Showing 1,921 - 1,940 results of 2,002 for search 'algorithm detection problem', query time: 0.13s Refine Results
  1. 1921

    Feasibility of estimating the percentage of desert pavement using Tasseled Cap Transformation indices extracted from Landsat 8 images by farzaneh Fotouhi Firoozabad, Atefeh jebali

    Published 2024-08-01
    “…The principal component analysis algorithm in the factor analysis method detected the selected indicators of Greenness and Brightness by analyzing the input data output. …”
    Get full text
    Article
  2. 1922

    Unlocking the bottleneck in forward genetics using whole-genome sequencing and identity by descent to isolate causative mutations. by Katherine R Bull, Andrew J Rimmer, Owen M Siggs, Lisa A Miosge, Carla M Roots, Anselm Enders, Edward M Bertram, Tanya L Crockford, Belinda Whittle, Paul K Potter, Michelle M Simon, Ann-Marie Mallon, Steve D M Brown, Bruce Beutler, Christopher C Goodnow, Gerton Lunter, Richard J Cornall

    Published 2013-01-01
    “…Here we show how these problems can be efficiently overcome using whole-genome sequencing (WGS) to detect the ENU mutations and then identify regions that are identical by descent (IBD) in multiple affected mice. …”
    Get full text
    Article
  3. 1923

    A New Signal Processing Method for Time-of-Flight and Center Frequency Estimation by Olgirdas Tumšys

    Published 2025-05-01
    “…There are many and various methods used to determine ToF, such as threshold detection, peak-based methods, cross-correlation, zero-crossing tracking algorithms, etc. …”
    Get full text
    Article
  4. 1924

    Analog Circuits Fault Diagnosis Using ISM Technique and a GA-SVM Classifier Approach by Sabah Kouachi, Nacerdine Bourouba, Kamel Mebarkia, Imad Laidani

    Published 2024-12-01
    “… This present work aims to contribute to the solution of the problems encountered in electronic circuits fault diagnosis. …”
    Get full text
    Article
  5. 1925

    Data traceability mechanism based on consortium chain by Shoucai ZHAO, Lifeng CAO, Xuehui DU

    Published 2023-10-01
    “…With the unprecedented growth in the speed of data generation and circulation in the era of big data, the emergence of blockchain technology provides a new solution for data authenticity verification.However, with the increasing demand for data flow between different blockchains, new security issues arise.Cross-chain data transmission can lead to data leakage, and detecting data leakage caused by illegal access becomes challenging.To address these problems, a data traceability mechanism based on a consortium chain was proposed.A cross-blockchain data traceability model was designed, incorporating private data pipelines to ensure the security of cross-chain data transmission.User behaviors were recorded through authorization and access logs, ensuring the traceability of illegal unauthorized access.To improve the efficiency of data traceability and query, an on-chain and off-chain synchronous storage mechanism was adopted.The state of data flow before each transaction was encrypted and stored in the database, and its index was stored in the blockchain transaction.This enables a one-to-one correspondence between on-chain and off-chain data.Additionally, Merkle trees were introduced into the block body to store block summaries, enhancing the efficiency of block legitimacy verification.Based on the data storage form and cross-chain data interaction mechanism, a data traceability algorithm was designed.The traceability results were displayed in the form of an ordered tree.An experimental environment for consortium chain traceability was built using fabric, targeting the cross-domain data traceability scenario in the e-commerce industry.The GO language was used to simulate and test the data traceability performance with a large number of blocks and transactions.The results demonstrate that with the increasing number of blocks and transactions, the proposed data traceability mechanism maintains satisfactory performance.…”
    Get full text
    Article
  6. 1926

    3D Human Motion Capture Method Based on Computer Vision by A. D. Obukhov, D. L. Dedov, E. O. Surkova, I. L. Korobova

    Published 2023-09-01
    “…Therefore, the research objective is to increase the accuracy of determining the coordinates of the human body in three-dimensional  coordinates  through  developing  a  motion  capture  method  based  on  computer  vision  and  triangulation algorithms.Materials and Methods.  A  method  of  motion  capture  was  presented,  including  calibration  of  several  cameras  and formalization of procedures for detecting a person in a frame using a convolutional neural network. …”
    Get full text
    Article
  7. 1927

    Machine Learning Techniques for Kinship Verification: A Review by Olivia Oraha, Yusra Mohammad

    Published 2025-06-01
    “…Since the verifying of a kinship is the most challenging problem for many applications, where become beneficial in many fields such as investigation cases of missing people through war and natural disasters, biometric security and more. …”
    Get full text
    Article
  8. 1928

    Dual-verified secure localization method for unmanned intelligent vehicles by GU Xiaodan, XIA Guozheng, SONG Bingchen, YANG Ming, LUO Junzhou

    Published 2024-06-01
    “…Once an abnormal position was detected, an alert would be issued, ensuring the normal operation of the unmanned intelligent vehicles. …”
    Get full text
    Article
  9. 1929

    System architecture and key technologies of intelligent, safe and efficient mining for rockburst coal seams by Zhigang DENG, Yunpeng LI, Shankun ZHAO, Yin WANG, Shaogang LI, Linghai KONG, Junjun JIANG, Zhenguo SU, Yizhe LI, Kai QIN

    Published 2024-12-01
    “…First of all, digital twin technology is used to build a fine digital model, deeply detect and analyze the geological structure of the area where the mine is located, accurately measure the characteristics of the regional geostress field and the physical and mechanical properties of coal and rock, and rely on advanced algorithms to carry out engineering distribution of formation change information to achieve “transparency” of geological information. …”
    Get full text
    Article
  10. 1930

    Nuevos modelos para la Caracterización, Detección y Diagnóstico de Fallas en Máquinas Eléctricas Rotativas by Jair Elías Araujo Vargas, Dilan Yesid Franklin Coronel, Victor Manuel Arias Ruiz

    Published 2023-07-01
    “…Physical methods and vibration analysis are currently used to detect problems, although these approaches present limitations in both accuracy and efficiency due to the subjectivity of each case and the loss of information in each case. …”
    Get full text
    Article
  11. 1931

    Experimental Assessment of Linear Sampling and Factorization Methods for Microwave Imaging of Concealed Targets by M. N. Akıncı, T. Çağlayan, S. Özgür, U. Alkaşı, M. Abbak, M. Çayören

    Published 2015-01-01
    “…Accuracy and stability of the obtained results show that both the linear sampling and the factorization methods can be quite useful for various buried obstacle imaging problems.…”
    Get full text
    Article
  12. 1932

    Artificial Intelligence for Financial Accountability and Governance in the Public Sector: Strategic Opportunities and Challenges by Ceray Aldemir, Tuğba Uçma Uysal

    Published 2025-02-01
    “…However, challenges such as algorithmic bias, data privacy issues, and the need for strong ethical guidelines still exist, and these could hinder the equitable use of AI. …”
    Get full text
    Article
  13. 1933

    Establishment of an IoT-based smart factory and data analysis model for the quality management of SMEs die-casting companies in Korea by Sangwoo Park, Kim Changgyun, Sekyoung Youm

    Published 2019-10-01
    “…It is expected that a method of systematic implementation will be provided to die-casting companies that want to build smart factories in the future and that a plan for managing casting parameter by-product will be established. In addition, algorithms that can solve the problem of multi-collinearity among the casting parameters and aid in the development of new products are needed to detect optimum casting parameters.…”
    Get full text
    Article
  14. 1934

    Aircraft Sensor Fault Diagnosis Based on GraphSage and Attention Mechanism by Zhongzhi Li, Jinyi Ma, Rong Fan, Yunmei Zhao, Jianliang Ai, Yiqun Dong

    Published 2025-01-01
    “…Experiments demonstrate that the proposed method outperforms baseline approaches, achieving better detection performance and faster computational speed. …”
    Get full text
    Article
  15. 1935

    Deep Learning-Based Pulmonary Nodule Screening: A Narrative Review by Abhishek Mahajan, Ujjwal Agarwal, Rajat Agrawal, Aditi Venkatesh, Shreya Shukla, K S. S. Bharadwaj, M L. V. Apparao, Vivek Pawar, Vivek Poonia

    Published 2025-06-01
    “…Given its capacity to generate three-dimensional pictures, computed tomography is the most effective means of detecting lung nodules with more excellent resolution of detected nodules. …”
    Get full text
    Article
  16. 1936

    Proactive Complaint Management in Public Sector Informatics Using AI: A Semantic Pattern Recognition Framework by Marco Esperança, Diogo Freitas, Pedro V. Paixão, Tomás A. Marcos, Rafael A. Martins, João C. Ferreira

    Published 2025-06-01
    “…Leveraging real-world interaction logs from a public sector agency, the system harmonizes heterogeneous complaint narratives, uncovers latent issue patterns, and enables early detection of technical and usability problems. The approach is deployed through a real-time dashboard, transforming complaint handling from a reactive to a proactive process. …”
    Get full text
    Article
  17. 1937

    Insights and caveats from mining local and global temporal motifs in cryptocurrency transaction networks by Naomi A. Arnold, Peijie Zhong, Cheick Tidiane Ba, Ben Steer, Raul Mondragon, Felix Cuadrado, Renaud Lambiotte, Richard G. Clegg

    Published 2024-11-01
    “…This allows research into problems like anomaly detection, anti-money laundering, pattern mining and activity clustering (where data from traditional currencies is rarely available). …”
    Get full text
    Article
  18. 1938

    Explainability Feature Bands Adaptive Selection for Hyperspectral Image Classification by Jirui Liu, Jinhui Lan, Yiliang Zeng, Wei Luo, Zhixuan Zhuang, Jinlin Zou

    Published 2025-05-01
    “…Hyperspectral remote sensing images are widely used in resource exploration, urban planning, natural disaster assessment, and feature classification. Aiming at the problems of poor interpretability of feature classification algorithms for hyperspectral images, multiple feature dimensions, and difficulty in effectively improving classification accuracy, this paper proposes a feature band adaptive selection method for hyperspectral images. …”
    Get full text
    Article
  19. 1939

    An Efficient and Fast Model Reduced Kernel KNN for Human Activity Recognition by Zongying Liu, Shaoxi Li, Jiangling Hao, Jingfeng Hu, Mingyang Pan

    Published 2021-01-01
    “…Many classic machine learning algorithms, such as artificial neural network, feed forward neural network, K-nearest neighbors, and support vector machine, achieve good performance for detecting human activity. …”
    Get full text
    Article
  20. 1940

    Peran Artificial Intelligence terhadap Praktik Greenwashing dalam Sustainability Report: Systematic Literature Review by Abim Wafirli, Provita Wijayanti, Lisa Kartikasari, Muhammad Ja'far Shodiq

    Published 2025-06-01
    “…Although AI is promising, challenges remain, such as algorithm ethics and infrastructure readiness.…”
    Get full text
    Article