Showing 1,321 - 1,340 results of 2,002 for search 'algorithm detection problem', query time: 0.14s Refine Results
  1. 1321

    Operational determination of the point of a short circuit in power lines by K. V. Suslov, N. N. Solonina, Z. V. Solonina, A. R. Akhmetshin

    Published 2023-06-01
    “…Due to the subsequent comparison of the measured values of short-circuit currents with the values of the calculated values, the location of the damage to the power line is determined. The presented algorithm is designed to accurately determine thecoordinates of the short circuit location, which can significantly reduce the search time and improve the accuracy of determining the fault location in the range from 100 to 150 m, regardless of the length of the power line, which significantly reduces the time to search for damage at the same time as solving the problem of reducing downtime , as well as minimizing damage both for guaranteeing suppliers represented by electric grid companies, and for consumers represented by industrial and agricultural enterprises.…”
    Get full text
    Article
  2. 1322

    On Finding a Threshold of Useful Signals in the Analysis of Magnetic and Eddy Current Defectograms by Egor V. Kuzmin, Oleg E. Gorbunov, Petr O. Plotnikov, Vadim A. Tyukin

    Published 2017-12-01
    “…To ensure traffic safety of railway transport, non-destructive testing of rails is regularly carried out by using various approaches and methods, including magnetic and eddy current flaw detection methods. The paper is devoted to the problem of automatic determination of a threshold level of amplitudes of useful signals (from defects and structural elements of a railway track) during the analysis of defectograms (records) of magnetic and eddy current flaw detectors. …”
    Get full text
    Article
  3. 1323
  4. 1324

    Smart city planning focused on the US cities in need of policing innovations and public health safety technologies and strategies by Delores Springs

    Published 2024-03-01
    “…In particular, the article proposes the following for implementation: identifying crime hotspots by means of advanced geographic information systems, applying machine learning algorithms to predict future crime trends, using advanced real-time surveillance technologies and firearms detection systems, applying geospatial analysis to optimise patrol routes, dynamically adjusting patrol routes depending on real-time data analytics, deploying mobile command centres. …”
    Get full text
    Article
  5. 1325

    Research on the security audit model in intrusion prevention based on write-related support vector data description by LUO Jun, PAN Zhi-song, MIAO Zhi-min, HU Gu-yu

    Published 2007-01-01
    “…The security audit model based on write-related SVDD was designed to resolve the one-class problem.Once the classifier has been trained using the write-related subset,all activities deviated from the normal patterns are classified as potential intrusion.The proposed one-class classification algorithms can be implemented to build up an anomaly detection system by using only normal samples and the algorithms also makes the security audit system detect the new anomaly behaviors.In the experiments,the One-class classifier acquires nearly 100% detection rate and average zero false alarm rate for sequences of system calls based on a small training dataset.…”
    Get full text
    Article
  6. 1326

    Improving the Accuracy of Neural Network Pattern Recognition by Fractional Gradient Descent by Ruslan I. Abdulkadirov, Pavel A. Lyakhov, Valentina A. Baboshina, Nikolay N. Nagornov

    Published 2024-01-01
    “…Utilizing the proposed optimization algorithm in a linear neural network and a visual transformer lets us attain higher accuracy, precision, recall, Macro F1 score by 1.8-4 percentage points than known analogs than state-of-the-art methods in solving pattern recognition problems on images from MNIST and CIFAR10 datasets. …”
    Get full text
    Article
  7. 1327

    Discrete Phase Shift IRS-Assisted Energy Harvesting in Cognitive Radio Networks With Spectrum Sensing by Lilian Chiru Kawala, Guoquan Li, Mihertie Habtamu Demeke, Junzhou Xiong, Hao Xiong, Hang Hu

    Published 2025-01-01
    “…To solve the non-convex problem, we develop a quantization-aware alternating optimization algorithm that decomposes the problem into interrelated subproblems for detection probability maximization, false alarm minimization, energy harvesting optimization, and SU throughput enhancement. …”
    Get full text
    Article
  8. 1328

    Improved method of non-intrusive load monitoring based on compressed sensing by Bo Yuan, Hong Liu, Shaoyun Ge, Guoping Liu

    Published 2025-09-01
    “…Compressed Sensing (CS) has become one of the way to solve the problem of massive monitoring data in smart grid due to its characteristics of low-frequency sampling and simple compression. …”
    Get full text
    Article
  9. 1329

    Passive forensic based on spatio-temporal localization of video object removal tampering by Linqiang CHEN, Quanxin YANG, Lifeng YUAN, Ye YAO, Zhen ZHANG, Guohua WU

    Published 2020-07-01
    “…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
    Get full text
    Article
  10. 1330

    On the resonances of an inhomogeneous dielectric ball, coated with graphene by O.S. Skvortsov

    Published 2025-03-01
    “…The effectiveness of the parallel algorithm, which makes it possible to detect the desired resonances under specified conditions, has been confirmed. …”
    Article
  11. 1331

    An Automatic Method for Powerline Extraction From ALS Point Cloud of Powerline Corridors by Di Cao, Cheng Wang, Haibo Liu, Su Zhang, Meng Du, Pu Wang, Sheng Nie, Sijin Cheng

    Published 2025-01-01
    “…A robust segmentation technique is then introduced, transforming the task into a connected component identification problem within a mesh generated using the 3-D Alpha Wrapping algorithm to effectively separate powerlines from other objects. …”
    Get full text
    Article
  12. 1332
  13. 1333
  14. 1334

    Research status and prospect of UWB radar echo signal processing technology for mine rescue by Xuezhao ZHENG, Chaoyang SUN, Yuan HUANG, Wen DING, Yang MA, Qiang LI, Haowei MOU

    Published 2025-07-01
    “…In view of the existing problems, the future development trend of UWB radar life information detection echo signal processing technology is proposed: the mine clutter model is constructed and the real-time adaptive filtering algorithm is studied. …”
    Get full text
    Article
  15. 1335

    A Biologically Inspired Trust Model for Open Multi-Agent Systems That Is Resilient to Rapid Performance Fluctuations by Zoi Lygizou, Dimitris Kalles

    Published 2025-05-01
    “…This study proposes a novel algorithm, incorporating a self-classification mechanism for providers to detect performance drops that are potentially harmful for service consumers. …”
    Get full text
    Article
  16. 1336

    Development of an In-Line Vision-Based Measurement System for Shape and Size Calculation of Cross-Cutting Boards—Straightening Process Case by Shitao Ge, Wei Zhang, Licheng Han, Yan Peng, Jianliang Sun

    Published 2025-05-01
    “…In the production process of cross-cutting boards, real-time measurement of dimensions online has been a long-standing technical problem in the production field. Currently, the detection of board dimensions in the production field relies on manual observation based on workers’ operational experience or stopping the machine for measurement. …”
    Get full text
    Article
  17. 1337

    Ramp winch locking system based on multi-channel image processing by Lei YOU, Yiwen LI, Haifeng ZHANG, Xiaoyu YANG, Minghua LUO

    Published 2025-05-01
    “…The algorithms are categorized into object detection, tracking and occlusion detection. …”
    Get full text
    Article
  18. 1338

    Enhanced Blind Separation of Rail Defect Signals with Time–Frequency Separation Neural Network and Smoothed Pseudo Wigner–Ville Distribution by Mingxiang Zhang, Kangwei Wang, Yule Yang, Yaojia Cao, Yong You

    Published 2025-03-01
    “…Simulation and experiments showed that compared with traditional algorithms like independent component analysis, shallow neural networks, and time–frequency blind source separation, the proposed algorithm can provide better separation performance and higher stability in rail crack detection.…”
    Get full text
    Article
  19. 1339

    Research on rolling bearing compound fault diagnosis based on AMOMCKD and convolutional neural network by Runfang Hao, Yunpeng Bai, Kun Yang, Yongqiang Cheng, Shengjun Chang

    Published 2025-04-01
    “…Firstly, the key parameters of MCKD are optimized using the adaptive Non-dominated Sorting Genetic Algorithm (NSGA-II) with a new multi-objective evaluation index Hyperarea (HA). …”
    Get full text
    Article
  20. 1340

    Accurate depth of anesthesia monitoring based on EEG signal complexity and frequency features by Tianning Li, Yi Huang, Peng Wen, Yan Li

    Published 2024-11-01
    “…A random forest regression model was employed to estimate anesthetic states, and an unsupervised learning method using the Hurst exponent algorithm and hierarchical clustering was introduced to detect transitions between anesthesia states. …”
    Get full text
    Article