Showing 521 - 540 results of 4,166 for search 'features detection algorithms', query time: 0.22s Refine Results
  1. 521
  2. 522

    MPVF: Multi-Modal 3D Object Detection Algorithm with Pointwise and Voxelwise Fusion by Peicheng Shi, Wenchao Wu, Aixi Yang

    Published 2025-03-01
    “…To address these issues, the multi-modal 3D object detection algorithm with pointwise and voxelwise fusion (MPVF) is proposed, which enhances multi-modal feature interaction and optimizes feature extraction strategies to improve detection precision and robustness. …”
    Get full text
    Article
  3. 523

    Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data by Naglaa Ibrahim, Hana Usman

    Published 2013-07-01
    “…This paper aims to design and implement  a misuse  network intrusion detection system based on Genetic Algorithm. The efficiency of using GA for building IDS based on NSL-KDD is verified. …”
    Get full text
    Article
  4. 524
  5. 525

    Small target drone algorithm in low-altitude complex urban scenarios based on ESMS-YOLOv7 by Yuntao Wei, Xiujia Wang, Chunjuan Bo, Zhan Shi

    Published 2025-01-01
    “…The algorithm focuses on the extraction of features from small target UAVs in urban contexts. …”
    Get full text
    Article
  6. 526
  7. 527

    Research on Target Detection Algorithm for Solder Joint Defects Based on the Improved YOLOv8 by Chengkai Zhang, Xiaocui Feng, Pujun Mao, Fuyan Lv

    Published 2025-01-01
    “…Aiming at the problem of low accuracy in solder joint defect detection caused by the complex background and difficult to extract defect features of circuit boards using through-hole technology (THT), an improved YOLOv8 solder joint defect target detection algorithm was proposed. …”
    Get full text
    Article
  8. 528
  9. 529

    DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network by Peitao Cheng, Xuanjiao Lei, Haoran Chen, Xiumei Wang

    Published 2025-03-01
    “…As a computer vision task, object detection algorithms can be applied to various real-world scenarios. …”
    Get full text
    Article
  10. 530

    USD-YOLO: An Enhanced YOLO Algorithm for Small Object Detection in Unmanned Systems Perception by Hongqiang Deng, Shuzhe Zhang, Xiaodong Wang, Tianxin Han, Yun Ye

    Published 2025-03-01
    “…To address these issues, we propose a specialized algorithm named Unmanned-system Small-object Detection-You Only Look Once (USD-YOLO). …”
    Get full text
    Article
  11. 531

    DOG: An Object Detection Adversarial Attack Method by Jinpeng Li, Xiaoyu Ji, Wenyuan Xu, Yushi Cheng

    Published 2025-01-01
    “…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
    Get full text
    Article
  12. 532

    Concrete Structure Identification and Damage Detection Based on Genetic Algorithm Combined with Cluster Analysis by Xukai Ren, Ke Wang, Xiaofang Han, JingYi Zhang

    Published 2025-08-01
    “…To improve the accuracy of concrete structure identification and damage detection, this study uses acoustic emission technology to obtain various waveform parameter features in the structure. …”
    Get full text
    Article
  13. 533

    A small‐target traffic sign detection algorithm based on partial conv and atrous spatial pyramid by Yuqi Li, Zijian Wang, Han Zhang, Xinpeng Yao, Zhou Zhou, Xin Cheng

    Published 2024-12-01
    “…Lastly, the small‐target detection precision is improved by incorporating an additional small‐target detection head, which uses high‐resolution feature maps for shallow features. …”
    Get full text
    Article
  14. 534

    CSK based on Priority Call Algorithm for Detection and Securing Platoon from Inside Attacks by Mohammed Al Sheıkhly, Sefer Kurnaz

    Published 2020-10-01
    “…The research in this paper focuses on design, detection and the mitigation of attacks in a vehicle platoon. priority call algorithm in combination with color-shift keying modulation is used to protect the platoon alleviating the undesirable impacts such as collisions, oscillations and disintegration in the platoon caused by the attacks.…”
    Get full text
    Article
  15. 535

    Small target detection algorithm based on the fusion attention mechanism and multi-layer convolution. by Xiujing Li, Haifei Zhang, Yiliu Hang, Hao Chen

    Published 2025-01-01
    “…In the realm of unmanned aerial vehicles, we proposed an enhanced small target detection algorithm, MGAC-YOLO, to address the challenges of missed detections and low accuracy associated with small target identification. …”
    Get full text
    Article
  16. 536

    Detection of Electrical Fires in Residential Buildings Using a Gradient Boosting Machine Algorithm by Sharaban Taha Ahmed, Fadhil Aula

    Published 2025-06-01
    “…The paper discusses a technique for detecting electrical fires in residential buildings using the Gradient Boosting Machine (GBM) algorithm. …”
    Get full text
    Article
  17. 537

    Performance of Apriori Algorithm for Detecting Drug–Drug Interactions from Spontaneous Reporting Systems by Yajie He, Jianping Sun, Xianming Tan

    Published 2025-05-01
    “…Although traditional association rule mining techniques, such as the Apriori algorithm, have been applied to drug safety signal detection, their performance in DDI detection has not been systematically evaluated, especially in the Spontaneous Reporting System (SRS), which contains a large number of drugs and AEs with a complex correlation structure and unobserved latent factors. …”
    Get full text
    Article
  18. 538

    Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine by Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable

    Published 2022-01-01
    “…In the first level, the firefly algorithm (FFA) and the CfsSubsetEval feature section method have been applied to optimize the subset of features, while in the second level, the support vector machine classifier has been used to build the training model for the detection of credit card fraud cases. …”
    Get full text
    Article
  19. 539

    A Temporal Graph Network Algorithm for Detecting Fraudulent Transactions on Online Payment Platforms by Diego Saldaña-Ulloa, Guillermo De Ita Luna, J. Raymundo Marcial-Romero

    Published 2024-12-01
    “…A temporal graph network (TGN) algorithm is introduced to identify fraudulent activities within a digital platform. …”
    Get full text
    Article
  20. 540

    Photovoltaic panel defect detection algorithm based on infrared imaging and improved YOLOv8 by Jingdong Wang, Zhu Cheng

    Published 2025-04-01
    “…To address the challenges of high missed detection rates, complex backgrounds, unclear defect features, and uneven difficulty levels in target detection during the industrial process of photovoltaic panel defect detection, this article proposes an infrared detection method based on computer vision, with enhancements built upon the YOLOv8 model. …”
    Get full text
    Article