Showing 3,621 - 3,640 results of 12,239 for search 'algorithm detection', query time: 0.16s Refine Results
  1. 3621

    Detection of Indoor Building Lighting Fixtures in Point Cloud Data using SDBSCAN by Humairah Mansor, Shazmin Aniza Abdul Shukor, Razak Wong Chen Keng, Nurul Syahirah Khalid

    Published 2025-06-01
    “…It is expected that the developed algorithm can be used to detect and classify fixtures from any 3D point cloud data representing buildings.…”
    Get full text
    Article
  2. 3622
  3. 3623

    YOLO-HVS: Infrared Small Target Detection Inspired by the Human Visual System by Xiaoge Wang, Yunlong Sheng, Qun Hao, Haiyuan Hou, Suzhen Nie

    Published 2025-07-01
    “…To address challenges of background interference and limited multi-scale feature extraction in infrared small target detection, this paper proposes a YOLO-HVS detection algorithm inspired by the human visual system. …”
    Get full text
    Article
  4. 3624

    Detection of Critical Parts of River Crab Based on Lightweight YOLOv7-SPSD by Guoai Fang, Yu Zhao

    Published 2024-11-01
    “…These additions help achieve an initial reduction in model size while preserving detection accuracy. Furthermore, we optimize the model by removing redundant parameters using the DepGraph pruning algorithm, which facilitates its application on edge devices. …”
    Get full text
    Article
  5. 3625

    A Deep Reinforcement Learning Framework for Detecting Fraudulent Bank Account Openings by Abdul Qayoom, Wu Yadong, Wang Song, Sammar Abbas, Nadeem Ghafoor

    Published 2024-12-01
    “…Our proposed model achieved the highest fraud detection accuracy with 97% using the DQN algorithm with the benchmark Kaggle dataset for bank account fraud detection. …”
    Get full text
    Article
  6. 3626

    Needle detection and localisation for robot‐assisted subretinal injection using deep learning by Mingchuan Zhou, Xiangyu Guo, Matthias Grimm, Elias Lochner, Zhongliang Jiang, Abouzar Eslami, Juan Ye, Nassir Navab, Alois Knoll, Mohammad Ali Nasseri

    Published 2025-06-01
    “…The algorithm was evaluated by comparing the depth of the top and bottom edge of the predicted bounding box to the ground truth. …”
    Get full text
    Article
  7. 3627

    Detection of AI-Generated Texts: A Bi-LSTM and Attention-Based Approach by John Blake, Abu Saleh Musa Miah, Krzysztof Kredens, Jungpil Shin

    Published 2025-01-01
    “…This paper presents a novel algorithm that leverages cutting-edge machine-learning techniques to accurately and efficiently detect AI-generated texts. …”
    Get full text
    Article
  8. 3628

    An optimized multi-task contrastive learning framework for HIFU lesion detection and segmentation by Matineh Zavar, Hamid Reza Ghaffari, Hamid Tabatabaee

    Published 2025-08-01
    “…To address these challenges, this paper introduces an innovative framework called the Optimized Multi-Task Contrastive Learning Framework (OMCLF), which leverages self-supervised learning (SSL) and genetic algorithms (GA) to enhance HIFU lesion detection and segmentation. …”
    Get full text
    Article
  9. 3629

    Overcoming data scarcity in life-threatening arrhythmia detection through transfer learning by Giuliana Monachino, Beatrice Zanchi, Michael Wand, Giulio Conte, Athina Tzovara, Francesca Dalia Faraci

    Published 2025-07-01
    “…One of the main challenges in building robust LTA detection algorithms is the limited availability of labeled LTA data. …”
    Get full text
    Article
  10. 3630

    Detection and Optimization of Photovoltaic Arrays’ Tilt Angles Using Remote Sensing Data by Niko Lukač, Sebastijan Seme, Klemen Sredenšek, Gorazd Štumberger, Domen Mongus, Borut Žalik, Marko Bizjak

    Published 2025-03-01
    “…This paper presents a novel method for optimizing the tilt angles of existing PV arrays by integrating Very High Resolution (VHR) satellite imagery and airborne Light Detection and Ranging (LiDAR) data. At first, semantic segmentation of VHR imagery using a deep learning model is performed in order to detect PV modules. …”
    Get full text
    Article
  11. 3631

    On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique by Celestine Iwendi, Mueen Uddin, James A. Ansere, P. Nkurunziza, J. H. Anajemba, Ali Kashif Bashir

    Published 2018-01-01
    “…It performs better over long transmission distances for the detection of Sybil in dynamic VANETs’ system in terms of measurement precision, intrusion detection rate, and energy efficiency.…”
    Get full text
    Article
  12. 3632

    Redundancy and conflict detection method for label-based data flow control policy by Rongna XIE, Xiaonan FAN, Suzhe LI, Yuxin HUANG, Guozhen SHI

    Published 2023-10-01
    “…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
    Get full text
    Article
  13. 3633

    A Fault Detection Framework for Rotating Machinery with a Spectrogram and Convolutional Autoencoder by Hoyeon Lee, Jaehong Yu

    Published 2025-07-01
    “…Finally, we construct the fault detection model by applying the one-class classification algorithm to the latent feature vectors of training signals. …”
    Get full text
    Article
  14. 3634

    Research on downhole drilling target detection based on improved Yolov8n by Jierui Ling, Zhibo Fu, Xinpeng Yuan

    Published 2025-07-01
    “…To monitor the drilling process in real time and enhance the efficiency of target detection at underground coal mine drill sites, an improved algorithm based on Yolov8n has been proposed, which offers advantages compared with the traditional detection methods. …”
    Get full text
    Article
  15. 3635

    Tea Disease Detection Method Based on Improved YOLOv8 in Complex Background by Junchen Ai, Yadong Li, Shengxiang Gao, Rongsheng Hu, Wengang Che

    Published 2025-07-01
    “…Experimental results show that the proposed YOLO-SSM algorithm has obvious advantages in accuracy and model complexity and can provide reliable theoretical support for efficient and accurate detection and identification of tea leaf diseases in natural scenes.…”
    Get full text
    Article
  16. 3636

    A Novel Metaheuristic-Based Methodology for Attack Detection in Wireless Communication Networks by Walaa N. Ismail

    Published 2025-05-01
    “…The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to detect anonymous traffic. Current methodologies for intrusion detection within 5G communication exhibit limitations in accuracy, efficiency, and adaptability to evolving network conditions. …”
    Get full text
    Article
  17. 3637

    Enhanced UAV Detection and Classification With Birds Using NLFM Pulse-Doppler Radar by Ju-Hong Park, Yoo-Ho Jang, Sang-Hoon Kang, He-Won Jung, Seong-Ook Park

    Published 2025-01-01
    “…Detecting UAVs in clutter environments and classification with birds is a difficult and important problem. …”
    Get full text
    Article
  18. 3638

    A photovoltaic anomaly data identification method based on image feature detection by QIU Yutao, ZHANG Lei, ZHOU Kaiyun, YAN Min, SUN Jintong, LONG Huan

    Published 2025-05-01
    “…To address this, this paper introduces an anomaly data identification algorithm based on image feature detection and dual-threshold processing. …”
    Get full text
    Article
  19. 3639

    Optimizing RetinaNet anchors using differential evolution for improved object detection by Asaad Mohammed, Hosny M. Ibrahim, Nagwa M. Omar

    Published 2025-06-01
    “…Abstract Object detection is a fundamental task in computer vision. …”
    Get full text
    Article
  20. 3640

    Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection by Santosh Nirmal, Pramod Patil

    Published 2024-12-01
    “…Evasion attacks (EA) attempt to evade detection by misclassifying input data during testing. …”
    Get full text
    Article