Showing 3,521 - 3,540 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 3521
  2. 3522

    Evaluating the performance of pixel-based and object-based multidimensional clustering algorithms for automated surface water mapping by Bohao Li, Kai Liu, Ming Wang, Yanfang Wang, Linmei Zhuang, Weihua Zhu, Chenxia Li, Linhao Zhang, Yanan Chen

    Published 2025-07-01
    “…Finally, we compared the performance of multidimensional clustering algorithms with that of the modified Otsu thresholding method and the multi-index threshold-based algorithm and found that the former has an advantage in automated surface water extraction.…”
    Get full text
    Article
  3. 3523

    Advancing Cloud Classification Over the Tibetan Plateau: A New Algorithm Reveals Seasonal and Diurnal Variations by Fangling Bao, Husi Letu, Huazhe Shang, Xu Ri, Deliang Chen, Tandong Yao, Lesi Wei, Chenqian Tang, Shuai Yin, Dabin Ji, Yonghui Lei, Chong Shi, Yiran Peng, Jiancheng Shi

    Published 2024-07-01
    “…Compared with Clouds and the Earth's Radiant Energy System cloud‐type products and ISCCP results obtained from AHI data, this new algorithm markedly improved low‐cloud detection accuracy and better aligned with cloud phase results. …”
    Get full text
    Article
  4. 3524

    A New Gradient Based Surface Defect Detection Method for the Ceramic Tile by Murat Alparslan Güngör

    Published 2022-12-01
    “…Ceramic tiles are controlled to detect surface defects after production because many defects may occur on their surface during production. …”
    Get full text
    Article
  5. 3525
  6. 3526

    Machine learning for Internet of things anomaly detection under low-quality data by Shangbin Han, Qianhong Wu, Yang Yang

    Published 2022-10-01
    “…However, the existing schemes ignore the problem of data quality, which leads to the unsatisfactory detection effect in practice. Therefore, practitioners may not know which algorithm to choose due to the lack of review and evaluation of anomaly detection methods under low-quality data. …”
    Get full text
    Article
  7. 3527

    Inflight Parameter Identification and Icing Location Detection of the Aircraft: The Time-Varying Case by Yiqun Dong, Jianliang Ai

    Published 2014-01-01
    “…This paper considers inflight parameter identification and icing location detection of the aircraft in a more common time-varying nature. …”
    Get full text
    Article
  8. 3528

    Sliding window based rare partial periodic pattern mining algorithms over temporal data streams by K. Jyothi Upadhya, Ronan Lobo, Mini Shail Chhabra, Aman Paleja, B. Dinesh Rao, Geetha M., Prachi Sisodia, Bolusani Akshita Reddy

    Published 2025-06-01
    “…Recently, a variety of industries, including fraud detection, telecommunications, retail marketing, research, and medical have found applications for rare association rule mining, which uncovers unusual or unexpected combinations. …”
    Get full text
    Article
  9. 3529

    Pumping up your predictive power for cognitive state detection with the proper GAINS by Victoria Ribeiro Rodrigues, Jeremy R. Prieto, Szilard L. Beres, Chad Stephens, Christopher Myers, Nicholas J. Napoli

    Published 2025-07-01
    “…Detecting cognitive states and impairments through EEG signals is crucial for applications in aviation and medicine and has broad applications in the field of human–machine interaction. …”
    Get full text
    Article
  10. 3530

    CCD Standard Curve Fitting for Microarray Detection Base on Multi-Layer Perceptron by Zhenhua Gan, Dongyu He, Peishu Wu, Baoping Xiong, Nianyin Zeng, Fumin Zou, Feng Guo, Qin Bao, Fengyan Zhao

    Published 2024-01-01
    “…The gray-level of the fluorescent probe in detection image was obtained as the data set acquired by the microarray scanner at different exposure time. …”
    Get full text
    Article
  11. 3531

    Enhancing IoT Network Security Through Deep Learning-Based Intrusion Detection by MOHAMMED FAWWAZ ALI MOHAMMED FAWWAZ ALI

    Published 2025-06-01
    “…It proposes a new deep learning-based Legitimate Load Testing (LLT) attack detection algorithm implemented in Python and supported by libraries such as TensorFlow, scikit-learn, and Seaborn. …”
    Get full text
    Article
  12. 3532

    Automated Detection of Working Area of Peripheral Blood Smears Using Mathematical Morphology by Jesús Angulo, Georges Flandrin

    Published 2003-01-01
    “…The paper presents a technique to automatically detect the working area of peripheral blood smears stained with May‐Grünwuald Giemsa. …”
    Get full text
    Article
  13. 3533
  14. 3534

    A Fast Fault Detection Scheme for Power Converters In Distributed Generation Systems by Gustavo M. S. Azevedo, Marcelo C. Cavalcanti, Francisco A. S. Neves, Fabricio Bradaschia

    Published 2012-05-01
    “… In this paper, a fault detection algorithm based on voltage disturbances is proposed and analyzed. …”
    Get full text
    Article
  15. 3535

    Detection of opening motion characteristics in DC circuit breakers based on machine vision. by Zhaoyu Ku, Jinjin Li, Dongheng Li, Huajun Dong

    Published 2025-01-01
    “…The captured images are preprocessed, with coarse edges extracted using the Laplacian algorithm. Franklin moment convolution calculations are then applied to determine sub-pixel coordinates of the image edges based on these coarse edges. …”
    Get full text
    Article
  16. 3536

    Detection and Analysis of Tooth Profile Deviation of Cycloidal Gear based on Projection Method by Mo Jingyu, Luo Shanming, Mao Lingxia, Fan Jianming

    Published 2018-01-01
    “…Based on the optical image measurement system and the Sobel edge detection algorithm,the complete tooth profile image and the actual tooth profile edge point coordinate of the cycloid gear are obtained. …”
    Get full text
    Article
  17. 3537

    A policy conflict detection mechanism for multi-controller software-defined networks by You Lu, Qiming Fu, Xuefeng Xi, Zhenping Chen, Encen Zou, Baochuan Fu

    Published 2019-05-01
    “…First, it quantifies and classifies the software-defined policy conflict itself to provide the basis for detection mechanism; then, it proposes a conflict detection model and its deployment scheme for multi-controller software-defined networks; finally, based on the software-defined flow policy’s structure, a multi-branch tree-based policy conflict detection algorithm is proposed to accurately detect the universal types of conflicts. …”
    Get full text
    Article
  18. 3538

    Detection of Obstacle Intrusion in Front of Train Based on Vehicle-borne LiDAR by ZENG Xiang, JIANG Guotao, PAN Wenbo, LENG Binghan, CHEN Guibin

    Published 2023-02-01
    “…This paper proposes a method to detect obstacle intrusion in front of the trains based on vehicle-borne LiDAR. …”
    Get full text
    Article
  19. 3539

    Asumu Fractional Derivative Applied to Edge Detection on SARS-COV2 Images by Gustavo Asumu Mboro Nchama, Leandro Daniel Lau Alfonso, Roberto Rodríguez Morales, Ezekiel Nnamere Aneke

    Published 2022-01-01
    “…The experimental comparison show that the proposed method outperforms some edge detection methods. In the next paper, we are planning to improve and combine the proposed filters with artificial intelligence algorithm in order to program a training system for SARS-COV2 image classification with the aim of having a supplemental medical diagnostic.…”
    Get full text
    Article
  20. 3540

    Early Detection of Mental Health Disorders based on Sentiment using Stacking Method by Naufal Maldini, Danang Wahyu Utomo, Rahmadika Putri Tresyani

    Published 2025-01-01
    “…These results outperform the individual algorithms tested in the research. The findings demonstrate the significant potential of sentiment analysis powered by machine learning for early detection of mental health disorders, making it a valuable tool to enhance diagnosis and intervention in mental health care more effectively.…”
    Get full text
    Article