Showing 3,241 - 3,260 results of 12,239 for search 'algorithm detection', query time: 0.17s Refine Results
  1. 3241

    Hyperbolic geometry enhanced feature filtering network for industrial anomaly detection by Yanjun Feng, Jun Liu, Yonggang Gai

    Published 2025-07-01
    “…The visual perception algorithms have become extensively utilized in surface defect detection, progressively replacing manual inspection methods. …”
    Get full text
    Article
  2. 3242

    Evaluating the Potential of SDGSAT-1 Glimmer Imagery for Urban Road Detection by Yu Wang, Hailan Huang, Bin Wu

    Published 2025-01-01
    “…Watershed segmentation and optimal thresholding algorithms were applied to extract the road network data of these five cities. …”
    Get full text
    Article
  3. 3243
  4. 3244

    Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic by Marat Akhin, Vladimir Itsykson

    Published 2015-03-01
    “…We propose to reinforce traditional tree-based clone detection algorithms by using additional information about variable slices. …”
    Get full text
    Article
  5. 3245
  6. 3246

    An optimized ensemble model with advanced feature selection for network intrusion detection by Afaq Ahmed, Muhammad Asim, Irshad Ullah, Zainulabidin, Abdelhamied A. Ateya

    Published 2024-11-01
    “…To address this challenge, our study presents the “Optimized Random Forest (Opt-Forest),” an innovative ensemble model that combines decision forest approaches with genetic algorithms (GAs) for enhanced intrusion detection. The genetic algorithms based decision forest construction offers notable benefits by traversing a wider exploration space and mitigating the risk of becoming stuck in local optima, resulting in the discovery of more accurate and compact decision trees. …”
    Get full text
    Article
  7. 3247

    NSDLib: A comprehensive python library for network source detection and evaluation by Damian Frąszczak, Edyta Frąszczak

    Published 2024-12-01
    “…It is easy to integrate and offers a range of algorithms for source detection, including evaluating node importance, identifying outbreaks, and reconstructing propagation graphs. …”
    Get full text
    Article
  8. 3248

    NOVEL METHODS FOR AUTOANTIBODY DETECTION IN LABORATORY DIAGNOSTICS OF AUTOIMMUNE RHEUMATIC DISEASES by D. Roggenbuck, P. Schierac, U. Sack, S. V. Lapin, A. V. Mazing, Areg A. Totolian

    Published 2014-08-01
    “…Autoantibodies are well-established biomarkers of autoimmune rheumatic diseases. Their detection in the routine clinical laboratory provides key information for early and differential diagnosis, prognosis, and monitoring of disease-activity. …”
    Get full text
    Article
  9. 3249

    Policy conflict detection in software defined network by using deep learning by Chuanhuang LI, Cheng CHENG, Xiaoyong YUAN, Lijie CEN, Weiming WANG

    Published 2017-11-01
    “…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
    Get full text
    Article
  10. 3250

    Optimizing Convolution Operations for YOLOv4-based Object Detection on GPU by Guerrouj Fatima Zahra, Rodríguez Flórez Sergio, El Ouardi Abdelhafid, Abouzahir Mohamed, Ramzi Mustapha

    Published 2024-01-01
    “…Real-time object detection is crucial for autonomous vehicles, and YOLO (You Only Look Once) algorithms have demonstrated their effectiveness for this purpose. …”
    Get full text
    Article
  11. 3251

    Moving Vehicles Detection and Tracking on Highways and Transportation System for Smart Cities by Manoj Kumar, Susmita Ray, Dileep Kumar Yadav

    Published 2022-03-01
    “…Various machine learning and artificial intelligence based techniques are evolving with numerous advancement in this domain. These algorithms are efficient and very less time consuming. …”
    Get full text
    Article
  12. 3252

    The Effects of Motion on Distributed Detection in Mobile Ad Hoc Sensor Networks by Xusheng Sun, Edward J. Coyle

    Published 2012-03-01
    “…These results allow rapid characterization of the time-dependence of distributed detection algorithms that are executed in mobile sensor networks.…”
    Get full text
    Article
  13. 3253
  14. 3254

    Emergent Technologies in Human Detection for Disaster Response: A Critical Review by Sajjad Ahmed

    Published 2024-09-01
    “…These methods are specifically designed to detect human presence in disaster scenarios by leveraging principles from electromagnetic, acoustic, AI-based algorithms, gas sensors, and optical detection. …”
    Get full text
    Article
  15. 3255

    Dual-modal edible oil impurity dataset for weak feature detection by Huiyu Wang, Qianghua Chen, Jianding Zhao, Liwen Xu, Ming Li, Ying Zhao, Qinpei Zhao, Qin Lu

    Published 2024-12-01
    “…To prove the usability of the dataset, four object detection algorithms are applied and compared.…”
    Get full text
    Article
  16. 3256

    Enhancing cyber threat detection with an improved artificial neural network model by Toluwase Sunday Oyinloye, Micheal Olaolu Arowolo, Rajesh Prasad

    Published 2025-03-01
    “…Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for cybersecurity. …”
    Get full text
    Article
  17. 3257

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article
  18. 3258

    Detecting and Explaining Postpartum Depression in Real-Time with Generative Artificial Intelligence by Silvia García-Méndez, Francisco de Arriba-Pérez

    Published 2025-12-01
    “…Consequently, the rapid detection of PPD and their associated risk factors is critical for in-time assessment and intervention through specialized prevention procedures. …”
    Get full text
    Article
  19. 3259

    Embedded Vision System for Thermal Face Detection Using Deep Learning by Isidro Robledo-Vega, Scarllet Osuna-Tostado, Abraham Efraím Rodríguez-Mata, Carmen Leticia García-Mata, Pedro Rafael Acosta-Cano, Rogelio Enrique Baray-Arana

    Published 2025-05-01
    “…Face detection technology is essential for surveillance and security projects; however, algorithms designed to detect faces in color images often struggle in poor lighting conditions. …”
    Get full text
    Article
  20. 3260

    Research on the Computed Tomography Pebble Flow Detecting System for HTR-PM by Xin Wan, Ximing Liu, Jichen Miao, Peng Cong, Yuai Zhang, Zhifang Wu

    Published 2017-01-01
    “…Algorithms to automatically locate the three-dimensional coordinates of tracer pebbles and to rebuild the trajectory of each tracer pebble were presented and verified. …”
    Get full text
    Article