Showing 1,781 - 1,800 results of 12,239 for search 'algorithm detection', query time: 0.20s Refine Results
  1. 1781

    PPI-GA: A Novel Clustering Algorithm to Identify Protein Complexes within Protein-Protein Interaction Networks Using Genetic Algorithm by Naeem Shirmohammady, Habib Izadkhah, Ayaz Isazadeh

    Published 2021-01-01
    “…The result achieved demonstrates that the proposed algorithm can detect important protein complexes, and it provides more accurate results compared with state-of-the-art protein complex identification algorithms.…”
    Get full text
    Article
  2. 1782

    Study on the effect of pulsed eddy current lift-off characteristics for feeding metallic foreign objects detection in coal mine crushers by Benchang Meng, Zezheng Zhuang, Jiahao Ma, Sihai Zhao

    Published 2025-07-01
    “…Simulation and experimental results show that the PEC signals from the metallic foreign object detection system, processed by the DWT-TLBO noise reduction algorithm, enable the classification and identification of the falling position, size, conductivity, and magnetic permeability of feeding metallic foreign objects based on the lift-off point, peak value, time to peak, and effective time range. …”
    Get full text
    Article
  3. 1783

    Anti-interference algorithm of wireless channel for IoT communication by Ling TAN, Yong ZHUANG

    Published 2017-10-01
    “…In IoT communication,the anti-interference of wireless channel is influenced by various factors.Multi-antenna system has significant effect for promoting anti-interference of channel,whose complexity and performance in signal detection need further improvement.The QR decomposition detection algorithm in signal detection of multi-antenna system has low computational complexity,but the algorithm performance is poor.In order to improve the performance of QR decomposition detection algorithm,a QR decomposition algorithm based on ML criterion and decision candidate mechanism was proposed,and the performance of the algorithm was analyzed.The ML criterion was used to estimate the initial level of the detection,and a reliable decision was adopted in the other detection layer.Candidate points were introduced in unreliable case and the optimal candidate were selected from the feedback.The algorithm could significantly improve the system interference,and propagation error were greatly reduced in the decision feedback.The experimental results show that the proposed algorithm can improve the performance of the IoT system effectively with certain complexity.…”
    Get full text
    Article
  4. 1784

    Anti-interference algorithm of wireless channel for IoT communication by Ling TAN, Yong ZHUANG

    Published 2017-10-01
    “…In IoT communication,the anti-interference of wireless channel is influenced by various factors.Multi-antenna system has significant effect for promoting anti-interference of channel,whose complexity and performance in signal detection need further improvement.The QR decomposition detection algorithm in signal detection of multi-antenna system has low computational complexity,but the algorithm performance is poor.In order to improve the performance of QR decomposition detection algorithm,a QR decomposition algorithm based on ML criterion and decision candidate mechanism was proposed,and the performance of the algorithm was analyzed.The ML criterion was used to estimate the initial level of the detection,and a reliable decision was adopted in the other detection layer.Candidate points were introduced in unreliable case and the optimal candidate were selected from the feedback.The algorithm could significantly improve the system interference,and propagation error were greatly reduced in the decision feedback.The experimental results show that the proposed algorithm can improve the performance of the IoT system effectively with certain complexity.…”
    Get full text
    Article
  5. 1785

    Tunnel Crack Segmentation Algorithm Based on Feature Enhancement by Lihua Feng, Aijun Yao, An Huang

    Published 2025-01-01
    “…However, due to the complex lighting conditions, background noise, and diverse nature of cracks inside tunnels, traditional image segmentation algorithms often struggle to achieve sufficient accuracy in crack segmentation tasks. …”
    Get full text
    Article
  6. 1786

    Infrared image monitoring algorithm for converter valve equipment by Jiashui Dai, Fali Tan, Yi Jiang, Yunlong Liang, Kangquan Lin, Kai Tong

    Published 2025-03-01
    “…In this study, according to the requirements of infrared image monitoring of the converter valve, the infrared image monitoring algorithm system of the converter valve equipment based on the improved YOLOv8n target detection model is constructed. …”
    Get full text
    Article
  7. 1787

    Optimization of the Weight Processing Algorithm in Multichannel Doppler Filtering by V. I. Koshelev, Ngoc Hieu Trinh

    Published 2024-05-01
    “…However, the implementation of multi-channel Doppler filtering (MDF) based on the classical fast Fourier transform (FFT) algorithm of non-equidistant signal samples in the signal detection problem is associated with energy losses. …”
    Get full text
    Article
  8. 1788

    Acquisition algorithm for BOC signals in high dynamic environment by Yi PAN, Tianqi ZHANG, Gang ZHANG, Baoze MA

    Published 2019-06-01
    “…As the synchronization of binary offset carrier (BOC) signals couldn’t be realized in high dynamic environment by traditional acquisition algorithms,an acquisition algorithm based on fractional Fourier transform (FRFT) and discrete polynomial-phase transform (DPT) was proposed.Firstly,the algorithm determined how to process the received signal according to the dynamic order obtained by the order operation.And then the acquisition was achieved by searching the spectral peak of the FRFT algorithm to obtain the estimation of dynamic parameters and code phase.Theoretical analysis and simulations show that the proposed algorithm eliminates the influence of second-order doppler shift rate based on original FRFT acquisition algorithm,which can successfully capture high dynamic BOC signals.The proposed algorithm further enhances the dynamic adaptability and anti-noise performance and has superior performance in detection probability and acquisition time in comparison with other algorithms.…”
    Get full text
    Article
  9. 1789

    AdaBoost algorithm based on fitted weak classifier by Pengfeng SONG, Qingwei YE, Zhihua LU, Yu ZHOU

    Published 2019-11-01
    “…AdaBoost algorithm was proposed to minimize the accuracy caused by weak classifiers by minimizing the training error rate,and the single threshold was weaker and difficult to converge.The AdaBoost algorithm based on the fitted weak classifier was proposed.Firstly,the mapping relationship between eigenvalues and marker values was established.The least squares method was introduced to solve the fitting polynomial function,and the continuous fitting values were converted into discrete categorical values,thereby obtaining a weak classifier.From the many classifiers obtained,the classifier with smaller fitting error was selected as the weak classifier to form a new AdaBoost strong classifier.The UCI dataset and the MIT face image database were selected for experimental verification.Compared with the traditional Discrete-AdaBoost algorithm,the training speed of the improved algorithm was increased by an order of magnitude.And the face detection rate can reach 96.59%.…”
    Get full text
    Article
  10. 1790

    Rethinking Media Users in the Age of AI and Algorithmic Mediation by Jaemin Jung, Jeong-Nam Kim

    Published 2025-07-01
    “…The authors describe and prescribe how people respond to AI in real settings, such as journalists transitioning to algorithmic newsrooms, students utilizing ChatGPT, and policymakers searching for fairness and transparency. …”
    Get full text
    Article
  11. 1791

    An overview of Cuckoo Optimization Algorithm based Image Processing by Baydaa sulaiman

    Published 2022-06-01
    “…The main categories reviewed that used CS in the field of image processing are: image segmentation, image optimization, image noise removal, image classification, feature extraction in images, image clustering and edge detection. The aim of this paper is to provide an overview and summarize the literature review of applying CS algorithm in these categories in order to extract which categories that applied this algorithm more than others. …”
    Get full text
    Article
  12. 1792

    A Proposed Harmony Search Algorithm for Honeyword Generation by Yasser A. Yasser, Ahmed T. Sadiq, Wasim AlHamdani

    Published 2022-01-01
    “…The honeyword system is a password cracking detection technique that aims to improve the security of hashed passwords by making password cracking simpler to detect. …”
    Get full text
    Article
  13. 1793

    Local congestion control algorithm with fair channel allocation by Geng-ming ZHU, Zhi-qiang WANG, Zhe-tao LI, Ren-fa LI

    Published 2015-04-01
    “…A local congestion control algorithm with fair channel allocation (FCA) was presented to mitigate local congestion as well as to improve the fairness of channel utilization.In order to decrease the extra communication overhead for obtaining the real-time buffer length of neighbors and improve the accuracy of congestion detection model based on buffer occupancy of single node,FCA presented a new model considers the total buffer length of neighbors with predict-based mechanism for real-time buffer occupancy and the average transmission time of packet.To avoid deteriorating congestion with an explicit notified package,FCA embedded an additional node address to the ACK control frame to carry congestion information.During the congestion alleviation stage,FCA presented a fair channel allocation mechanism based on real-time buffer occupancy and queue priority to prevent some nodes from overflowing resulting in package loss due to the growth of buffer fast.Simulation results show that the proposed protocol has comparative advantages compare with 802.11,CODA and PCCP in terms of collision,package delivery ratio,throughput and fairness.…”
    Get full text
    Article
  14. 1794

    Mapping the social implications of platform algorithms for LGBTQ+ communities by David Myles, Stefanie Duguay, Lucia Flores Echaiz

    Published 2023-09-01
    “…Our analysis points to five important algorithmic issues that affect the lives of LGBTQ+ users in ways that require additional scrutiny from researchers, policymakers, and tech developers alike: the ability for sorting algorithms to identify, categorize, and predict the sexual orientation and/or gender identity of users; the role that recommendation algorithms play in mediating LGBTQ+ identities, kinship, and cultures; the development of automated anti-LGBTQ+ speech detection/filtering software and the collateral harm caused to LGBTQ+ users; the power struggles over the nature and effects of visibility afforded to LGBTQ+ issues/people online; and the overall enactment of cisheteronormative biases through platform affordances. …”
    Get full text
    Article
  15. 1795

    A Review of Link Prediction Algorithms in Dynamic Networks by Mengdi Sun, Minghu Tang

    Published 2025-02-01
    “…Furthermore, dynamic network link prediction algorithms are classified into regular sampling and irregular sampling by the method of network sampling. …”
    Get full text
    Article
  16. 1796

    A Combined Antijamming and Antispoofing Algorithm for GPS Arrays by Qiong Yang, Yi Zhang, Chengkai Tang, Jie Lian

    Published 2019-01-01
    “…We analyse three aspects of algorithmic performance: the antenna array direction diagram, the spoofing detection and the acquisition results. …”
    Get full text
    Article
  17. 1797

    Accelerating the k-Means++ Algorithm by Using Geometric Information by Guillem Rodriguez Corominas, Maria J. Blesa, Christian Blum

    Published 2025-01-01
    “…Real-world use cases include social network analysis, medical imaging, market segmentation, and anomaly detection, to name a few. In this paper, we propose an acceleration of the exact k-means++ algorithm using geometric information, specifically the Triangle Inequality and additional norm filters, along with a two-step sampling procedure. …”
    Get full text
    Article
  18. 1798

    Improved K-Means Algorithm for Nearby Target Localization by Zongwen Yuan, Xingdi Wang, Fuyang Chen, Xicheng Ma

    Published 2025-01-01
    “…In the K-means algorithm, we integrate a quartile range anomaly detection algorithm to address interference signal issues. …”
    Get full text
    Article
  19. 1799

    Hybrid quadratic diagonal algorithm for thinning contour lines by Mamatov Narzullo, Jalelova Malika, Fayziev Vohid, Samijonov Abdurashid, Samijonov Boymirzo

    Published 2025-01-01
    “…Also, the proposed algorithm is compared with the existing algorithms regarding error and time criteria in contour detection. …”
    Get full text
    Article
  20. 1800

    Spectrum‐sensing algorithm based on graph feature fusion by Shanshan Wu, Guobing Hu, Bin Gu

    Published 2024-12-01
    “…Thus, compared to existing algorithms, except block range‐ and energy‐detection‐based methods, the proposed algorithm demonstrates the best spectrum‐sensing performance under low SNRs and channel‐fading conditions, while achieving the lowest computational complexity. …”
    Get full text
    Article