Showing 1,681 - 1,700 results of 12,239 for search 'algorithm detection', query time: 0.24s Refine Results
  1. 1681
  2. 1682

    On the Application of a Sparse Data Observers (SDOs) Outlier Detection Algorithm to Mitigate Poisoning Attacks in UltraWideBand (UWB) Line-of-Sight (LOS)/Non-Line-of-Sight (NLOS) Classification by Gianmarco Baldini

    Published 2025-02-01
    “…In particular, the study described in this paper proposes a recent outlier detection algorithm, which has low computing complexity: the sparse data observers (SDOs) algorithm. …”
    Get full text
    Article
  3. 1683

    Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-Optimized LightGBM Algorithm by Daoqi Han, Honghui Li, Xueliang Fu

    Published 2024-09-01
    “…This work proposes a new FS approach, BPSO-SA, that is based on the Binary Particle Swarm Optimization (BPSO) and Simulated Annealing (SA) algorithms. It combines these with the Gray Wolf Optimization (GWO) algorithm to optimize the LightGBM model, thereby building a new type of reflective Distributed Denial of Service (DDoS) attack detection model. …”
    Get full text
    Article
  4. 1684

    Detection of Battery Appearance Defects Based on Multi‑Scale Object Detection by LI Yang, ZHANG Jianliang, ZHAO Min, WU Jian, HAN Chao, DANG Xiaoyan, WANG Huifang

    Published 2025-05-01
    “…The comparison experiments show that compared with the commonly used target detection algorithms Fast RCNN, SSD-VGG16, and YOLO v4, the mAP values of the method for battery defects are improved by 11.5%, 21.5%, and 3.3%, respectively, and the FPS quantities are increased by 16, 12, and 4 frames, respectively.…”
    Get full text
    Article
  5. 1685
  6. 1686

    Does syndromic surveillance assist public health practice in early detecting respiratory epidemics? Evidence from a wide Italian retrospective experience by Giovanni Corrao, Andrea Stella Bonaugurio, Giorgio Bagarella, Mauro Maistrello, Olivia Leoni, Danilo Cereda, Andrea Gori

    Published 2025-02-01
    “…Improved Farrington algorithm (IMPF) and Exponentially Weighted Moving Average (EWMA) control chart were both fitted to detect outliers in weekly searches of nine syndromic tracers. …”
    Get full text
    Article
  7. 1687

    Forest age estimation using UAV-LiDAR and Sentinel-2 data with machine learning algorithms- a case study of Masson pine (Pinus massoniana) by Jinjin Chen, Xuejian Li, Zihao Huang, Jie Xuan, Chao Chen, Mengchen Hu, Cheng Tan, Yongxia Zhou, Yinyin Zhao, Jiacong Yu, Lei Huang, Meixuan Song, Huaqiang Du

    Published 2025-05-01
    “…Three machine learning algorithms, Adaptive Boosting (AdaBoost), Random Forest (RF), and Extreme Random Tree (ERT), are used to predict forest age in a Masson pine (Pinus massoniana Lamb.) forest. …”
    Get full text
    Article
  8. 1688

    Comparative analysis of object tracking algorithms by B. A. Zalesky, V. A. Ivanyukovich, K. V. Reer, D. A. Starikovich

    Published 2025-03-01
    “…The article presents the results of calculation and comparative analysis of the characteristics of the algorithm proposed by the authors in [1] for tracking an object captured by a video camera, when solving the urgent task of automatic detection and tracking of drones. …”
    Get full text
    Article
  9. 1689

    Deep learning object detection-based early detection of lung cancer by Kuo-Yang Huang, Kuo-Yang Huang, Kuo-Yang Huang, Che-Liang Chung, Che-Liang Chung, Che-Liang Chung, Jia-Lang Xu

    Published 2025-04-01
    “…The performance of the You Only Look Once (YOLO) series of models in the lung CT image object detection task is compared in terms of algorithms, and different versions of YOLOv5, YOLOv8, YOLOv9, YOLOv10, and YOLOv11 are examined for lung cancer detection and classification. …”
    Get full text
    Article
  10. 1690
  11. 1691
  12. 1692
  13. 1693
  14. 1694

    An Algorithm for Data Hiding in Binary Images by Eman Sedeek Al-obaidy

    Published 2008-12-01
    “…In this work a new data hiding algorithm for binary images is used. In this algorithm the pixels which can be flipped without introducing noticeable artifacts are identified at first by using some rules that examine the neighbors of the central pixels in each non-uniform block and then this central pixel only is changed in the block which matches these rules and this property allows easy detection of the embedded data without referring to the original   image. …”
    Get full text
    Article
  15. 1695

    Molecular Beacon Sequence Design Algorithm by W. Todd Monroe, Frederick R. Haselton

    Published 2003-01-01
    “…For smaller laboratories where molecular beacons are not the focus of research, the public domain algorithm described here may be usefully employed to aid in molecular beacon design.…”
    Get full text
    Article
  16. 1696

    MODERN ALGORITHMS OF MICROBIOLOGICAL DIAGNOSTICS OF TUBERCULOSIS by Elina V. Sevastyanova, Larisa N. Chernousova

    Published 2018-08-01
    “…The article presents the comparative analysis of the microbiological diagnostics algorithm, developed and used in Central Tuberculosis Research Institute and the algorithm of laboratory diagnostics and monitoring of treatment of pulmonary tuberculosis and drug resistant tuberculosis based on modern rapid molecular techniques, developed by the experts of European Laboratory Initiatives jointly with Secretariat of Regional Office for Europe of World Health Organisation (WHO) for countries of the WHO European Region.It has been proved that despite some differences in these algorithms, the main principles on which they are based and approaches to diagnostics are similar. …”
    Get full text
    Article
  17. 1697
  18. 1698
  19. 1699
  20. 1700