Showing 2,801 - 2,820 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 2801

    Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing by Arief Setyanto, Theopilus Bayu Sasongko, Muhammad Ainul Fikri, Dhani Ariatmanto, I. Made Artha Agastya, Rakandhiya Daanii Rachmanto, Affan Ardana, In Kee Kim

    Published 2025-01-01
    “…We compare various KD algorithms to identify the technique that produces a smaller model with the modest accuracy drop. …”
    Get full text
    Article
  2. 2802

    Early Detection of Soil Salinization by Means of Spaceborne Hyperspectral Imagery by Giacomo Lazzeri, Robert Milewski, Saskia Foerster, Sandro Moretti, Sabine Chabrillat

    Published 2025-07-01
    “…Both datasets were pre-processed with multiple data transformation algorithms and 2D correlograms, PLSR and the Random Forest regressor were tested to identify the best model for salinity detection. …”
    Get full text
    Article
  3. 2803

    Integration of Machine Learning and Wavelet Algorithms for Processing Probing Signals: An Example of Oil Wells by Zukhra Abdiakhmetova, Zhanerke Temirbekova

    Published 2025-01-01
    “…A key innovation of this study is the development of an algorithm that processes low-amplitude high-frequency signals, which are often difficult to detect with conventional methods. …”
    Get full text
    Article
  4. 2804
  5. 2805

    Multibit image watermarking algorithm resistant to geometric attacks based on level set method

    Published 2011-01-01
    “…A multibit watermarking algorithm based on level set method was proposed.First,the stable location of the unit disk was found using level set method.Then,pseudo-Zernike moments were calculated.At last,the watermark was embedded by modifying the pseudo-Zernike moments.In the extraction process,the root-mean-square-error method was employed to detect the watermark.Simulation results show that the algorithm overcomes the defect of the traditional al-gorithm based on pseudo-Zernike moments,while be robust against geometric attacks.…”
    Get full text
    Article
  6. 2806

    Health Monitoring of Carbon Fiber Reinforced Building Materials Based on Phase Unwrapping Algorithm by Min Yan, Jianjun Zhou, Shuai Guo, Yanlong Li

    Published 2025-01-01
    “…The experimental results showed that the hybrid algorithm had higher computational accuracy and smaller errors compared with the discrete cosine transform algorithm, fast Fourier transform algorithm, and quality map guided method. …”
    Get full text
    Article
  7. 2807

    Novel algorithms for diagnosing heart failure with preserved ejection fraction in patients with hypertension and obesity by Yu. A. Vasyuk, E. Yu. Shupenina, G. A. Namazova, T. I. Dubrovskaya

    Published 2021-02-01
    “…Recently, new diagnostic algorithms (H2FPEF, HFA-PEFF) and biomarkers have appeared that allow detecting HFpEF at an early stage, taking into account the pathogenesis, which may contribute to development of new effective treatment methods.…”
    Get full text
    Article
  8. 2808

    W-LEACH Based Dynamic Adaptive Data Aggregation Algorithm for Wireless Sensor Networks by Hanady M. Abdulsalam, Bader A. Ali

    Published 2013-09-01
    “…Experimental results on real and synthetic data show that the algorithm performs well in terms of extending the lifetime of the network, maintaining the original distribution of the sensors as long as possible, maintaining the accuracy of the sensed data, and being able to detect and handle sudden bursts of data.…”
    Get full text
    Article
  9. 2809

    Fast Modelling Algorithm for Realistic Three-Dimensional Human Face for Film and Television Animation by Limin Xu

    Published 2021-01-01
    “…Aiming at the face photos of film and television animation, this paper proposes a new fast three-dimensional (3D) face modelling algorithm. First of all, based on the LBF algorithm, this paper proposes a multifeature selection idea to automatically detect multiple features of the face. …”
    Get full text
    Article
  10. 2810

    Image Reconstruction Algorithm Based on Spectral Projected Gradient Pursuit for Electrical Capacitance Tomography by WANG Li-li, LIU Hong-bo, CHEN De-yun, CHEN Feng

    Published 2018-08-01
    “…Accuracy and speed are important indicators to detect the image reconstruction algorithm for electrical capacitance tomography. …”
    Get full text
    Article
  11. 2811

    An Efficient Plot Fusion Method for High Resolution Radar Based on Contour Tracking Algorithm by Bo. Yan, L. P. Xu, Kun Zhao, J. Z. H. Yan

    Published 2016-01-01
    “…A plot fusion method based on contour tracking algorithm is proposed to detect extended targets in a radar image. …”
    Get full text
    Article
  12. 2812

    Threading Statistical Disclosure Attack with EM: An Algorithm for Revealing Identity in Anonymous Communication Networks by Alejandra Guadalupe Silva-Trujillo, Luis Yozil Zamarrón Briceño, Juan Carlos Cuevas-Tello, Pedro David Arjona-Villicaña, Luis Javier García Villalba

    Published 2024-12-01
    “…This research introduces a new algorithm, Threading Statistical Disclosure Attack with EM (TSDA-EM), that employs real-world data to reveal communication’s behavior in an anonymous social network. …”
    Get full text
    Article
  13. 2813

    Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes by Weijin JIANG, Ying YANG, Tiantian LUO, Wenying ZHOU, En LI, Xiaowei ZHANG

    Published 2022-09-01
    “…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
    Get full text
    Article
  14. 2814

    A Special Points and Neural Network-Based Dynamic Multi-Objective Optimization Algorithm by Sanyi Li, Wenjie Hou, Peng Liu, Weichao Yue, Qian Wang

    Published 2025-01-01
    “…This paper introduces a special points and neural network- based dynamic multi-objective optimization algorithm (SPNN-DMOA) for solving dynamic multi-objective optimization problems (DMOPs) with an irregularly changing pareto set. …”
    Get full text
    Article
  15. 2815

    Optimization of the control system of BP-PID rice polishing unit based on WAO algorithm by HUANG Jinliang, ZHOU Jin, YU Wei

    Published 2024-11-01
    “…Then, the overall communication system of the unit was established, the working parameters of the unit were collected in real time, and the rice quality analyzer was introduced to detect the polishing quality indicators of the unit in real time. …”
    Get full text
    Article
  16. 2816

    Cooperative Scheduling of Imaging Observation Tasks for High-Altitude Airships Based on Propagation Algorithm by He Chuan, Qiu Dishan, Liu Jin

    Published 2012-01-01
    “…Firstly, the task set is divided by using k-core neighborhood growth cluster algorithm (K-NGCA). Then, a novel swarm intelligence algorithm named propagation algorithm (PA) is combined with the key node search algorithm (KNSA) to optimize the cruising path of each airship and determine the execution time interval of each task. …”
    Get full text
    Article
  17. 2817

    Elevator Operation Health Diagnosis using Vibration Region Segmentation Algorithm via Internet by Lin Hsiung-Cheng, Peng Yan-Hao

    Published 2025-04-01
    “…While there are some machine learning algorithms that are used to diagnose elevator condition, their computational complexity still makes it difficult to translate into a real-world application. …”
    Get full text
    Article
  18. 2818

    An Energy-Efficient Routing Algorithm for Underwater Wireless Sensor Networks Inspired by Ultrasonic Frogs by Ming Xu, Guangzhong Liu, Huafeng Wu

    Published 2014-02-01
    “…In this paper, we present an ultrasonic frog calling algorithm (UFCA) that aims to achieve energy-efficient routing under harsh underwater conditions of UWSNs. …”
    Get full text
    Article
  19. 2819

    Cache Contention Aware Virtual Machine Placement and Mitigation Using Adaptive ABC Algorithm by Bharati Ainapure, Nishu Gupta, Mohammad Derawi

    Published 2025-01-01
    “…Upon detecting a cache-based side-channel attack, the algorithm identifies the optimal PM for migration, ensuring minimal contention. …”
    Get full text
    Article
  20. 2820

    Optimization of Random Forest Algorithm with Backward Elimination Method in Classification of Academic Stress Levels by Salsabila Dani Amalia, Mula Agung Barata, Pelangi Eka Yuwita

    Published 2025-06-01
    “…Data mining is often used to detect diseases, one of which is the Random Forest algorithm. …”
    Get full text
    Article