-
641
Weak Edge Detection Algorithm for Medical Images Based on Full Convolution Neural Network
Published 2021-06-01“…Aiming at the existing image weak edge detection algorithm,it is easy to ignore the selection of threshold in edge calculation,and there is no clustering analysis of the data,which leads to the problem that the detection effect is not good. …”
Get full text
Article -
642
A Mathematical Survey of Image Deep Edge Detection Algorithms: From Convolution to Attention
Published 2025-07-01Get full text
Article -
643
Enhanced Isolation Forest-Based Algorithm for Unsupervised Anomaly Detection in Lidar SLAM Localization
Published 2025-04-01“…To address this issue, we propose an unsupervised real-time localization anomaly detection model based on the isolation forest algorithm. …”
Get full text
Article -
644
Surface Defect Detection Algorithm for Wind Turbine Blades Based on HSCA-YOLOv7
Published 2023-08-01“…The blade is one of the key components of the wind turbine, which is vulnerable to the impact of natural environmental factors, resulting in gel coat falling off, cracks, corrosion, and other damage and thus affecting the efficiency of wind power generation and the safety of wind turbine operation. A defect detection algorithm for wind turbine blades based on HSCA-YOLOv7 is proposed to address the issues of inconsistent defect scale, inaccurate positioning, and low detection accuracy in wind turbine blade images by aerial photography. …”
Get full text
Article -
645
Incipient Fault Detection of Rolling Element Bearings Based on Deep EMD-PCA Algorithm
Published 2020-01-01Get full text
Article -
646
Arrhythmia detection with transfer learning architecture integrating the developed optimization algorithm and regularization method
Published 2025-07-01Subjects: “…Arrhythmia detection…”
Get full text
Article -
647
Small target detection algorithm based on the fusion attention mechanism and multi-layer convolution
Published 2025-01-01Get full text
Article -
648
Voice authentication based on the Russian-language dataset, MFCC method and the anomaly detection algorithm
Published 2020-09-01Get full text
Article -
649
A Comparative Study of Customized Algorithms for Anomaly Detection in Industry-Specific Power Data
Published 2025-07-01“…Experimental results show that the Isolation Forest–Autoencoder hybrid delivers the best overall performance, and that DBA K-Means excels at detecting seasonal outliers, demonstrating the efficacy of these algorithms for smart energy-management systems and carbon-neutral infrastructure…”
Get full text
Article -
650
A fast hyperspectral change detection algorithm for agricultural crops based on spatial reconstruction.
Published 2025-01-01“…Leveraging the high spectral resolution of hyperspectral imagery and bi-temporal analysis, this study presents a Fast Hyperspectral Change Detection algorithm based on Spatial Reconstruction (FHCDSR) designed to identify subtle agricultural changes with improved accuracy and computational efficiency. …”
Get full text
Article -
651
Enhanced lightweight infrared object detection algorithm for assistive navigation in visually impaired individuals
Published 2024-12-01“…Abstract This study introduces an advanced infrared scene detection algorithm, enhancing the YOLOv8 model for aiding visually impaired individuals in navigation. …”
Get full text
Article -
652
A detection algorithm for small surface floating objects based on improved YOLOv5s
Published 2025-06-01“…ObjectiveTo address the challenges of false detection and missed detection in identifying floating bottles on the water surface in unmanned surface vehicle applications, this study proposes an improved small floating object detection algorithm based on YOLOv5s. …”
Get full text
Article -
653
Detection of Electrical Fires in Residential Buildings Using a Gradient Boosting Machine Algorithm
Published 2025-06-01“…The paper discusses a technique for detecting electrical fires in residential buildings using the Gradient Boosting Machine (GBM) algorithm. …”
Get full text
Article -
654
Defect Detection of Gas Insulation Switch by Infrared Thermography Technology With an Improved Yolo Algorithm
Published 2025-01-01Subjects: “…Deep learning algorithm…”
Get full text
Article -
655
Genetic Artificial Hummingbird Algorithm-Support Vector Machine for Timely Power Theft Detection
Published 2024-01-01“…This study presents a novel hybrid genetic artificial hummingbird algorithm-support vector machine classifier to detect power theft. …”
Get full text
Article -
656
Adaptive random early detection algorithm based on network traffic level grade prediction
Published 2023-06-01“…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
Get full text
Article -
657
Detection Algorithm for Key Components on High-speed Railways: Reconstruction Based on Spike Data
Published 2024-02-01“…The study findings lay a foundation for the engineering applications of the proposed algorithm .…”
Get full text
Article -
658
-
659
-
660
APPLICATION OF GPU-CUDA PARALLEL COMPUTING TO THE SMITH-WATERMAN ALGORITHM TO DETECT MUSIC PLAGIARISM
Published 2025-07-01“…However, the Smith-Waterman algorithm has a weakness, namely that the speed of this algorithm is relatively slow, so parallel computing is required to speed up the detection process. …”
Get full text
Article