Showing 541 - 560 results of 2,002 for search 'algorithm detection problem', query time: 0.17s Refine Results
  1. 541
  2. 542
  3. 543
  4. 544
  5. 545
  6. 546

    Detection of Dashboard in Fuzzy Image by Correction Force Snake Model by YU Shu-chun, DONG Jing-yi

    Published 2018-04-01
    “…In order to solve the problem that the accuracy of the dashboard detection in fuzzy images is not high,an improved Snake model based on the correction force is proposed. …”
    Get full text
    Article
  7. 547

    PUE Attack Detection in CWSN Using Collaboration and Learning Behavior by Javier Blesa, Elena Romero, Alba Rozas, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of networks manage critical applications and data. …”
    Get full text
    Article
  8. 548

    A Method for Detecting Tomato Maturity Based on Deep Learning by Song Wang, Jianxia Xiang, Daqing Chen, Cong Zhang

    Published 2024-11-01
    “…Therefore, in this study, an improved YOLOv8 algorithm is proposed to address the problem of tomato fruit ripeness detection in complex scenarios, which is difficult to carry out accurately. …”
    Get full text
    Article
  9. 549

    Bankline extraction in remote sensing images using principal curves by Yun GUO, Yi-huai WANG, Chun-ping LIU, Sheng-rong GONG, Yi JI

    Published 2016-11-01
    “…In the learning process, the polygonal line (PL) algorithm and the error back propagation (BP) algorithm were combined. …”
    Get full text
    Article
  10. 550

    An anomaly detection scheme for data stream in cold chain logistics. by Zhibo Xie, Heng Long, Chengyi Ling, Yingjun Zhou, Yan Luo

    Published 2025-01-01
    “…But, because of the high cost and technical problem, the anomaly detection performance is poor, and the anomaly can not be detected in time, which affects the quality of goods. …”
    Get full text
    Article
  11. 551

    Study on the Lightweighting Strategy of Target Detection Model with Deep Learning by Junli Hu

    Published 2022-01-01
    “…Aiming at the high miss detection and false detection rate of traditional SSD (single shot multibox detector) target detection algorithm in target detection, this paper proposes a lightweight detection algorithm for deep learning target detection model in order to improve the detection accuracy. …”
    Get full text
    Article
  12. 552

    BLSTM based night-time wildfire detection from video. by Ahmet K Agirman, Kasim Tasdemir

    Published 2022-01-01
    “…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
    Get full text
    Article
  13. 553

    Aviation Rivet Classification and Anomaly Detection Based on Deep Learning by Xiao-bo Zhu

    Published 2023-01-01
    “…And a method of aviation rivet classification and anomaly detection based on deep learning algorithm was proposed. …”
    Get full text
    Article
  14. 554
  15. 555

    Spammer group detection based on cascading and clustering of core figures by Qianqian Jiang, Chunrong Zhang, Ning Li, Dickson K. W. Chiu, Xianwen Fang, Shujuan Ji

    Published 2025-07-01
    “…Abstract The problem of collaborative spamming in e-commerce is gradually increasing, and traditional spammer group detection algorithms usually seem cumbersome and time-consuming when dealing with massive user review data. …”
    Get full text
    Article
  16. 556

    On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code by Yury V. Kosolapov

    Published 2020-06-01
    “…It is assumed that taking into account the distances between function calls will reveal shell code execution using system and / or library function calls. An algorithm and a system for detecting abnormal code execution are proposed. …”
    Get full text
    Article
  17. 557

    Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting by LIANG Zhiru, BIAN Dongming, ZHANG Gengxin

    Published 2024-12-01
    “…The problem of spread code identification is transferred into a peak detection classification problem. …”
    Get full text
    Article
  18. 558

    Machine Learning- and Deep Learning-Based Multi-Model System for Hate Speech Detection on Facebook by Amna Naseeb, Muhammad Zain, Nisar Hussain, Amna Qasim, Fiaz Ahmad, Grigori Sidorov, Alexander Gelbukh

    Published 2025-06-01
    “…This study seeks to minimize this problem by developing an Arabic script-based tool for automatically detecting hate speech in Roman Urdu, an informal script used most commonly for South Asian digital communications. …”
    Get full text
    Article
  19. 559

    A similarity-based multi-objective test optimization technique using search algorithm by Amir Sohail Habib, Saif Ur Rehman Khan, Shahid Hussain, Naseem Ibrahim, Habib un Nisa, Abdullah Yousafzai

    Published 2024-12-01
    “…Hence, it is required to optimize the test suite by finding a diverse subset of test cases having high code coverage, fault-detection rate, and minimal execution time. Objective:: To solve the regression test optimization problem, the researchers have proposed various approaches including greedy algorithms, search-based algorithms, and clustering algorithms. …”
    Get full text
    Article
  20. 560

    Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction by Haifei SI, Xingliu HU, Zhen SHI, Shiyong LI

    Published 2020-07-01
    “…Aiming at the problem that in the current electromagnetic environment,the modulation method is complicated,the frequency-consuming equipment increases,the spectrum is congested,and the electromagnetic environment interference increases,the algorithm of OFDM signal detection and subcarrier identification in the background of non-cooperative communication were deeply studied.Using the different distribution states of OFDM signals and single carrier signals in the time domain,a joint characteristic parameter was proposed to solve the existence problem of OFDM in the received signal.For the phase shift and frequency offset problems caused by the channel transmission to the signal,by using the periodic stability the blind parameter estimation was performed to obtain the signal prior information.On the basis of the obtained signal prior information,a multi-level classification and recognition method for non-cooperative OFDM signal sub-carrier signals was proposed.Therefore,a model based on non-cooperative communication system OFDM signal detection and subcarrier modulation identification was designed,and finally modulation identification of unknown signals was completed.Simulation experiments show that in non-cooperative communication systems,OFDM signals and single-carrier signals can be accurately identified,and ideal modulation recognition effects can be achieved on empty subcarriers,QPSK,and 16QAM in the receiver OFDM signal subcarriers,overcoming the channel transmission band The problems of phase shift and frequency offset have improved the accuracy of modulation mode identification.…”
    Get full text
    Article