Showing 101 - 120 results of 12,239 for search 'algorithm detection', query time: 0.18s Refine Results
  1. 101

    Malicious Domain Names Detection Algorithm Based on N-Gram by Hong Zhao, Zhaobin Chang, Guangbin Bao, Xiangyan Zeng

    Published 2019-01-01
    “…In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. …”
    Get full text
    Article
  2. 102
  3. 103

    Pig Detection Algorithm Based on Sliding Windows and PCA Convolution by Longqing Sun, Yan Liu, Shuaihua Chen, Bing Luo, Yiyang Li, Chunhong Liu

    Published 2019-01-01
    “…In order to solve the problems of low computational efficiency and low precision in pig detection algorithm based on sliding windows, this paper proposed a simple and efficient pig detection algorithm. …”
    Get full text
    Article
  4. 104
  5. 105

    Underground helmet detection algorithm based on improved YOLOv8s by Jiaru YANG, Yinan QIN, Tianxu LI, Han ZHUANG

    Published 2025-05-01
    “…In order to solve the above problems, this study proposes a detection algorithm for underground safety helmets based on improved YOLOv8s, which is called PBSS-YOLOv8. …”
    Get full text
    Article
  6. 106
  7. 107

    Research on SBMPC Algorithm for Path Planning of Rescue and Detection Robot by Lin-Lin Wang, Li-Xin Pan

    Published 2020-01-01
    “…Simulation results show that SBMPC algorithm is effective and feasible to plan a secure route for rescue and detection robot under complex environment.…”
    Get full text
    Article
  8. 108

    Detection of Welding Defects Using the YOLOv8-ELA Algorithm by Yunxia Chen, Yangkai He, Lei Wu

    Published 2025-05-01
    “…To address the issue of the low precision in detecting defects in aluminum alloy weld seam digital radiography (DR) images using the current target detection algorithms, a modified algorithm named YOLOv8-ELA based on YOLOv8 is proposed. …”
    Get full text
    Article
  9. 109

    Detection of Plants Leaf Diseases using Swarm Optimization Algorithms by Saud Abdul Razzaq, Baydaa Khaleel

    Published 2021-12-01
    “…In this research, some artificial intelligence algorithms, represented by swarm optimization algorithms, were used to detect and classify plant diseases to healthy and unhealthy through images of different leaves of plants. …”
    Get full text
    Article
  10. 110

    Fast recursive algorithm for implementation of MIMO ZF-SIC detection by Zuo-liang YIN, Xing-peng MAO, Qin-yu ZHANG, Nai-tong ZHANG

    Published 2012-07-01
    “…To reduce the complexity of the zero-forcing(ZF)detection with successive interference cancellation(SIC)in a Vertical Bell Labs layered space-time(V-BLAST)systems,a computationally efficient recursive algorithm was proposed.A fast implementation of the proposed algorithm was developed and its complexity was analyzed in detail.Theoretical analysis and simulations demonstrate significant advantages of the proposed algorithm over the fast recursive algorithm (FRA)on complexity,practicability and storage requirements.Moreover,its performance on symbol error rate(SER)is close to optimal under practical conditions.These advantages make the proposed algorithm more efficient and practical.…”
    Get full text
    Article
  11. 111

    Performance Analysis of Machine Learning Algorithms in Intrusion Detection Systems by Mustafa İlbaş, Yusuf Sönmez, Fethi Mustafa Çimen

    Published 2021-12-01
    “…At this point, Intrusion Detection Systems (IDS) have a very important position. …”
    Get full text
    Article
  12. 112

    Improved Algorithm to Detect Clandestine Airstrips in Amazon RainForest by Gabriel R. Pardini, Paulo M. Tasinaffo, Elcio H. Shiguemori, Tahisa N. Kuck, Marcos R. O. A. Maximo, William R. Gyotoku

    Published 2025-02-01
    “…This work presents an enhancement to a previously developed landing strip detection algorithm tailored for the Amazon biome. …”
    Get full text
    Article
  13. 113
  14. 114

    Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection by Tajamul Shahzad, Kashif Aman

    Published 2024-06-01
    “…To give the brief knowledge of phishing attacks and their types of the objective of this work is to investigate various AI algorithms. Through a detail literature 14 AI algorithms which are repeatedly used for detection, and these are Random Forests, Convolutional Neural Network, Naïve Bayes, K-Nearest Neighbours algorithm, Decision Trees, long short-term memory, gated recurrent unit, Artificial Neural Network, AdaBoost, Logistic Regression, Gradient Boost, Multi-layer perceptron, Recurrent Neural Network, Extreme gradient boosting, and Support Vector Machine to detect phishing attacks. …”
    Get full text
    Article
  15. 115
  16. 116

    Synthesis of algorithm of unmanned aerial vehicle detection by acoustic noise by A. D. Puzanau, D. S. Nefedov

    Published 2021-03-01
    “…The algorithm of detection of acoustic noise provided by an unmanned aerial vehicle (UAV) in the noise background due to wind is synthesized in the article. …”
    Get full text
    Article
  17. 117

    Improved spectral clustering algorithm and its application in MCI detection by Jie XIANG, Dong-qin ZHAO

    Published 2015-04-01
    “…In order to detect mild cognitive impairment (MCI) using functional magnetic resonance imaging (fMRI),a method based on fMRI clustering was proposed fMRI data were clustered to obtain the blood oxygen level dependence( BOLD) change model of MCI patients,then abnormal patterns were used to detect disease.The traditional spectral clustering algorithm needs to calculate all of the eigenvalue and eigenvector,so time and space complexity is higher.An improved spectral clustering method was proposed which modified the similar matrix construction method and the setting method of σ and k,and then this method was applied to clustering and detection of MCI patients.To verify the performance of the proposed method,the comparison of the clustering result,classification accuracy using traditional algorithm and Nyström is also done.The comparative experimental results show that the proposed method can get BOLD pattern more accurately,the accuracy of MCI detection is higher than the other two algorithms,and the time and space complexity are less than the traditional algorithm.…”
    Get full text
    Article
  18. 118

    Lightweight insulator target detection algorithm based on improved YOLOX by Bing Zeng, Wei Hua, Dezhi Li, Zhihao Zhou, Hao Wan, Yunmin Xie, Tangbing Li, Yucong Chen, Jianglei Li, Shenli Wang, Shixun Fu, Zihan Jin, Wenhua Zhang

    Published 2025-06-01
    “…Abstract To address the challenges of high parameter volume, insufficient detection accuracy, and high false positive rates in traditional insulator target detection algorithms, this paper proposes a lightweight detection algorithm based on an enhanced YOLOX framework. …”
    Get full text
    Article
  19. 119

    False Matches Removing in Copy-Move Forgery Detection Algorithms by muthana salih mahdi, Saad N. Alsaad

    Published 2020-03-01
    “…This paper presents an algorithm of the Copy-Move forgery detection using the SIFT algorithm with an effective method to remove the false positives by rejecting all key-points in matches list that own a neighbor less than the threshold. …”
    Get full text
    Article
  20. 120

    CUSE-TD Algorithm for Precision Detection of Coherent and Uncorrelated Signals by Rohini Dakulagi, Ravi Raushan, Soham Dutta, Mohammed Theeb Alosaimi, Miguel Villagomez-Galindo

    Published 2025-01-01
    “…The usefulness of the CUSE-TD algorithm lies in its applicability CUSE -TD to real-world MIMO systems, particularly in complex environments such as radar, wireless communications, and surveillance systems, where accurate source detection is critical for operational effectiveness. …”
    Get full text
    Article