-
1
An Efficient Technique for Compressing ECG Signals Using QRS Detection, Estimation, and 2D DWT Coefficients Thresholding
Published 2012-01-01“…This paper presents an efficient electrocardiogram (ECG) signals compression technique based on QRS detection, estimation, and 2D DWT coefficients thresholding. …”
Get full text
Article -
2
IMPROVING EFFICIENCY OF THE JET PUMP AT LOW COEFFICIENTS OF EJECTION
Published 2015-06-01“…Their main disadvantage is low operating efficiency which aggravates when the jet pump is working with a low ejection coefficient. …”
Get full text
Article -
3
Optimizing Gammatone Cepstral Coefficients for Gear Fault Detection
Published 2025-01-01“…Cepstral features, such as Gammatone Cepstral Coefficients (GTCC), have recently been applied in fault detection and diagnosis. …”
Get full text
Article -
4
Signal Detection by Sensors and Determination of Friction Coefficient During Brake Lining Movement
Published 2024-12-01“…This article presents a laboratory device by which the course of two signals can be detected using two types of sensors—strain gauges and the DEWESoft DS-NET measuring apparatus. …”
Get full text
Article -
5
Enhancing practicality and efficiency of deepfake detection
Published 2024-12-01Get full text
Article -
6
Abnormal Power Fluctuation Detection of Wind Turbines Based on Subband Processing and Correlation Coefficient
Published 2024-04-01“…Wind turbine power signals are nonlinear and non-stationary signals, and their abnormal fluctuation Frequencies are uncertain, which makes it difficult to extract and detect abnormal power fluctuation features. This paper proposes a method for detecting abnormal power fluctuations of wind turbine based on subband processing and correlation coefficient. …”
Get full text
Article -
7
Mutual clustering coefficient-based suspicious-link detection approach for online social networks
Published 2022-02-01“…In this paper, a classification system based on mutual clustering coefficient and profile information of users has been presented to detect the suspicious links within the user communities. …”
Get full text
Article -
8
DETERMINATION OF PRIMERS EFFICIENCY IN THE DETECTION OF PEDIOCOCCUS IN WINES
Published 2021-09-01“…As a result, primer sets for the Real time-PCR were designed to allow for correct and efficient detection of Pediococcus spp., and experimentally tested.…”
Get full text
Article -
9
An Efficient Anomalous Sound Detection System for Microcontrollers
Published 2024-11-01“…Anomalous Sound Detection (ASD) systems are pivotal in the Industrial Internet of Things (IIoT). …”
Get full text
Article -
10
-
11
Efficient attack detection and data aggregation algorithm
Published 2012-09-01“…An efficient algorithm of attack detection and data aggregation for wireless multimedia sensor networks based on the previous work was proposed.The proposed algorithm concludes the action trait of sensor nodes from their attribute vectors without any prior knowledge,at the same time;it was scalable and could be applied in large scale net-works.The simulation results show that the proposed algorithm can detect the attacks action more accurate than other technologies,and can make data aggregation efficiently.At the same time,the proposed algorithm can make the wireless multimedia sensor networks secure and reduce communication flow so that it will save a lot of resources in wireless mul-timedia sensor networks.…”
Get full text
Article -
12
Selecting change image for efficient change detection
Published 2022-05-01Subjects: Get full text
Article -
13
Efficient Feature Selection On Adversarial Botnet Detection
Published 2023-10-01Get full text
Article -
14
Anomaly detection and confidence interval‐based replacement in decay state coefficient of ship power system
Published 2024-12-01Subjects: “…anomaly trend detection and prediction…”
Get full text
Article -
15
A playback speech detection algorithm based on log inverse Mel-frequency spectral coefficient
Published 2018-05-01“…The popularity and portability of high-fidelity audio recording equipment and playback equipment poses a serious challenge for speaker recognition systems against playback attacks.Based on the differences between the original speech and the playback speech in high frequency region,the algorithm reversed the Mel-filter bank in Mel-frequency cepstral coefficient (MFCC) calculation,and the coefficients before the DCT were used as the features of the algorithm.SVM was utilized as the classifier.Experimental results show that this algorithm can effectively detect the playback speech.In addition,the algorithm is integrated into the GMM-UBM speaker recognition system,which significantly improves the systems’ capability of resisting the playback attack.…”
Get full text
Article -
16
Feasibility of EfficientDet-D3 for Accurate and Efficient Void Detection in GPR Images
Published 2025-06-01Subjects: “…EfficientDet-D3…”
Get full text
Article -
17
Enhanced YOLOv8 with lightweight and efficient detection head for for detecting rice leaf diseases
Published 2025-07-01“…Moreover, their high computational demands hinder deployment on resource-constrained devices, necessitating further optimization.To overcome these issues, This paper presents G-YOLO, a novel architecture that combines a Lightweight and Efficient Detection Head (LEDH) with Multi-scale Spatial Pyramid Pooling Fast (MSPPF). …”
Get full text
Article -
18
Early Detection of Failing Lead-Acid Automotive Batteries Using the Detrended Cross-Correlation Analysis Coefficient
Published 2025-02-01“…The proposed method employs the Detrended Cross-Correlation Analysis Coefficient for end-of-life detection by analyzing the cross-correlation of voltage signals from batteries in different states of health. …”
Get full text
Article -
19
Detection of Copy-Move Image Forgery Using Local Binary Pattern from Detailed Wavelet Coefficient
Published 2022-02-01Get full text
Article -
20
Efficient detection and counting method for maize seedling plots
Published 2025-08-01“…To efficiently detect and count maize seedlings in complex field conditions, this study first developed a sample dataset under diverse backgrounds and lighting scenarios and introduced a data augmentation technique called “M_AUG.” …”
Get full text
Article