Showing 1,201 - 1,220 results of 2,002 for search 'algorithm detection problem', query time: 0.13s Refine Results
  1. 1201
  2. 1202

    Adaptive Step RRT*-Based Method for Path Planning of Tea-Picking Robotic Arm by Xin Li, Jingwen Yang, Xin Wang, Leiyang Fu, Shaowen Li

    Published 2024-12-01
    “…The Adaptive Step RRT* (AS-RRT*) path planning algorithm for tea-picking robotic arms was proposed as a solution to the autonomy, safety, and efficiency problems inherent to tea-picking robots in tea plantations. …”
    Get full text
    Article
  3. 1203
  4. 1204

    A Fault Diagnosis Method for Oil Well Electrical Power Diagrams Based on Multidimensional Clustering Performance Evaluation by Xingyu Liu, Xin Meng, Ze Hu, Hancong Duan, Min Wang, Yaping Chen

    Published 2025-03-01
    “…Additionally, we propose a new effectiveness evaluation method for the FCM clustering algorithm, integrating fuzzy membership degrees and the geometric structure of the dataset, overcoming the limitations of traditional clustering algorithms in terms of accuracy and the determination of the number of clusters. …”
    Get full text
    Article
  5. 1205
  6. 1206

    Mining behavior pattern of mobile malware with convolutional neural network by Xin ZHANG, Weizhong QIANG, Yueming WU, Deqing ZOU, Hai JIN

    Published 2020-12-01
    “…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
    Get full text
    Article
  7. 1207

    Design and Development of a Public AI Referee Assistance System Based on Harmony OS Platform by Jingjing Zhao, Chang Zhu, Bo Leng, Jiantao Qi

    Published 2025-03-01
    “…In this sense, one AI referee assistance system is a small-scale system developed under the guidance of computer vision theory and technology, using deep learning-based object detection algorithms and computer graphics-related knowledge. …”
    Get full text
    Article
  8. 1208

    Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG

    Published 2015-01-01
    “…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
    Get full text
    Article
  9. 1209

    Third Ventricle Width Measurements Based on YOLO and Localized Intensity Features by Xiao Zhou, Ao Wan, Xingang Mou, Hongling Gao, Zheng Xue

    Published 2025-01-01
    “…Firstly, to solve the problem of third ventricle detection in the complex background of TCS images, the YOLO-TV improvement model is proposed to improve the detection accuracy. …”
    Get full text
    Article
  10. 1210

    LUNGINFORMER: A Multiclass of lung pneumonia diseases detection based on chest X-ray image using contrast enhancement and hybridization inceptionresnet and transformer by Hanafi Hanafi

    Published 2025-05-01
    “…This process is both time-consuming and expensive. To address the problem, many researchers have employed deep learning algorithms to develop an automated detection system for pneumonia. …”
    Get full text
    Article
  11. 1211

    Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes by T. V. Zolotova, D. A. Volkova

    Published 2022-05-01
    “…The article analyzes Russian and foreign bibliography on the research problem. Consideration of machine learning methods for detecting and correcting outliers in time series is proposed. …”
    Get full text
    Article
  12. 1212

    Historical Blurry Video-Based Face Recognition by Lujun Zhai, Suxia Cui, Yonghui Wang, Song Wang, Jun Zhou, Greg Wilsbacher

    Published 2024-09-01
    “…Historical motion picture films often have poorer resolution than modern digital imagery, making face detection a more challenging task. To approach this problem, we first propose a trunk–branch concatenated multi-task cascaded convolutional neural network (TB-MTCNN), which efficiently extracts facial features from blurry historical films by combining the trunk with branch networks and employing various sizes of kernels to enrich the multi-scale receptive field. …”
    Get full text
    Article
  13. 1213

    Multi-Channel Fusion Decision-Making Online Detection Network for Surface Defects in Automotive Pipelines Based on Transfer Learning VGG16 Network by Jian Song, Yingzhong Tian, Xiang Wan

    Published 2024-12-01
    “…Although approaches for the online surface detection of automotive pipelines exist, low defect area rates, small-sample and long-tailed data, and the difficulty of detection due to the variable morphology of defects are three major problems faced when using such methods. …”
    Get full text
    Article
  14. 1214

    Comparative performance of YOLOv8, YOLOv9, YOLOv10, YOLOv11 and Faster R-CNN models for detection of multiple weed species by Akhilesh Sharma, Vipan Kumar, Louis Longchamps

    Published 2024-12-01
    “…These results suggest that the YOLO series algorithms have the potential for real-time deployment for weed species detection more accurately and faster than Faster R-CNN in agricultural fields.…”
    Get full text
    Article
  15. 1215
  16. 1216

    Effective Facial Expression Recognition System Using Artificial Intelligence Technique by Imad S. Yousif, Tarik A. Rashid, Ahmed S. Shamsaldin, Sabat A. Abdulhameed, Abdulhady Abas Abdullah

    Published 2024-12-01
    “…The research is an effort to mitigate the problems pertaining with conventional methods, like overfitting and generalization fault in order design FER model which has potential for performing much more accurately. …”
    Get full text
    Article
  17. 1217

    Research on Active Anti-collision Method of Unmanned Mine Truck Based on Predicted Trajectory by LI Cheng, ZHANG Qian, WANG Bin

    Published 2022-10-01
    “…Existing mine truck unmanned driving systems operating in complex mining areas have many potential safety hazards, such as problems with the planning trajectory of the dispatching system, failure to update the mining area operation map in time, and the loss of trajectories data between the ground and on-board system. …”
    Get full text
    Article
  18. 1218

    Unmasking social bots: how confident are we? by James Giroux, Gangani Ariyarathne, Alexander C. Nwala, Cristiano Fanelli

    Published 2025-03-01
    “…Despite the progress made in developing multiple sophisticated social bot detection algorithms and tools, bot detection remains a challenging, unsolved problem that is fraught with uncertainty due to the heterogeneity of bot behaviors, training data, and detection algorithms. …”
    Get full text
    Article
  19. 1219

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  20. 1220

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article