Showing 1,801 - 1,820 results of 12,239 for search 'algorithm detection', query time: 0.20s Refine Results
  1. 1801

    Algorithmization of the problem of videoscopic evaluation of the steel ropes state by Panfilov A.V., Yusupov A.R., Gavrikov M.M., Sinetsky R.M.

    Published 2023-03-01
    “…The authors have developed algorithms for automatic detection of the main types of defects in images of the surface of steel ropes: increase/decrease in diameter, deformation in the form of rope, breaks in the outer wires, thermal and electric damage. …”
    Get full text
    Article
  2. 1802

    Implementation of stochastic signal processing algorithms in radar CAD by M. Yu. Konopel'kin, S. V. Petrov, D. A. Smirnyagina

    Published 2022-10-01
    “…In the process of simulation, the algorithms for detecting and estimating the number of stochastic signals produced a correct detection sign and an estimate of the number of signals. …”
    Get full text
    Article
  3. 1803
  4. 1804

    Cognitive Radio for Smart Grid: Theory, Algorithms, and Security by Raghuram Ranganathan, Robert Qiu, Zhen Hu, Shujie Hou, Marbin Pazos-Revilla, Gang Zheng, Zhe Chen, Nan Guo

    Published 2011-01-01
    “…Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. …”
    Get full text
    Article
  5. 1805

    Smart Agricultural Pest Detection Using I-YOLOv10-SC: An Improved Object Detection Framework by Wenxia Yuan, Lingfang Lan, Jiayi Xu, Tingting Sun, Xinghua Wang, Qiaomei Wang, Jingnan Hu, Baijuan Wang

    Published 2025-01-01
    “…Aiming at the problems of insufficient detection accuracy and high false detection rates of traditional pest detection models in the face of small targets and incomplete targets, this study proposes an improved target detection network, I-YOLOv10-SC. …”
    Get full text
    Article
  6. 1806

    A novel optical granulometry algorithm for ore particles by Junhao Y., Xiubin Z., Jie Q.

    Published 2010-01-01
    “…This paper proposes a novel algorithm to detect the particle size distribution of ores with irregular shapes and dim edges. …”
    Get full text
    Article
  7. 1807

    Geometrically synchronous watermarking algorithm based on the corner feature by LIU Quan1, ZHANG Le1, ZHANG Yong-gang2, Christian Bessiere3, FU Qi-ming1, WANG Xiao-yan1

    Published 2011-01-01
    “…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
    Get full text
    Article
  8. 1808

    Algorithms for preliminary evaluation of the technical state of social buildings by Yu. V. Zazulya, O. V. Ashikhmin, D. S. Bayanov

    Published 2022-12-01
    “…The correlation between the detected damages and the type of structural elements as well as the year of building construction was revealed. …”
    Get full text
    Article
  9. 1809

    An Improved Algorithm for TD-LTE Downlink Time Synchronization by Wenle Bai, Xu Wang, Yongmei Zhang, Mugen Peng

    Published 2015-01-01
    “…Aimed at the application problem of timing synchronization algorithm in orthogonal frequency division multiplexing system, an improved algorithm for TD-LTE downlink time synchronization was proposed. …”
    Get full text
    Article
  10. 1810

    Crime Busting Model Based on Dynamic Ranking Algorithms by Yang Cao, Xiaotian Xu, Zhijing Ye

    Published 2013-01-01
    “…This paper proposed a crime busting model with two dynamic ranking algorithms to detect the likelihood of a suspect and the possibility of a leader in a complex social network. …”
    Get full text
    Article
  11. 1811

    Distributed Voronoi coverage algorithm in wireless sensor networks by XU Peng-fei1, CHEN Zhi-gang1, DENG Xiao-heng1

    Published 2010-01-01
    “…On the hypothesis conditions that wireless sensor networks only covered partial target region and the commu-nication radius was no less than twice of the sensing radius,a coverage-preserved and connected distributed Voronoi cov-erage algorithm was presented.Firstly,a method of detecting coverage redundancy sensors based on the local Voronoi re-gions was proposed,whose computational complexity was unconcerned with the density of sensors.Then,an en-ergy-prior self-scheduling strategy based on local Voronoi neighbors was proposed,where those sensors that were com-munication neighbors but not local Voronoi neighbors could synchronously execute self-scheduling,which improved the astringency of distributed scheduling.The simulation results show that the average number and coverage-degree of active sensors produced by the proposed algorithm are close to the centralized algorithm and smaller than the general distributed algorithm,while the proposed algorithm has more advantages in terms of active sensors’ average energy,scheduling as-tringency and runtime.…”
    Get full text
    Article
  12. 1812

    An Effective Algorithm for Collision Resolution in Security Policy Rules by Sergey V. Morzhov, Valeriy A. Sokolov

    Published 2019-03-01
    “…In addition, the authors present a new efficient algorithm for detecting and resolving collisions in firewall rules by the example of the Floodlight SDN controller.…”
    Get full text
    Article
  13. 1813
  14. 1814

    Optimum Median Filter Based on Crow Optimization Algorithm by Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim al-Aqbi, Lamees abdalhasan Salman

    Published 2021-09-01
    “…The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. …”
    Get full text
    Article
  15. 1815

    patter: Particle algorithms for animal tracking in R and Julia by Edward Lavender, Andreas Scheidegger, Carlo Albert, Stanisław W. Biber, Janine Illian, James Thorburn, Sophie Smout, Helen Moor

    Published 2025-08-01
    “…More generally, particle algorithms represent an individual's possible location probabilistically as a weighted series of samples (‘particles’). …”
    Get full text
    Article
  16. 1816

    Pulmonary hemorrhage in oncologic patients – a diagnostic algorithm by R. S. Kiselev, E. A. Tarabrin, Z. G. Berikkhanov, V. A. Savelieva, Yu. V. Kutilin, M. Yu. Ivanova

    Published 2024-10-01
    “…The OBJECTIVE was to develop a diagnostic algorithm in oncologic patients with pulmonary hemorrhage.METHODS AND MATERIAL. …”
    Get full text
    Article
  17. 1817

    Algorithm of the diagnosis and treatment of enteral insufficiency syndrome in peritonitis by E. A. Korymasov, S. A. Ivanov, M. V. Kenarskaya

    Published 2021-08-01
    “…The early diagnosis and correction of enteral insufficiency syndrome influence the treatment outcomes in patients with abdominal sepsis and multiple organ failure.The OBJECTIVES was to improve the effectiveness of diagnosis and correction of enteral insufficiency syndrome in patients with generalized peritonitis using the express assessment scale of the severity of enteral insufficiency and the treatment algorithm based on this.MATERIALS AND METHODS. The express assessment scale of the severity of enteral insufficiency syndrome was developed along with the treatment algorithm depending on the detected degree for systematic approach to the management of patients with generalized peritonitis. …”
    Get full text
    Article
  18. 1818

    Research on the Raft improved algorithm for anti-Byzantine nodes by WANG Xiaowei, LI Jie

    Published 2025-03-01
    “…ObjectivesIn order to solve the problem of malicious election and log tampering caused by Byzantine nodes in original Raft algorithm, an AntiB-Raft (Anti-Byzantine Raft) algorithm was proposed to resist Byzantine nodes.MethodsWhen the candidate requested to replace the Leader, the heartbeat monitoring threshold mechanism was used to determine whether the candidate can successfully obtain enough votes to become the new Leader, which was agreed that only when more than half of the nodes detected that the current Leader was really down, the candidate can obtain more than half of the votes and become the new Leader, so as to prevent the Byzantine node from maliciously pulling votes when current Leader was not down, which would result in the replacement of the normal Leader. …”
    Get full text
    Article
  19. 1819

    COMPARISON OF DATASET OVERSAMPLING ALGORITHMS AND THEIR APPLICABILITY TO THE CATEGORIZATION PROBLEM by Denys Teslenko, Anna Sorokina, Artem Khovrat, Nural Huliiev, Valentyna Kyriy

    Published 2023-08-01
    “…The following methods are used: analytical and inductive methods for determining the necessary set of experiments and building hypotheses regarding their results, experimental and graphic methods for obtaining a visual comparative characteristic of the selected algorithms. The following results were obtained: with the help of quality metrics, an experiment was conducted for all algorithms on two different datasets – the Titanic passenger dataset and the dataset for detecting fraudulent transactions in bank accounts. …”
    Get full text
    Article
  20. 1820

    An algorithm for managing surgical patients with acute retinal necrosis by V. V. Neroev, P. A. Ilyukhin, V. E. Tankovsky, R. A. Fedotov

    Published 2018-12-01
    “…To increase the efficiency of surgical treatment and develop an algorithm for managing patients with the consequences of acute retinal necrosis (ARN).Material and methods. …”
    Get full text
    Article