Showing 341 - 360 results of 4,166 for search 'features detection algorithms', query time: 0.16s Refine Results
  1. 341

    A Refined and Efficient CNN Algorithm for Remote Sensing Object Detection by Bingqi Liu, Peijun Mo, Shengzhe Wang, Yuyong Cui, Zhongjian Wu

    Published 2024-11-01
    “…Deep learning-based object-detection algorithms have proven effective in remote sensing image studies. …”
    Get full text
    Article
  2. 342

    University Media Content Detection and Classification Based on Information Fusion Algorithm by Shuntao Zhang, Qinglan Yu, Tianming Yang, Kai Peng

    Published 2022-01-01
    “…This essay mainly introduces the technology of university media content detection and classification based on information fusion algorithm and focuses on the application of university multimedia content detection, analysis, and understanding, to explore the image discrimination auxiliary attribute feature learning and content association prediction and classification. …”
    Get full text
    Article
  3. 343

    A Defect Detection Algorithm for Optoelectronic Detectors Utilizing GLV-YOLO by Xinfang Zhao, Qinghua Lyu, Hui Zeng, Zhuoyi Ling, Zhongsheng Zhai, Hui Lyu, Saffa Riffat, Benyuan Chen, Wanting Wang

    Published 2025-02-01
    “…To meet the demands of real-time and accurate defect detection, this paper introduces an optimization algorithm based on the GLV-YOLO model tailored for photodetector defect detection in manufacturing settings. …”
    Get full text
    Article
  4. 344
  5. 345
  6. 346
  7. 347

    PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels by Wang Yin, Zhao Jingyong, Xie Gang, Zhao Zhicheng, Hu Xiao

    Published 2024-01-01
    “…However, the rapid growth of PV power deployment also brings important challenges to the maintenance of PV panels, and in order to solve this problem, this paper proposes an innovative algorithm based on PA-YOLO. First, we propose to use PA-YOLO’s asymptotic feature pyramid network (AFPN) instead of YOLOv7’s backbone network to support direct interactions of nonadjacent layers and avoid large semantic gaps between nonadjacent layers. …”
    Get full text
    Article
  8. 348

    Road Event Detection and Classification Algorithm Using Vibration and Acceleration Data by Abiel Aguilar-González, Alejandro Medina Santiago

    Published 2025-02-01
    “…In this work, we propose a Random Forest-based event classification algorithm designed to handle the unique patterns of vibration and acceleration data in road event detection for an urban traffic scenario. …”
    Get full text
    Article
  9. 349

    An Object Detection Algorithm for Orchard Vehicles Based on AGO-PointPillars by Pengyu Ren, Xuyun Qiu, Qi Gao, Yumin Song

    Published 2025-07-01
    “…Then, Efficient Channel Attention (ECA) and Efficient Up-Convolution Block (EUCB) are introduced based on the PointPillars, which can enhance the ability of feature extraction for orchard objects. Finally, we establish an orchard object detection dataset and validate the proposed algorithm. …”
    Get full text
    Article
  10. 350

    DS-YOLOv7: Dense Small Object Detection Algorithm for UAV by Tao Sun, Haonan Chen, Haiying Liu, Lixia Deng, Lida Liu, Shuang Li

    Published 2024-01-01
    “…In this paper, we propose an improved YOLOv7 UAV dense small object detection algorithm (DS-YOLOv7) to improve the UAV detection performance of dense small objects. …”
    Get full text
    Article
  11. 351

    Static Analysis-based Detection of Android Malware using Machine Learning Algorithms by Omar Emad Saied, Karam Hatim Thanoon

    Published 2025-09-01
    “…The rapid growth of Android applications has led to increased security threats, making malware detection a critical concern in cybersecurity. This research proposes a static analysis-based technique that employs machine learning for Android malware detection. …”
    Get full text
    Article
  12. 352

    Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms by Mehdi Ellouze

    Published 2021-01-01
    “…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
    Get full text
    Article
  13. 353
  14. 354
  15. 355
  16. 356

    A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection by Mahdieh Maazalahi, Soodeh Hosseini

    Published 2025-03-01
    “…In this paper, a new IDS is proposed to detect IoT-Botnet DDoS attacks. This IDS is a new three-phase system, the first phase is related to preprocessing on the dataset and the second phase includes a new hybrid method for feature selection using filter and wrapper methods based on the Grey Wolf (GW) algorithm and genetics called GW-GA. …”
    Get full text
    Article
  17. 357

    Research on lightweight tunnel cable fire recognition algorithm based on multi-scale features by Zimeng Liu, Lei Zhang, Huiqiang Ma, Xuebing Chen, Molin Zhang

    Published 2025-07-01
    “…In this study, a lightweight YOLO-v5 tunnel cable fire recognition algorithm with multiscale features is proposed. By replacing the YOLO-v5 backbone network, Darknet53, with Mobilenetv3-small and integrating the SimAM attention mechanism, the lightweight and detection speed of the network was improved. …”
    Get full text
    Article
  18. 358
  19. 359
  20. 360

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article