Showing 2,861 - 2,880 results of 12,239 for search 'algorithm detection', query time: 0.16s Refine Results
  1. 2861

    Conveyor belt deviation identification algorithm based on anchor point positioning and cross-layer correction by Zhe WANG, Zhe FU, Pengjun CAO, Qing LI, Gaoxiang ZHANG

    Published 2025-08-01
    “…To address the problems of information loss and inaccurate extraction of conveyor belt edge lines in the traditional convolutional neural network (CNN) methods for conveyor belt edge line detection due to the difficulty in constructing long-distance dependency relationships between pixels, a conveyor belt deviation recognition algorithm based on the DETR (Detection Transformer) encoder-decoder network structure with anchor point positioning and cross-layer correction is proposed. …”
    Get full text
    Article
  2. 2862

    A Driver’s Calling Behavior Detection Method Based on Deep Learning by XIONG Qunfang, LIN Jun, YUE Wei, LIU Shiwang, LUO Xiao, DING Chi

    Published 2019-01-01
    “…This paper proposed a driver’s cell phone calling behavior detection algorithm based on deep learning. The algorithm comprises two steps. …”
    Get full text
    Article
  3. 2863

    Optimal resource allocation for two-stage connectionless access with collision detection by Xin JIAN, Fang WANG, Jian SONG, Shu FU, Xiaoheng TAN, Xiaoping ZENG

    Published 2019-05-01
    “…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
    Get full text
    Article
  4. 2864

    Analysis of Asymmetric Piecewise Linear Stochastic Resonance Signal Processing Model Based on Genetic Algorithm by Lina He, Chuan Jiang

    Published 2020-01-01
    “…Finally, the model is applied to bearing fault detection, and an adaptive genetic algorithm is used to optimize the parameters of the system. …”
    Get full text
    Article
  5. 2865

    Classification of chest radiographs into healthy/pneumonia using Harris-Hawks Algorithm optimized deep-features by K. Vijayakumar, Mohammad Nazmul Hasan Maziz, Swaetha Ramadasan, Seifedine Kadry, S. Arunmozhi

    Published 2025-06-01
    “…This PDL-tool performs the following tasks on the X-ray database; (i) detection of healthy/pneumonia, and (ii) detecting the viral/bacterial pneumonia. …”
    Get full text
    Article
  6. 2866

    Efficient Real-Time Tool Chatter Detection Through Bandpass Filtering by Javier Arenas, Jorge Martínez de Alegría, Patxi X. Aristimuño, Vicente Gómez

    Published 2025-04-01
    “…To prevent tool chatter, a real-time chatter detection algorithm was developed using a low-cost accelerometer in combination with internal machine variables. …”
    Get full text
    Article
  7. 2867

    Dominant Symmetry Plane Detection for Point-Based 3D Models by Chen He, Lei Wang, Yonghui Zhang, Chunmeng Wang

    Published 2020-01-01
    “…In this paper, a symmetry detection algorithm for three-dimensional point cloud model based on weighted principal component analysis (PCA) is proposed. …”
    Get full text
    Article
  8. 2868

    Early Identification of Skin Cancer Using Region Growing Technique and a Deep Learning Algorithm by Suhendro Y. Irianto, Ryan Yunandar, M. S. Hasibuan, Deshinta Arrova Dewi, Nualyai Pitsachart

    Published 2024-09-01
    “…Therefore, this study aimed to assess the efficacy of the Region Growing + LSTM algorithm in improving detection accuracy compared to LSTM. …”
    Get full text
    Article
  9. 2869

    Unsupervised Fabric Defect Detection Based on Under-Complete Dictionary Reconstruction by LIU Jianxin, PAN Ruru, ZHOU Jian

    Published 2025-02-01
    “…The proposed algorithm achieved an average correct detection rate of 83.29% on the AITEX dataset, demonstrating its effectiveness.…”
    Get full text
    Article
  10. 2870

    Automated Detection of Poor-Quality Scintigraphic Images Using Machine Learning by Anil K. Pandey, Akshima Sharma, Param D. Sharma, Chandra S. Bal, Rakesh Kumar

    Published 2022-12-01
    “…Objective In the present study, we have used machine learning algorithm to accomplish the task of automated detection of poor-quality scintigraphic images. …”
    Get full text
    Article
  11. 2871

    Research on Intelligent Detection and Segmentation of Rock Joints Based on Deep Learning by Lei Peng, Haibo Wang, Chun Zhou, Feng Hu, Xiaoyang Tian, Zhu Hongtai

    Published 2024-01-01
    “…To address these concerns, this paper presents an intelligent recognition and segmentation algorithm based on Mask R-CNN (mask region-based convolutional neural network) for detecting joint targets on tunnel face images and automatically segmenting them, thereby improving detection efficiency and objectivity of the results. …”
    Get full text
    Article
  12. 2872

    Fault detection in beam structure using adaptive immune based approach by Sasmita Sahu, Shakti P. Jena

    Published 2024-01-01
    “…Recently with the application of machine learning approaches and the soft computing, the damage can be detected easily. In this methodology, Clonal Section Algorithm (CSA) has been applied to find out the faults (crack locations and depth) in the structure initially. …”
    Get full text
    Article
  13. 2873
  14. 2874

    Optimization of train obstacle detection based on zone media controller unit by ZHOU Liming, HU Jiaqiao, SHEN Tuo

    Published 2024-11-01
    “…First, an algorithm framework was progressively designed based on the YOLOv8 algorithm, consisting of track area segmentation and obstacle target detection. …”
    Get full text
    Article
  15. 2875

    Function encoding based approach for App clone detection in cloud environment by Jia YANG, Cai FU, Lansheng HAN, Hongwei LU, Jingliang LIU

    Published 2019-08-01
    “…An efficient function-based encoding scheme in the cloud environment for detecting the cloned Apps was designed,called Pentagon.Firstly,a basic block feature extraction method was proposed.Secondly,a monotonic encoding algorithm for the App function was designed,which encoded the function based on the control flow graph structure and basic block attributes.Finally,a three-party libraries filtering method was proposed by using an efficient clustering algorithm based on the function feature.Experiments verified the effectiveness of the proposed scheme.The average search time is close to 79 ms,and the clone detection accuracy achieves 97.6%.…”
    Get full text
    Article
  16. 2876

    Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network by Yingxue Li, Jing Lei, Shiyuan Zhong, Chunming Huang, Chao Huang

    Published 2015-11-01
    “…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
    Get full text
    Article
  17. 2877

    Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network by Yingxue Li, Jing Lei, Shiyuan Zhong, Chunming Huang, Chao Huang

    Published 2015-11-01
    “…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
    Get full text
    Article
  18. 2878

    Joint detection and direction finding using a switched antenna array by M. E. Shevchenko, V. N. Malyshev, D. N. Fayzullina

    Published 2015-10-01
    “…Algorithms for signals joint detection and direction at frequency area in a wide frequency band with no overlap of spectra of adjacent channels obtained through switched circular antenna array are developed and researched. …”
    Get full text
    Article
  19. 2879

    Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection by MA Lin-ru1, YANG Lin2, WANG Jian-xin2, TANG Xin2

    Published 2006-01-01
    “…In order to solve the problem, an algorithm was proposed to reconstruct attack scenario using fuzzy clustering. …”
    Get full text
    Article
  20. 2880

    GSB: GNGS and SAG-BiGRU network for malware dynamic detection. by Zhanhui Hu, Guangzhong Liu, Xinyu Xiang, Yanping Li, Siqing Zhuang

    Published 2024-01-01
    “…For solving the problem, this study proposed the GNGS algorithm to construct a new balance dataset for the model algorithm to pay more attention to the feature learning of the minority attacks' malware to improve the detection rate of attacks' malware. …”
    Get full text
    Article