Showing 1,041 - 1,060 results of 2,002 for search 'algorithm detection problem', query time: 0.13s Refine Results
  1. 1041

    Indoor High Precision Three-Dimensional Positioning System Based on Visible Light Communication Using Improved Hybrid Bat Algorithm by Yong Chen, Han Zheng, Huanlin Liu, Zhaozhong Han, Zhimiao Ren

    Published 2020-01-01
    “…To solve problems of low positioning accuracy and long time-consuming in indoor visible light three-dimensional positioning system, a visible light three-dimensional positioning method based on the improved hybrid bat algorithm (IHBA) is proposed in this paper. …”
    Get full text
    Article
  2. 1042

    Blockchain enabled deep learning model with modified coati optimization for sustainable healthcare disease detection and classification by Heba G. Mohamed, Fadwa Alrowais, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel

    Published 2025-07-01
    “…For the optimal subset of features, the spotted hyena optimization algorithm (SHOA) model is used. Furthermore, the attention bidirectional gated recurrent unit (ABiGRU) method is implemented for disease detection and classification. …”
    Get full text
    Article
  3. 1043

    Towards automatic farrowing monitoring-A Noisy Student approach for improving detection performance of newborn piglets. by Martin Wutke, Clara Lensches, Ulrich Hartmann, Imke Traulsen

    Published 2024-01-01
    “…Although object detection algorithms are increasingly being used in various scenarios in the field of livestock farming, their usability for detecting newborn piglets has so far been limited. …”
    Get full text
    Article
  4. 1044

    An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition by Wenyan Liu, Xiangyang Luo, Qing Mu, Yimin Liu, Fenlin Liu

    Published 2019-05-01
    “…The detection device is used at the detection location of the grids to measure the received signal strength, which is from the detection points to the target access point, the grid center point is used as the location of the candidate target access point, the parameters in the path loss model are calculated by using the signal strength differences between the detection points, and then the distances between the detection points and the target access point are calculated by using the signal strength values from the detection points to the target access point. …”
    Get full text
    Article
  5. 1045

    Enhancing Unmanned Aerial Vehicle Object Detection via Tensor Decompositions and Positive–Negative Momentum Optimizers by Ruslan Abdulkadirov, Pavel Lyakhov, Denis Butusov, Nikolay Nagornov, Dmitry Reznikov, Anatoly Bobrov, Diana Kalita

    Published 2025-03-01
    “…In this area, deep neural networks are used to solve routine object detection problems, satisfying the required rules and conditions. …”
    Get full text
    Article
  6. 1046

    A Comprehensive Survey on the Usage of Machine Learning to Detect False Data Injection Attacks in Smart Grids by Kiara Nand, Zhibo Zhang, Jiankun Hu

    Published 2025-01-01
    “…It introduces a novel taxonomy categorizing detection methods based on key criteria such as AC and DC systems, performance metrics, bus size, algorithm selection, and specific subcategories of detection problems. …”
    Get full text
    Article
  7. 1047

    Failure Detection of Laser Welding Seam for Electric Automotive Brake Joints Based on Image Feature Extraction by Diqing Fan, Chenjiang Yu, Ling Sha, Haifeng Zhang, Xintian Liu

    Published 2025-07-01
    “…Laser-welded automotive brake joints are subjected to weld defect detection and classification, and image processing algorithms are optimized to improve the accuracy of detection and failure analysis by utilizing the high efficiency, low cost, flexibility, and automation advantages of machine vision technology. …”
    Get full text
    Article
  8. 1048

    DFDA-AD: An Approach with Dual Feature Extraction Architecture and Dual Attention Mechanism for Image Anomaly Detection by Babak Masoudi

    Published 2024-12-01
    “…The complexity and variability of data distribution and the lack of labeled data are among the challenges of detecting anomalies in images. In recent years, deep learning methods have provided promising results for solving anomaly detection problems in any data types, especially in images. …”
    Get full text
    Article
  9. 1049

    Diabetes Mellitus Detection System In Human Body Through Urine Media Using Naïve Bayes Method by Yuda Kasmien Adha, Tati Erlina

    Published 2025-04-01
    “… In Indonesian the level of diabetes mellitus in the community is very high but public awareness is very low due to many of the people WHO are phobic about blood and needles. From the above problems obtained an alternative solution by using urine as a medium to detect diabetes mellitus in a person. …”
    Get full text
    Article
  10. 1050

    Multi-LiDAR-Based 3D Object Detection via Data-Level Fusion Method by Yu Luo, Tao Wang, Shuai Lu, Xuerui Dai, Zhi Li

    Published 2025-01-01
    “…Finally, to verify the effectiveness of our method, we propose the public dataset VANJEE Point Cloud, which is collected in the real world. Our algorithm has improved the global trajectory fusion rate from 91.7% to 95.6%. …”
    Get full text
    Article
  11. 1051

    An optimised scattering power decomposition method oriented to ship detection in polarimetric synthetic aperture radar imagery by Lu Fang, Wenxing Mu, Ning Wang, Tao Liu

    Published 2024-12-01
    “…Furthermore, pocket algorithm and support vector machine are adopted to solve linear non‐separable problems under complex experimental conditions in this study. …”
    Get full text
    Article
  12. 1052

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article
  13. 1053

    Passive Time-Division Multiplexing Fiber Optic Sensor for Magnetic Field Detection Applications in Current Introduction by Yong Liu, Junjun Xiong, Junchang Huang, Fubin Pang, Yi Zhao, Li Xia

    Published 2025-05-01
    “…This has led to issues of high cost, complex demodulation, and difficult maintenance, significantly hindering the further advancement of FOCTs. Addressing the problems of high cost and complex demodulation, this paper proposes a passive multiplexing structure that achieves time-domain multiplexing of pulsed sensing signals, designs a corresponding intensity demodulation algorithm, and applies this structure to FOCTs. …”
    Get full text
    Article
  14. 1054

    Image small target detection in complex traffic scenes based on Yolov8 multiscale feature fusion by Xuguang Chai, Meizhi Zhao, Jing Li, Junwu Li

    Published 2025-07-01
    “…Addressing the challenging issues in small target detection within complex traffic scenes, such as scale variation, complex background noise, and the problems of missed and false detections, this paper introduces a Multi-Scale Feature Fusion YOLOv8 (MSFF-YOLOv8) approach. …”
    Get full text
    Article
  15. 1055
  16. 1056

    Abnormal Sound Detection of Wind Turbine Gearboxes Based on Improved MobileFaceNet and Feature Fusion by Yuelong Liang, Haorui Liu, Yayu Chen

    Published 2024-12-01
    “…To solve problems such as the unstable detection performance of the sound anomaly detection of wind turbine gearboxes when only normal data are used for training, and the poor detection performance caused by the poor classification of samples with high similarity, this paper proposes a self-supervised wind turbine gearbox sound anomaly detection algorithm that fuses time-domain features and Mel spectrograms, improves the MobileFaceNet (MFN) model, and combines the Gaussian Mixture Model (GMM). …”
    Get full text
    Article
  17. 1057

    Organizational and technological level of major repairs of buildings and structures by Liya D. Mailyan, Nikolay O. Sizen

    Published 2025-03-01
    “…To achieve this goal the following tasks have been set: to identify problems arising in the field of organization and technology of major repairs; to detect the factors affecting the fulfillment of major repairs; to develop a formula for determining the quality of organizational and technological level in major repairs and to make proposals for its improvement.Materials and methods. …”
    Get full text
    Article
  18. 1058

    A deep learning model for fault detection in distribution networks with high penetration of electric vehicle chargers by Seyed Amir Hosseini, Behrooz Taheri, Seyed Hossein Hesamedin Sadeghi, Adel Nasiri

    Published 2024-12-01
    “…Integration of a significant number of domestic electrical vehicle (EV) charging stations into the power distribution infrastructure can give rise to several protection problems. Therefore, we propose a new method to detect short-circuit faults in distribution networks with high penetration of residential EV chargers. …”
    Get full text
    Article
  19. 1059

    Adaptive ensemble techniques leveraging BERT based models for multilingual hate speech detection in Korean and english by Seohyun Yoo, Eunbae Jeon, Joonseo Hyeon, Jaehyuk Cho

    Published 2025-06-01
    “…Abstract Online hate speech has become a major social problem owing to the rapid growth of Internet communities. …”
    Get full text
    Article
  20. 1060

    Network intrusion detection model using wrapper based feature selection and multi head attention transformers by Muhammad Umer, Muhammad Tahir, Muhammad Sardaraz, Muhammad Sharif, Hela Elmannai, Abeer D. Algarni

    Published 2025-08-01
    “…Many researchers have worked to address the problem of intrusion detection in networks. Machine learning and deep learning have also been used. …”
    Get full text
    Article