Showing 1,921 - 1,940 results of 12,239 for search 'algorithm detection', query time: 0.24s Refine Results
  1. 1921

    The Morphological Classification of Galaxy Clusters: Algorithms for Applying the Numerical Criteria by Elena Panko

    Published 2025-07-01
    “…For the detailed study of the inner structure of galaxy clusters, algorithms were developed for detecting various types of regular substructures inside such objects automatically. …”
    Get full text
    Article
  2. 1922

    Palm Print Edge Extraction Using Fractional Differential Algorithm by Chunmei Chi, Feng Gao

    Published 2014-01-01
    “…The experiment results showed that this algorithm can reduce noise and detect rich edge details and has higher SNR than traditional methods.…”
    Get full text
    Article
  3. 1923

    Logical derivation and integrating legal knowledge bases: basic algorithms by Laima Paliulionienė

    Published 1998-12-01
    “…In this article we present comparison and combining algorithms based on derivation by model generation. …”
    Get full text
    Article
  4. 1924

    Development of an algorithm for identifying signs of intraframe editing of video images by D. A. Kuzheva

    Published 2024-09-01
    “…This paper discusses an algorithm for detecting signs of intra-frame editing of video images when cutting or pasting into the source video stream. …”
    Get full text
    Article
  5. 1925
  6. 1926
  7. 1927

    Intelligent Collaborative Event Query Algorithm in Wireless Sensor Networks by Rongbo Zhu

    Published 2011-09-01
    “…Event query processing is a very important issue in wireless sensor networks (WSNs). In order to detect event early and provide monitoring information and event query timely in WSNs, an efficient intelligent collaborative event query (ICEQ) algorithm is proposed, in which sensor nodes that are near to the boundary of events are selected to accomplish complex event monitoring and query processing through intelligent collaboration. …”
    Get full text
    Article
  8. 1928

    Collaborative Spectrum Sensing Optimisation Algorithms for Cognitive Radio Networks by Kamran Arshad, Muhammad Ali Imran, Klaus Moessner

    Published 2010-01-01
    “…The main challenge for a cognitive radio is to detect the existence of primary users reliably in order to minimise the interference to licensed communications. …”
    Get full text
    Article
  9. 1929
  10. 1930

    APPLICATION OF THE WORD2VEC ALGORITHM FOR CLINICAL DIAGNOSIS DETERMINATION by Uzeyir Gurbanli

    Published 2025-02-01
    “…The article presents a Word2Vec algorithm-based approach for detecting diagnoses of cardiovascular diseases from collected patient histories, as well as refining existing diagnoses. …”
    Get full text
    Article
  11. 1931

    SMOTEHashBoost: Ensemble Algorithm for Imbalanced Dataset Pattern Classification by Seema Yadav, Dhruvanshu Joshi, Soham Mulye, Sandeep S. Udmale, Girish P. Bhole

    Published 2025-01-01
    “…The majority class is often favored by conventional classifiers, which can lead to biases from improper oversampling or subpar performance when detecting instances of the minority class. Consequently, there is growing concern about algorithmic fairness. …”
    Get full text
    Article
  12. 1932

    Algorithm for Generating Bifurcation Diagrams Using Poincaré Intersection Plane by Luis Javier Ontañón-García, Juan Gonzalo Barajas-Ramírez, Eric Campos-Cantón, Daniel Alejandro Magallón-García, César Arturo Guerra-García, José Ricardo Cuesta-García, Jonatan Pena-Ramirez, José Luis Echenausía-Monroy

    Published 2025-05-01
    “…This paper presents a computational algorithm for studying bifurcations in dynamic systems, especially for systems with chaotic behavior that depends on parameter changes. …”
    Get full text
    Article
  13. 1933

    Research on High-Dynamic Tracking Algorithms for FH-BOC Signals by Xue Li, Shun Zhao, Xinyue Hou, Lulu Wang, Yinsen Zhang

    Published 2024-11-01
    “…Against this background, this paper proposes a comprehensive high-dynamic tracking algorithm for FH-BOC signals. (1) Based on the adaptive Kalman filter algorithm, high-precision carrier tracking was achieved in high-dynamic environments. (2) By leveraging the correlation between the ranging code and frequency-hopping offset carrier, a composite pseudo-code is generated through the XOR operation, and a corresponding composite code-tracking loop is introduced. (3) Based on code loop tracking results, the frequency-hopping moments of the subcarrier are detected, and a phase-locked loop for the frequency-hopping subcarrier is established. …”
    Get full text
    Article
  14. 1934

    Parallel clustering algorithm for large-scale biological data sets. by Minchao Wang, Wu Zhang, Wang Ding, Dongbo Dai, Huiran Zhang, Hao Xie, Luonan Chen, Yike Guo, Jiang Xie

    Published 2014-01-01
    “…The affinity propagation algorithm outperforms many other classical clustering algorithms and is widely applied into the biological researches. …”
    Get full text
    Article
  15. 1935

    Examining the Efficiency of Learning-Based Algorithms in the Process of Declaring Customs by Mustafa Günerkan, Ender Şahinaslan, Önder Şahınaslan

    Published 2022-12-01
    “…Regarding the K-Fold method, which assumes K to be equal to 10, similar success rates were obtained for the Decision Tree (75.84%) and Bagging (75.83%) algorithms. These results reveal the use of machine learning algorithms to be an effective method for detecting notification errors. …”
    Get full text
    Article
  16. 1936

    Benchmarking and improving algorithms for attributing satellite-observed contrails to flights by A. Sarna, V. Meijer, R. Chevallier, A. Duncan, K. McConnaughay, S. Geraedts, K. McCloskey

    Published 2025-07-01
    “…In this work, we present a method for producing synthetic contrail detections with predetermined contrail-to-flight attributions that can be used to evaluate – or “benchmark” – and improve such attribution algorithms. …”
    Get full text
    Article
  17. 1937

    Adversarial example defense algorithm for MNIST based on image reconstruction by Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN

    Published 2022-02-01
    “…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
    Get full text
    Article
  18. 1938

    Research on γ Spectrum Reconstruction Based on Mi-Gold Algorithm by LIANG Wenchao1, 2, ZHANG Jiangmei2, WANG Jiaqi1, 2

    Published 2025-05-01
    “…To address the challenges faced by the Gold algorithm in reconstructing the low-energy resolution γ spectrum, such as the high number of iterations and the low counting rate for weak peaks, an iterative algorithm framework based on the Gold reconstruction algorithm was presented and it was extended to three novel iterative algorithms. …”
    Get full text
    Article
  19. 1939

    An algorithm for automatic fitting and formula assignment in atmospheric mass spectra by V. Mickwitz, O. Peräkylä, F. Graeffe, D. Worsnop, D. Worsnop, M. Ehn

    Published 2025-04-01
    “…</p> <p>The main result of this study is the algorithm itself. While further improvements and tweaks are possible, the algorithm presented here is currently being implemented into the commonly used Tofware analysis software package to allow easy utilization by the broader community. …”
    Get full text
    Article
  20. 1940