Showing 541 - 560 results of 4,166 for search 'features detection algorithms', query time: 0.19s Refine Results
  1. 541

    Defects Detection in Screen-Printed Circuits Based on an Enhanced YOLOv8n Algorithm by Xinyu Zhang, Jia Wang, Dan Jiang, Yang Li, Xuewei Wang, Han Zhang

    Published 2025-05-01
    “…To address these challenges, a self-made SPC defect data set and an enhanced CAAB-YOLOv8n detection algorithm were developed. A CAD module was integrated into the backbone network to improve the model’s ability to detect bar-shaped features. …”
    Get full text
    Article
  2. 542
  3. 543

    An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks by Taiwo Blessing Ogunseyi, Gogulakrishan Thiyagarajan

    Published 2025-04-01
    “…Specifically, we employ a hybrid approach using statistical methods and a metaheuristic algorithm for feature selection to identify the most relevant features and limit the overall feature set while building an LSTM-based model for intrusion detection. …”
    Get full text
    Article
  4. 544

    GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm by Xiangqiang Kong, Guangmin Liu, Yanchen Gao

    Published 2025-05-01
    “…Finally, the coordinate attention is introduced into the neck network to decompose the channel attention and aggregate the features, which can effectively retain the spatial information and thus improve the detection and localization accuracy of tiny defects (defect area less than 1% of total image area) in PCB defect images. …”
    Get full text
    Article
  5. 545

    Surface Defect Detection Algorithm for Wind Turbine Blades Based on HSCA-YOLOv7 by Bing LI, Yunshan BAI, Kuan ZHAO, Congbin GUO, Yongjie ZHAI

    Published 2023-08-01
    “…The blade is one of the key components of the wind turbine, which is vulnerable to the impact of natural environmental factors, resulting in gel coat falling off, cracks, corrosion, and other damage and thus affecting the efficiency of wind power generation and the safety of wind turbine operation. A defect detection algorithm for wind turbine blades based on HSCA-YOLOv7 is proposed to address the issues of inconsistent defect scale, inaccurate positioning, and low detection accuracy in wind turbine blade images by aerial photography. …”
    Get full text
    Article
  6. 546

    Detection Algorithm for Air Duct Clamp on Trains Based on RSA-YOLOv10n by WANG Dairong, ZHAO Yuhong, QU Xiaozhang, LIU Yi

    Published 2025-04-01
    “…To address challenges in the detection of air duct clamps due to factors such as dim environments and small objects in train detection, such as insufficient detection accuracy and low detection efficiency, this paper proposes a RSA-YOLOv10n-based detection algorithm, developed utilizing a dataset of air duct clamps collected from trains. …”
    Get full text
    Article
  7. 547

    UCN-YOLOv5: Traffic Sign Object Detection Algorithm Based on Deep Learning by Peilin Liu, Zhaoyang Xie, Taijun Li

    Published 2023-01-01
    “…In view of the complex and changeable environment and detection accuracy of traffic sign detection, this paper proposes UCN-YOLOv5 model based on the framework of YOLOv5.This model first replaces a new backbone network, which uses the core module RSU of U2Net to enhance the feature extraction of the network. …”
    Get full text
    Article
  8. 548
  9. 549

    Infrared Image Classification and Detection Algorithm for Power Equipment Based on Improved YOLOv10 by Xiu Ji, Zheyu Yue, Hongliu Yang, Zehong Zhang

    Published 2024-01-01
    “…To address this problem, this paper proposes an infrared image classification and detection algorithm for power equipment based on the improved YOLOv10, named YOLOv10plus. …”
    Get full text
    Article
  10. 550

    Detection algorithm for wearing safety helmet under mine based on improved YOLOv5s by Yuanbin WANG, Sixiong WEI, Huaying WU, Yu DUAN, Meng LIU

    Published 2025-06-01
    “…Aiming at the problems of low accuracy and high missed detection rate of personnel safety helmet detection algorithm caused by complex environment under mine, an improved mine safety helmet detection algorithm based on YOLOv5s is proposed. …”
    Get full text
    Article
  11. 551

    STDE-YOLOv5s: a traffic sign detection algorithm based on context information enhancement by Qi Tian, Juwei Zhang

    Published 2025-07-01
    “…Considering the strong capability of the YOLOv5s algorithm in small object detection, its relatively low number of parameters, and ease of deployment, this paper selects YOLOv5s as the base model and proposes an improved traffic sign detection algorithm. …”
    Get full text
    Article
  12. 552

    Modified Whale Optimization Algorithm for Multiclass Skin Cancer Classification by Abdul Majid, Masad A. Alrasheedi, Abdulmajeed Atiah Alharbi, Jeza Allohibi, Seung-Won Lee

    Published 2025-03-01
    “…To address these challenges, this paper proposes an innovative deep learning-based framework that integrates an ensemble of two pre-trained convolutional neural networks (CNNs), SqueezeNet and InceptionResNet-V2, combined with an improved Whale Optimization Algorithm (WOA) for feature selection. The deep features extracted from both models are fused to create a comprehensive feature set, which is then optimized using the proposed enhanced WOA that employs a quadratic decay function for dynamic parameter tuning and an advanced mutation mechanism to prevent premature convergence. …”
    Get full text
    Article
  13. 553
  14. 554

    Complex Texture Contour Feature Extraction of Cracks in Timber Structures of Ancient Architecture Based on YOLO Algorithm by Jian Ma, Weidong Yan, Guoqi Liu, Shiyu Xing, Siqi Niu, Tong Wei

    Published 2022-01-01
    “…In order to find a better algorithm, this paper mainly adopts three models including YOLO v3, YOLO v4s-mish, and YOLO v5s to detect cracks in the timber structures of ancient architecture, and compares and analyzes the advantages and disadvantages of the three models. …”
    Get full text
    Article
  15. 555

    ResNet18 facial feature extraction algorithm improved based on hybrid domain attention mechanism. by Yingying Mei

    Published 2025-01-01
    “…To solve these problems, based on the improvement of adaptive boosting to improve the accuracy of face detection, the study proposes a residual network 18-layer face feature extraction algorithm based on hybrid domain attention mechanism algorithm. …”
    Get full text
    Article
  16. 556

    LI-YOLO: An Object Detection Algorithm for UAV Aerial Images in Low-Illumination Scenes by Songwen Liu, Hao He, Zhichao Zhang, Yatong Zhou

    Published 2024-11-01
    “…In the feature fusion part, aiming to improve the detection performance for small objects in UAV aerial images, a shallow feature fusion network and a small object detection head are added. …”
    Get full text
    Article
  17. 557

    YOLO-PGC: A Tomato Maturity Detection Algorithm Based on Improved YOLOv11 by Qian Wu, Heming Huang, Dongke Song, Jie Zhou

    Published 2025-04-01
    “…A YOLOv11-based algorithm named YOLO-PGC is proposed in this study for tomato maturity detection. …”
    Get full text
    Article
  18. 558

    ALGORITHM FOR complex SMOKE AND FLAME detection based on video surveillance systems data analysis by R. P. Bohush, D. A. Tychko

    Published 2019-06-01
    “…An algorithm to detect the main signs of fire for video surveillance systems, which allows the detection of smoke, open flames, and their combination on dynamic images is proposed. …”
    Get full text
    Article
  19. 559

    An Improved Binary Spider Wasp Optimization Algorithm for Intrusion Detection for Industrial Internet of Things by Mousa'b Mohammad Shtayat, Mohammad Kamrul Hasan, Anil Kumar Budhati, Rossliawati Solaiman, Shayla Islam, Bishwajeet Pandey, Huda Saleh Abbas, Mamoon Mohammed Ali Saeed

    Published 2025-01-01
    “…The results demonstrate the superior classification accuracy, precision, recall, and F1-measure of IBSWO compared to established Metaheuristic (MH) algorithms and machine learning techniques. Furthermore, the incorporation of flat crossover and transfer functions presents promising advancements in feature selection methodologies for IIoT IDS, offering implications for enhancing network security, and effectively detecting and mitigating evolving cyber threats.…”
    Get full text
    Article
  20. 560

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article