Showing 581 - 600 results of 12,239 for search 'algorithm detection', query time: 0.24s Refine Results
  1. 581

    A Real-Time Lane Detection Algorithm Based on Intelligent CCD Parameters Regulation by Ping-shu Ge, Lie Guo, Guo-kai Xu, Rong-hui Zhang, Tao Zhang

    Published 2012-01-01
    “…Lane departure warning system (LDWS) has been regarded as an efficient method to lessen the damages of road traffic accident resulting from driver fatigue or inattention. Lane detection is one of the key techniques for LDWS. To overcome the contradiction between complexity of algorithm and the real-time requirement for vehicle onboard system, this paper introduces a new lane detection method based on intelligent CCD parameters regulation. …”
    Get full text
    Article
  2. 582
  3. 583
  4. 584

    The Accuracy of Algorithms Used by Artificial Intelligence in Cephalometric Points Detection: A Systematic Review by Júlia Ribas-Sabartés, Meritxell Sánchez-Molins, Nuno Gustavo d’Oliveira

    Published 2024-12-01
    “…The main objective of this study is to identify the artificial intelligence algorithms that yield the best results for cephalometric landmark localization, along with their learning system. …”
    Get full text
    Article
  5. 585

    Characteristics and Detection Algorithm of Strong and Weak Arc in Low Voltage DC Distribution Network by Guoqiang LIU, Guochun LI, Yanan HAO, Guihai LI, Zhongjie WU

    Published 2024-02-01
    “…Combined with the neural network model, the arc detection algorithm suitable for 750 V system is designed, and the detection accuracy of the algorithm is 99.12%.…”
    Get full text
    Article
  6. 586

    Design and Validation of a Lightweight Entropy-Based Intrusion Detection Algorithm for Automotive CANs by Jiacheng Chen, Zhifu Wang

    Published 2025-06-01
    “…To address this, we propose a lightweight intrusion detection algorithm leveraging information entropy to analyze side-channel CAN message ID distributions. …”
    Get full text
    Article
  7. 587

    Lightweight visible damage detection algorithm for embedded systems applied to pipeline automation equipment by Jiale Xiao, Lei Xu, Changyun Li, Ling Tang, Guogang Gao

    Published 2025-06-01
    “…The backbone of the algorithm, CSPHet, employs efficient combinatorial convolution and heterogeneous kernel convolution, incorporates a lightweight convolutional structure SL in the neck of the network, enhances the nonlinear representation and feature processing capability through channel shuffling, utilizes the lightweight self-attention mechanism Detect_SA for prediction, and employs a multilayered GhostConv to improve the computational efficiency. …”
    Get full text
    Article
  8. 588

    Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine by Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable

    Published 2022-01-01
    “…In this paper, a new methodology has been proposed for detecting credit card fraud (financial fraud) that is a hybridization of the firefly bio-inspired optimization algorithm and a support vector machine (called FFSVM), which comprises two sequential levels. …”
    Get full text
    Article
  9. 589

    Efficient detection technique in a MIMO system using the received signal compensation algorithm by Mahamat Saleh Idriss Mahamat, Luc Eyembe Ihonock, Joseph Salomon V. Tonga Manga, Bakhit Amine Adoum, Ali Mahamoud Ali, Jean-Francois Dikoundou Essiben, Mahamoud Youssouf Khayal, Yong Suk Joe

    Published 2025-07-01
    “…Abstract In this article, we address the problem of improving the performance of linear detection techniques to satisfy the growing demand for bandwidth for multiuser multimedia applications. …”
    Get full text
    Article
  10. 590
  11. 591
  12. 592

    Towards the development of an algorithm for automatic analysis and detection of shock waves in the schlieren visualization technique by George Ionut VRABIE, Andrei V. COJOCEA, Mihnea GALL, Constantin ANTON, Daniel C. ASOLTANEI, Ionut PORUMBEL

    Published 2024-12-01
    “…The algorithm is based on image binarization techniques, followed by the identification of regions of interest in the images, the detection and isolation of the edges of these regions, and the determination of the wave speed between two consecutive frames. …”
    Get full text
    Article
  13. 593

    Distributed denial-of-service (DDOS) attack detection using supervised machine learning algorithms by S. Abiramasundari, V. Ramaswamy

    Published 2025-04-01
    “…In this paper, a PCA-based Enhanced Distributed DDoS Attack Detection (EDAD) framework has been proposed. Various Machine Learning (ML) algorithms and feature selection techniques have been used to detect DDoS attacks. …”
    Get full text
    Article
  14. 594
  15. 595

    Refinement of an Algorithm to Detect and Predict Freezing of Gait in Parkinson Disease Using Wearable Sensors by Allison M. Haussler, Lauren E. Tueth, David S. May, Gammon M. Earhart, Pietro Mazzoni

    Published 2024-12-01
    “…The purpose of this paper is to explore how the existing pFOG algorithm can be refined to improve the detection and prediction of FOG. …”
    Get full text
    Article
  16. 596
  17. 597

    GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm by Xiangqiang Kong, Guangmin Liu, Yanchen Gao

    Published 2025-05-01
    “…This successfully achieves the harmonization of detection precision and model lightweighting.…”
    Get full text
    Article
  18. 598
  19. 599

    Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set by Baghdad Science Journal

    Published 2016-06-01
    “…It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. …”
    Get full text
    Article
  20. 600

    Using Deep Learning algorithms to detect the success or failure of the Electroconvulsive Therapy (ECT) sessions by usef faghihi, Cyrus kalantarpour

    Published 2021-04-01
    “…In this study, we will be using Deep learning algorithms to detect the effectiveness of ECT sessions based on the EEG.…”
    Get full text
    Article