Showing 1,741 - 1,760 results of 12,239 for search 'algorithm detection', query time: 0.16s Refine Results
  1. 1741

    An Improved Integrity Monitoring Algorithm for GNSS Receiver by CHEN Ke-xun, ZHANG Xue-ying, QIU Wei

    Published 2021-06-01
    “…In view of the problem that the availability judgment process of traditional GNSS receiver integrity monitoring algorithm is too conservative,and the error protection level value is too large,resulting in poor availability,the availability judgment process of the traditional algorithm is optimized,the dynamic allocation method of the missed detection rate according to difficulty of satellite fault detection,and corresponding calculation method about VPL are given. …”
    Get full text
    Article
  2. 1742

    A New Approach Based on Metaheuristic Optimization Using Chaotic Functional Connectivity Matrices and Fractal Dimension Analysis for AI-Driven Detection of Orthodontic Growth and D... by Orhan Cicek, Yusuf Bahri Özçelik, Aytaç Altan

    Published 2025-02-01
    “…Feature selection was performed using a wrapper-based approach combining k-nearest neighbors (kNN) and the Puma optimization algorithm, which efficiently handles the chaotic and computationally complex nature of cervical vertebrae images. …”
    Get full text
    Article
  3. 1743

    Development of AI in the Caribbean: algorithms, challenges and recommendations by Amir Mohammed, Sheikh Ahad Ahmad

    Published 2025-03-01
    “…This article provides a concise overview, explicitly delving into popular AI algorithms employed in developing Anomaly Detection Systems (ADSs) applicable to Cyber-Physical Systems (CPSs), the state of AI and guidelines for adopting AI within the Caribbean region.…”
    Get full text
    Article
  4. 1744

    Prediction of Hypertension Patients with Machine Learning Algorithm by Eko Priyono

    Published 2025-06-01
    “…These algorithms can predict hypertension risk based on clinical data, such as age, medical history, and lifestyle. …”
    Get full text
    Article
  5. 1745

    Parallelization of the Bison Algorithm Applied to Data Classification by Simone A. Ludwig, Jamil Al-Sawwa, Aaron Mackenzie Misquith

    Published 2024-11-01
    “…Classification algorithms, in particular, play a crucial role in a wide range of applications, from image recognition and natural language processing to fraud detection and medical diagnosis. …”
    Get full text
    Article
  6. 1746

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…The SpamAssassin dataset is used in this study to explore the use of the Naive Bayes (NB) algorithm for spam detection. The algorithm demonstrated high accuracy and efficiency in classifying large-scale text data, achieving an accuracy of 97.74%, a recall rate of 96.60%, and a precision rate of 96.8%, with an F1 score of 0.97. …”
    Get full text
    Article
  7. 1747

    Data Validation Algorithm for Wireless Sensor Networks by Jaichandran Ravichandran, Anthony Irudhayaraj Arulappan

    Published 2013-12-01
    “…Compared to other methods, the proposed novel data validation algorithm is effective in detecting different types of data faults and reports high fault detection rate by eliminating false positives.…”
    Get full text
    Article
  8. 1748

    Traffic Management System Using YOLO Algorithm by Pankaj Kunekar, Yogita Narule, Richa Mahajan, Shantanu Mandlapure, Eshan Mehendale, Yashashri Meshram

    Published 2024-01-01
    “…This was accomplished using the cutting-edge, real-time object detection system You Only Look Once (YOLO), which is built on deep convolutional neural networks. …”
    Get full text
    Article
  9. 1749

    A Cuckoo Search Algorithm for Multimodal Optimization by Erik Cuevas, Adolfo Reyna-Orta

    Published 2014-01-01
    “…On the other hand, the cuckoo search (CS) algorithm is a simple and effective global optimization algorithm which can not be directly applied to solve multimodal optimization problems. …”
    Get full text
    Article
  10. 1750

    Review of Multivariate Time Series Clustering Algorithms by ZHENG Desheng, SUN Hanming, WANG Liyuan, DUAN Yaoxin, LI Xiaoyu

    Published 2025-03-01
    “…For each category of detection technology, a detailed summary is provided, covering algorithm principles, representative methods, advantages and disadvantages, and the problems they address. …”
    Get full text
    Article
  11. 1751

    Multifactor Algorithm for Test Case Selection and Ordering by Atulya Gupta, Rajendra Prasad Mahapatra

    Published 2021-06-01
    “…Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. …”
    Get full text
    Article
  12. 1752

    An intelligent algorithm for identifying dropped blocks in wellbores by Qian Wang, Zixuan Yang, Chenxi Ye, Wenbao Zhai, Xiao Feng

    Published 2025-04-01
    “…Real-time monitoring of wellbore stability during drilling is crucial for the early detection of instability and timely interventions. …”
    Get full text
    Article
  13. 1753

    Enhanced YOLOv8 with lightweight and efficient detection head for for detecting rice leaf diseases by Bo Gan, Guolin Pu, Weiyin Xing, Lianfang Wang, Shu Liang

    Published 2025-07-01
    “…However, the diversity of these diseases, their uneven distribution, and complex field environments create challenges for precise, multi-scale detection. While YOLO object detection algorithms show strong performance in automated detection, their feature extraction capabilities remain limited in complex agricultural settings. …”
    Get full text
    Article
  14. 1754

    Dual-hybrid intrusion detection system to detect False Data Injection in smart grids. by Saad Hammood Mohammed, Mandeep S Jit Singh, Abdulmajeed Al-Jumaily, Mohammad Tariqul Islam, Md Shabiul Islam, Abdulmajeed M Alenezi, Mohamed S Soliman

    Published 2025-01-01
    “…Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures. …”
    Get full text
    Article
  15. 1755
  16. 1756

    Algorithmic bias and the Value Sensitive Design approach by Judith Simon, Pak-Hang Wong, Gernot Rieder

    Published 2020-12-01
    “…Recently, amid growing awareness that computer algorithms are not neutral tools but can cause harm by reproducing and amplifying bias, attempts to detect and prevent such biases have intensified. …”
    Get full text
    Article
  17. 1757

    OPTIMIZATION OF THE PROBABILISTIC ALGORITHM FOR RESOLVING AIRSPACE CONFLICTS by Gabriela STROE, Mihaela-Luminita COSTEA, Augustin SEMENESCU

    Published 2020-12-01
    “…In this proposed new form, the algorithm takes into account the previously detected problems and proposes to solve all these problems that inevitably appeared in the process of scientific research.…”
    Get full text
    Article
  18. 1758

    Diagnostic algorithm for axial involvement in psoriatic arthritis by E. E. Gubar, T. V. Korotaeva, L. D. Vorobyeva, E. Yu. Loginova, Yu. L. Korsakova, P. O. Tremaskina, A. V. Smirnov, M. M. Urumova, S. I. Glukhova

    Published 2025-03-01
    “…The aim – to develop a unified diagnostic algorithm for axial psoriatic arthritis (axPsA).Subjects and methods. 122 patients with psoriatic arthritis (PsA), duration less than 10 years, were included in the study according to CASPAR (The ClASsification for Psoriatic ARthritis) criteria, provided they also had axial involvement. …”
    Get full text
    Article
  19. 1759

    Information Hiding Based on Chan-Vese Algorithm by Samia Sh. Lazar, Nadia M. Mohammed

    Published 2011-12-01
    “…The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is general and open, the unauthorized one can control information were transmitted between any two parts and interception of getting access for it, because of that there is an emergency need for write covered, which is the science of hiding secret information in a digital cover such as an images, so it is impossible for the normal person and others unauthorized to detected or perceives. In this paper, the technology in the field of information hiding in the images is developed, where first, the cover (PNG, BMP) image is segmented using Chan-Vese algorithm, then the text will hide in the segmented image depending on the areas of clipping.The standards (PSNR, BER) are used to measure technical efficiency. …”
    Get full text
    Article
  20. 1760