Showing 961 - 980 results of 2,002 for search 'algorithm detection problem', query time: 0.22s Refine Results
  1. 961

    Enhancing Rare Class Performance in HOI Detection with Re-Splitting and a Fair Test Dataset by Gyubin Park, Afaque Manzoor Soomro

    Published 2025-06-01
    “…To overcome this problem, a Re-Splitting algorithm has been developed. …”
    Get full text
    Article
  2. 962

    Detection of the Pin Defects of Power Transmission Lines Based on Improved TPH-MobileNetv3 by Mengxuan Li, Jingshan Han, Zhi Yang, Bin Zhao, Peng Liu

    Published 2023-01-01
    “…Given the small size of a pin and many similar components, the detection of such defects is not ideal, which is a technological problem in the identification and diagnosis of power defects. …”
    Get full text
    Article
  3. 963

    EER-DETR: An Improved Method for Detecting Defects on the Surface of Solar Panels Based on RT-DETR by Jiajun Dun, Hai Yang, Shixin Yuan, Ying Tang

    Published 2025-05-01
    “…In response to the shortcomings of existing detection methods in identifying tiny defects and model efficiency, this study innovatively constructed the EER-DETR detection framework: firstly, a feature reconstruction module WDBB with a differentiable branch structure was introduced to significantly enhance the feature retention ability for fine cracks and other small targets; secondly, an adaptive feature pyramid network EHFPN was innovatively designed, which achieved efficient integration of multi-level features through a dynamic weight allocation mechanism, reducing the model complexity by 9.7% while maintaining detection accuracy, solving the industry problem of “precision—efficiency imbalance” in traditional feature pyramid networks; finally, an enhanced upsampling component was introduced to effectively address the problem of detail loss that occurs in traditional methods during image resolution enhancement. …”
    Get full text
    Article
  4. 964
  5. 965

    Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering by Chunhua Ren, Changyuan Wang, Yang Yu, Wanan Yang, Ruiqi Guo

    Published 2025-07-01
    “…The application of traditional clustering algorithms in intrusion detection usually relies on a preset number of clusters. …”
    Get full text
    Article
  6. 966

    GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection by Haifeng Zhang, Han Ai, Donglin Xue, Zeyu He, Haoran Zhu, Delian Liu, Jianzhong Cao, Chao Mei

    Published 2025-06-01
    “…The problem of inadequate object detection accuracy in complex remote sensing scenarios has been identified as a primary concern. …”
    Get full text
    Article
  7. 967

    Secure performance analysis and detection of pilot attack in massive multiple-input multiple-output system by Xianyu Zhang, Daoxing Guo, Kefeng Guo, Hehao Niu

    Published 2018-05-01
    “…On account of the risk caused by active attack, a simple and effective detection algorithm is proposed. Uplink pilots with random phases are transmitted during the detection operation. …”
    Get full text
    Article
  8. 968

    Integration Research of Pantograph-Catenary Detection System for Intelligent Operation and Maintenance of Heavy-haul Locomotive by Jiejun LYU, Hongjun HE, Congjian JIANG

    Published 2021-07-01
    “…Improving the on-line detection level of pantograph-catenary system and evaluating its service status has become a key problem to be solved in the construction of intelligent operation and maintenance of heavy-haul locomotive. …”
    Get full text
    Article
  9. 969

    Discrete Dynamic Modeling Analysis of Engineering Management and Quality Optimization Innovation Mode Based on Big Data Intelligent Algorithm by Xiaowen Zhuang, Chuanbao Wu

    Published 2022-01-01
    “…The accurate data after big data analysis can be used for quality supervision and detection, which not only improves the project quality problems but also improves the management efficiency of the project.…”
    Get full text
    Article
  10. 970

    An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network by Qingfeng Li, Bo Li, Linzhi Wen

    Published 2023-01-01
    “…The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. …”
    Get full text
    Article
  11. 971

    A Review on Current Technologies and Future Direction of Water Leakage Detection in Water Distribution Network by Mohammed Rezwanul Islam, Sami Azam, Bharanidharan Shanmugam, Deepika Mathur

    Published 2022-01-01
    “…The third question was about the trend in the algorithm. ML and threshold-based algorithms are dominating the field. …”
    Get full text
    Article
  12. 972
  13. 973

    A novel similarity-constrained feature selection method for epilepsy detection via EEG signals by Chunlei Shi, Jun Gao, Jian Yu, Lingzhi Zhao, Faxian Jia

    Published 2025-07-01
    “…Finally, a heuristic search strategy-based algorithm is designed to select features for epileptic EEG signals. …”
    Get full text
    Article
  14. 974

    Edge-Guided Feature Pyramid Networks: An Edge-Guided Model for Enhanced Small Target Detection by Zimeng Liang, Hua Shen

    Published 2024-12-01
    “…We conducted comparative experiments on multiple datasets using the proposed algorithm and existing advanced methods. The results show improvements in the IoU, nIoU, and F1 metrics, while also showcasing the lightweight nature of EG-FPNs, confirming that they are more suitable for drone detection in resource-constrained infrared scenarios.…”
    Get full text
    Article
  15. 975

    A visual SLAM loop closure detection method based on lightweight siamese capsule network by Yuhan Zhou, Mingli Sun

    Published 2025-03-01
    “…Therefore, aiming at the problems of traditional methods, this paper proposes an algorithm based on the Siamese capsule neural network by using the deep learning method. …”
    Get full text
    Article
  16. 976

    Deep learning-based framework for Mycobacterium tuberculosis bacterial growth detection for antimicrobial susceptibility testing by Hoang-Anh T. Vo, Sang Nguyen, Ai-Quynh T. Tran, Han Nguyen, Hai Bich Ho, Philip W. Fowler, Timothy M. Walker, Thuy Thi Nguyen

    Published 2025-01-01
    “…Automated Mycobacterial Growth Detection Algorithm (AMyGDA) is a software package that uses image processing techniques to read plates, but struggles with plates that exhibit low growth or images of low quality. …”
    Get full text
    Article
  17. 977

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article
  18. 978

    A quality of system routing based on neighborhood interference detection and mitigation in wireless sensor network by Ling Zhang, Ziyun Ni

    Published 2020-10-01
    “…Aiming at solving these problems, this article proposes a quality of system routing method based on neighborhood interference detection and mitigation. …”
    Get full text
    Article
  19. 979
  20. 980

    A novel model for higher performance object detection with deep channel attention super resolution by Ayse Berika Varol Malkocoglu, Ruya Samli

    Published 2025-04-01
    “…By using the data in the training of the You Only Look Once (YOLO) model of YOLOv5, it was ensured that the model successfully detected the object. In order to increase the object detection success and observe the results, popular Super Resolution (SR) algorithms and the Deep Channel Attention Super Resolution (DCASR) algorithm developed by us were integrated into the structure and the effect of SR algorithms on object detection was observed. …”
    Get full text
    Article