi-scale features by Zimeng Liu, Lei Zhang, Huiqiang Ma, Xuebing Chen, Molin Zhang

    Published 2025-07-01
    “…In this study, a lightweight YOLO-v5 tunnel cable fire recognition algorithm with multiscale features is proposed. By replacing the YOLO-v5 backbone network, Darknet53, with Mobilenetv3-small and integrating the SimAM attention mechanism, the lightweight and detection speed of the network was improved. …”
    Get full text
    Article
  9. 2489

    Matrix Camera, Composed Television System for the Detection of the Contact Wire by V. I. Sirotinin, P. V. Stolbov, A. V. Voronin

    Published 2016-08-01
    “…A method for increasing the efficiency of the contact wire detection system by upgrading hardware and software elements of the system is presented. …”
    Get full text
    Article
  10. 2490

    A lightweight personnel detection method for underground coal mines by Shuai WANG, Wei YANG, Yuxiang LI, Jiaqi WU, Wei YANG

    Published 2025-04-01
    “…Commonly used detection algorithms have large parameter counts, high requirements on equipment arithmetic, and are not satisfactory for application in low illumination environments in coal mines. …”
    Get full text
    Article
  11. 2491

    Detection, Reconstruction, and Repairing the Distortion in the Quran Pages Based on Watermarking by Afsaneh Arabzadeh, AliReza Naghsh

    Published 2024-02-01
    “…The watermarking algorithm in this method is able to recover distortions in addition to detecting them.…”
    Get full text
    Article
  12. 2492

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  13. 2493

    Research on system log anomaly detection based on deep learning by Yidong WANG, Peishun LIU, Gbin WAN

    Published 2019-10-01
    “…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
    Get full text
    Article
  14. 2494

    Unsupervised Salient Object Detection by Aggregating Multi-Level Cues by Chenxing Xia, Hanling Zhang

    Published 2018-01-01
    “…Extensive experimental results demonstrate that the proposed algorithm performs favorably against the state-of-art saliency detection methods in terms of different evaluation metrics on several benchmark datasets.…”
    Get full text
    Article
  15. 2495
  16. 2496

    Research progress of abnormal user detection technology in social network by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2018-03-01
    “…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
    Get full text
    Article
  17. 2497

    An Innovative Approach for Fake News Detection using Machine Learning by Maya Hisham, Raza Hasan, Saqib Hussain

    Published 2023-06-01
    “…Various text feature extraction techniques and classification algorithms are reviewed, with the Support Vector Machine (SVM) linear classification algorithm using TF-IDF feature extraction achieving the highest accuracy of 99.36%. …”
    Get full text
    Article
  18. 2498
  19. 2499

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  20. 2500

    Coal mine conveyor monitoring video enhancement algorithm based on DP-YOLOv7 by Lei ZHANG

    Published 2025-04-01
    “…Aiming at the problems encountered by video surveillance during the operation of belt conveyor, such as insufficient light, moisture and large coal dust pollution, a new DP-YOLOv7 video detection algorithm for coal mine belt conveyor is proposed based on YOLOv7 target detection algorithm. …”
    Get full text
    Article