Showing 2,621 - 2,640 results of 12,239 for search 'algorithm detection', query time: 0.20s Refine Results
  1. 2621

    Enhancing Road Safety: Detection of Animals on Highways During Night by K. Parkavi, Agniv Ganguly, Shivansh Sharma, Ashesh Banerjee, Keshav Kejriwal

    Published 2025-01-01
    “…Conventional monitoring systems are rendered useless due to poor visibility and inadequate lighting, emphasizing the necessity for a sophisticated detecting system. Using YOLOv5, a cutting- edge object detection algorithm, this study presents a way to identify animals on highways at night and reduce collisions. …”
    Get full text
    Article
  2. 2622

    Long-Range Wide Area Network Intrusion Detection at the Edge by Gonçalo Esteves, Filipe Fidalgo, Nuno Cruz, José Simão

    Published 2024-12-01
    “…This paper proposes the implementation of machine learning algorithms, specifically the K-Nearest Neighbours (KNN) algorithm, within an Intrusion Detection System (IDS) for LoRaWAN networks. …”
    Get full text
    Article
  3. 2623

    DVCW-YOLO for Printed Circuit Board Surface Defect Detection by Pei Shi, Yuyang Zhang, Yunqin Cao, Jiadong Sun, Deji Chen, Liang Kuang

    Published 2024-12-01
    “…To address these challenges, this paper proposes a novel PCB surface defect detection algorithm, named DVCW-YOLO. First, all standard convolutions in the backbone and neck networks of YOLOv8n are replaced with lightweight DWConv convolutions. …”
    Get full text
    Article
  4. 2624

    Automatic Detect Incorrect Lifting Posture with the Pose Estimation Model by Gee-Sern Jison Hsu, Jie Syuan Wu, Yin-Kai Dean Huang, Chun-Chieh Chiu, Jiunn-Horng Kang

    Published 2025-02-01
    “…We used the OpenPose algorithm to detect and extract key body points to calculate relevant biomechanical features. …”
    Get full text
    Article
  5. 2625

    Building Surface Defect Detection Based on Improved YOLOv8 by Xiaoxia Lin, Yingzhou Meng, Lin Sun, Xiaodong Yang, Chunwei Leng, Yan Li, Zhenyu Niu, Weihao Gong, Xinyue Xiao

    Published 2025-05-01
    “…To address these issues, an improved version of the You Only Look Once (YOLOv8) algorithm is proposed for building surface defect detection. …”
    Get full text
    Article
  6. 2626

    Enabling Model-Based Design for Real-Time Spike Detection by Mattia Di Florio, Yannick Bornat, Marta Care, Vinicius Rosa Cota, Stefano Buccelli, Michela Chiappalone

    Published 2025-01-01
    “…MBD offers distinct advantages by streamlining the design workflow, from modelling to implementation, thus facilitating the development of intricate systems. A spike detection algorithm has been implemented on a commercially available system based on a Field-Programmable Gate Array (FPGA) that combines neural probe electronics with configurable integrated circuit. …”
    Get full text
    Article
  7. 2627

    Prediction of the Quality of Anxi Tieguanyin Based on Hyperspectral Detection Technology by Tao Wang, Yongkuai Chen, Yuyan Huang, Chengxu Zheng, Shuilan Liao, Liangde Xiao, Jian Zhao

    Published 2024-12-01
    “…The use of hyperspectral imaging combined with multiple algorithms can be used to achieve the fast and non-destructive prediction of free amino acid and tea polyphenol contents in Tieguanyin tea.…”
    Get full text
    Article
  8. 2628

    Detection method for dangerous behaviors of underground coal mine personnel by ZHANG Xuhui, YU Henghan, DU Yuyang, YANG Wenjuan, ZHAO Yihui, WAN Jicheng, WANG Yanqun, ZHAO Dian, TANG Duwei

    Published 2025-05-01
    “…These modifications aimed to improve the accuracy and speed of human keypoint detection in underground surveillance images. On this basis, a personnel behavior recognition algorithm was designed to classify underground behaviors into nine categories. …”
    Get full text
    Article
  9. 2629

    Design of an Intelligent Pear Bagging End-Effector Based on Yolov8 and SGBM Algorithm by Jing Ruijun, Liu JingKai, LiXin, ZhiguoZhao

    Published 2024-01-01
    “…We describe an intelligent bagging end-effector for pears, which employs the Yolov8 algorithm for fruitlets detection and the Semi-Global Block Matching (SGBM) algorithm to acquire three-dimensional spatial information of the targets. …”
    Get full text
    Article
  10. 2630

    Underwater Visual Multi-Target Tracking Algorithm Integrating Re-parameterization and Attention Mechanism by Junyi LI, Mingle HE, Chang LIU, Yong XU

    Published 2025-04-01
    “…This algorithm effectively enhanced the network’s multi-scale feature extraction capability and improved the detection accuracy of the model by integrating a structurally re-parameterized multi-scale feature extraction convolutional structure(DBB-RFAConv) and the AMSCE-attention mechanism. …”
    Get full text
    Article
  11. 2631

    Fault Information Processing of Power Dispatching Communication System Combining MMSE Algorithm and LMS by Lianrong Pan, Xiao Yang, Yuan Fu, Yuyang Hu, Shangbin Yuan

    Published 2024-01-01
    “…Finally, the study establishes a novel fault information processing model for the power dispatching communication system by combining the least mean square error detection algorithm and the least mean square filtering algorithm. …”
    Get full text
    Article
  12. 2632

    Using Anomaly Detection to Search for Technosignatures in Breakthrough Listen Observations by Snir Pardo, Dovi Poznanski, Steve Croft, Andrew P. V. Siemion, Matthew Lebofsky

    Published 2025-01-01
    “…We implement a machine learning algorithm to search for extraterrestrial technosignatures in radio observations of several hundred nearby stars, obtained with the Parkes and Green Bank Telescopes by the Breakthrough Listen collaboration. …”
    Get full text
    Article
  13. 2633

    GEM-CRAP: a fusion architecture for focal seizure detection by Jianwei Shi, Yuanyuan Zhang, Ziang Song, Hang Xu, Yanfeng Yang, Lei Jin, Hengxin Dong, Zhaoying Li, Penghu Wei, Yongzhi Shan, Guoguang Zhao

    Published 2025-04-01
    “…However, their performance was less effective in detecting brief, localized seizures. These seizure-like patterns can be masked by fixed brain rhythms. …”
    Get full text
    Article
  14. 2634

    Extinction Coefficient Inversion Algorithm with New Boundary Value Estimation for Horizontal Scanning Lidar by Le Chen, Zhibin Yu, Shihai Wang, Chunhui He, Mingguang Zhao, Aiming Liu, Zhangjun Wang

    Published 2025-05-01
    “…The method is based on maximizing the lidar detection distance and determines the boundary value using a new estimation algorithm with the averaging of multiple fitted results in the low SNR region to reduce the impact of noise. …”
    Get full text
    Article
  15. 2635

    TATPat based explainable EEG model for neonatal seizure detection by Turker Tuncer, Sengul Dogan, Irem Tasci, Burak Tasci, Rena Hajiyeva

    Published 2024-11-01
    “…The primary objective of this research is to detect neonatal seizures and explain these seizures using the new version of Directed Lobish. …”
    Get full text
    Article
  16. 2636

    VLSI implementation of AES algorithm against differential power attack and differential fault attack by HAN Jun, ZENG Xiao-yang, ZHAO Jia

    Published 2010-01-01
    “…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
    Get full text
    Article
  17. 2637

    Two-Stage Deep Learning Framework for Individual Tree Crown Detection and Delineation in Mixed-Wood Forests Using High-Resolution Light Detection and Ranging Data by Qian Li, Baoxin Hu, Jiali Shang, Tarmo K. Remmel

    Published 2025-04-01
    “…Accurate detection and delineation of individual tree crowns (ITCs) are essential for sustainable forest management and ecosystem monitoring, providing key biophysical attributes at the individual tree level. …”
    Get full text
    Article
  18. 2638

    Accounting and Financial Management Cost Accounting Integrating Rough Set Knowledge Recognition Algorithm by Xiaoli Liu

    Published 2022-01-01
    “…At present, rough set theory has been well applied in artificial intelligence, knowledge discovery, pattern recognition, fault detection, and so on. According to the discovery model of classification knowledge, the attribute reduction of decision table, classification rule reduction, and classification algorithm under the condition of missing attribute are discussed. …”
    Get full text
    Article
  19. 2639

    DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm by CHEN Zesheng, ZHOU Min, FENG Lichun, CHEN Weijie

    Published 2024-11-01
    “…To enhance the detection capability for DGA malicious domains, a method for malicious domain identification based on XGBoost and particle swarm optimization (PSO) algorithms was proposed. …”
    Get full text
    Article
  20. 2640

    Research on 3D Path Optimization for an Inspection Micro-Robot in Oil-Immersed Transformers Based on a Hybrid Algorithm by Junji Feng, Xinghua Liu, Hongxin Ji, Chun He, Liqing Liu

    Published 2025-04-01
    “…Simulation results demonstrate that the hybrid algorithm achieves a 52.6% reduction in path length compared to the unoptimized A* algorithm, with the A*-ACO combination exhibiting exceptional stability. …”
    Get full text
    Article