Showing 181 - 200 results of 2,002 for search 'algorithm detection problem', query time: 0.14s Refine Results
  1. 181
  2. 182

    Features of the Application of the Detection Algorithm Based on the Background Subtraction Method in the Scanning Optoelectronic Surveillance System by E. I. Mikhnionok, A. V. Khizniak

    Published 2022-10-01
    “…This algorithm is the basis of the developed image processing method applied to the problem of detecting moving objects by an optoelectronic thermal imaging surveillance system. …”
    Get full text
    Article
  3. 183

    Anchor-Free Object Detection Algorithm Based on Dual-Angle Multi-Scale Feature Fusion by WANG Xiaoyu, WEI Yuxin, LU Jianyu, YU Yue

    Published 2024-08-01
    “… In response to the problem of insufficient feature extraction and insufficient detection accuracy in the anchor-free frame object detection algorithm CenterNet. …”
    Get full text
    Article
  4. 184

    YOLO-Helmet: A Novel Algorithm for Detecting Dense Small Safety Helmets in Construction Scenes by Guoliang Yang, Xinfang Hong, Yangyang Sheng, Liuyan Sun

    Published 2024-01-01
    “…Therefore, this paper proposes a novel algorithm called YOLO-Helmet. Firstly, in order to solve the problem of difficult detection due to the small area of the helmet in the image, a small size detection layer was extended to improve the detection sensitivity of the network to small size targets. …”
    Get full text
    Article
  5. 185

    Sec-CLOCs: Multimodal Back-End Fusion-Based Object Detection Algorithm in Snowy Scenes by Rui Gong, Xiangsuo Fan, Dengsheng Cai, You Lu

    Published 2024-11-01
    “…The CLOCs back-end fusion algorithm is then employed to merge the 2D and 3D detection outcomes, thereby enhancing overall object detection capabilities. …”
    Get full text
    Article
  6. 186

    TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5 by Han Wang, Zhenwei Yang, Qiaoshou Liu, Qiang Zhang, Honggang Wang

    Published 2025-05-01
    “…Therefore, a lightweight object detection algorithm based on YOLOv5 is proposed to solve the problem of excessive network parameters in automatic driving scenarios. …”
    Get full text
    Article
  7. 187

    K-Gen PhishGuard: an Ensemble Approach for Phishing Detection with K-Means and Genetic Algorithm by Ali Al-Hafiz, Adnan Jabir, Shamala Subramaniam

    Published 2025-06-01
    “… Phishing detection is considered a critical problem in cybersecurity, and utilising machine learning with an efficient feature selection method for precisely identifying malicious websites is deemed the most critical challenge. …”
    Get full text
    Article
  8. 188

    High resolution weld semantic defect detection algorithm based on integrated double U structure by Xiaoyan Li, Yi Wei, Zhigang Lv, Peng Wang, Liangliang Li, Mengyu Sun, Chu Wang

    Published 2025-05-01
    “…In this study, a high-resolution semantic segmentation algorithm based on a double U-shaped network was proposed to meet the requirements of pressure vessel weld defect detection, and accurate detection was realized through innovative three-stage processing flow. …”
    Get full text
    Article
  9. 189
  10. 190

    Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms by Ali Zaman, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad, Mohammed A. ElAffendi

    Published 2025-03-01
    “…There is abundant literature on the application of such algorithms on conventional networks. However, because SDNs are relatively new, they lack such abundance both in terms of novel algorithms and effective datasets when it comes to DDoS attack detection. …”
    Get full text
    Article
  11. 191

    An Algorithm Based on Connectivity Properties for Finding Cycles and Paths on Kidney Exchange Compatibility Graphs by Roger Z. Ríos-Mercado, L. Carolina Riascos-Álvarez, Jonathan F. Bard

    Published 2025-05-01
    “…In addition, an efficient algorithm is developed for detecting violated constraints and solving the problem. …”
    Get full text
    Article
  12. 192

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  13. 193

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  14. 194

    Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny by ZHANG Guanghua, LI Congfa, LI Gangying, LU Weidang

    Published 2025-05-01
    “…This study proposes a small target detection algorithm for UAV aerial images using a ConvMixer detection head based on the improved YOLOv7-tiny to address the problems of missed detection and false detection caused by significant variations in target scale, densely distributed small-sized targets and complex backgrounds in UAV aerial images.MethodsFirst, the activation function LeakyReLU is replaced with SiLU to compensate for the limited nonlinear expression of LeakyReLU and to enhance convergence speed and model generalization during training. …”
    Get full text
    Article
  15. 195
  16. 196

    Identification of Anomaly Detection in Power System State Estimation Based on Fuzzy C-Means Algorithm by Di Leng, Ziliang Qiu

    Published 2023-01-01
    “…In order to estimate the power system accurately and identify anomaly detection in real time, an identification method of anomaly detection in power system state estimation based on Fuzzy C-means algorithm is proposed. …”
    Get full text
    Article
  17. 197

    Research on surface loss detection algorithm of wind turbine blade based on FRE-DETR network by Jingwei Yang, Xiaocong Chen, Shengxian Cao, Bo Zhao, Zhenhao Tang, Gong Wang, Xingyu Li, Han Gao

    Published 2025-04-01
    “…Wind turbine generators operate in harsh areas for a long time, resulting in frequent problems such as blade breakage, and traditional blade defect detection methods have low detection accuracy. …”
    Get full text
    Article
  18. 198

    High resolution remote sensing image object detection algorithm based on improved YOLOv8 by ZHANG Xia, QIAO Huanyu, CAO Feng

    Published 2025-01-01
    “…In view of problems such as objects are interfered by complex background, objects are small and densely distributed, objects are multi-scale and their directions are random in high resolution remote sensing image data, an object detection algorithm for high resolution remote sensing image based on improved YOLOv8 was proposed. …”
    Get full text
    Article
  19. 199

    Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm by Hassan Ghaedi, Seyed Reza Kamel Tabbakh, Reza Ghaemi

    Published 2022-12-01
    “…Meta-heuristic-based search methods are suitable for solving these problems. Therefore, the main contribution of this paper is to use the high ability of the cheetah optimization algorithm (CHOA) to optimally extract CNN hyper-parameters. …”
    Get full text
    Article
  20. 200

    Basketball robot object detection and distance measurement based on ROS and IBN-YOLOv5s algorithms. by Jirong Zeng, Jingjing Fu

    Published 2024-01-01
    “…In the software layer of the object detection system, an algorithm that combines YOLOv5s and laser detection was used, and an appropriate instance batch normalization network module was introduced in the YOLOv5s algorithm to improve the model's generalization ability. …”
    Get full text
    Article