Showing 821 - 840 results of 4,166 for search 'features detection algorithms', query time: 0.16s Refine Results
  1. 821

    Classification of Flying Drones Using Millimeter-Wave Radar: Comparative Analysis of Algorithms Under Noisy Conditions by Mauro Larrat, Claudomiro Sales

    Published 2025-01-01
    “…This study evaluates different machine learning algorithms in detecting and identifying drones using radar data from a 60 GHz millimeter-wave sensor. …”
    Get full text
    Article
  2. 822
  3. 823

    Optimizing Tumor Detection in Brain MRI with One-Class SVM and Convolutional Neural Network-Based Feature Extraction by Azeddine Mjahad, Alfredo Rosado-Muñoz

    Published 2025-06-01
    “…Experimental results demonstrate that combining Convolutional Neural Network (CNN)-based feature extraction with OCSVM significantly improves anomaly detection performance compared with simpler handcrafted approaches. …”
    Get full text
    Article
  4. 824
  5. 825
  6. 826

    Binocular stereo vision-based relative positioning algorithm for drone swarm by Qing Cheng, Yazhe Wang

    Published 2025-01-01
    “…Abstract To address the challenges of high computational complexity and poor real-time performance in binocular vision-based Unmanned Aerial Vehicle (UAV) formation flight, this paper introduces a UAV localization algorithm based on a lightweight object detection model. …”
    Get full text
    Article
  7. 827
  8. 828

    LD-Det: Lightweight Ship Target Detection Method in SAR Images via Dual Domain Feature Fusion by Hang Yu, Bingzong Liu, Lei Wang, Teng Li

    Published 2025-04-01
    “…However, large-scale deep learning algorithm training requires huge computing power support and large equipment to process, which is not suitable for real-time detection on edge platforms. …”
    Get full text
    Article
  9. 829

    Multiscale Sample Entropy-Based Feature Extraction with Gaussian Mixture Model for Detection and Classification of Blue Whale Vocalization by Oluwaseyi Paul Babalola, Olayinka Olaolu Ogundile, Vipin Balyan

    Published 2025-03-01
    “…Additionally, MSE is applied to the Gaussian mixture model (GMM) for blue whale call detection and classification. The performance of the proposed MSE-GMM algorithm is experimentally assessed and benchmarked against traditional methods, including principal component analysis (PCA), wavelet-based feature (WF) extraction, and dynamic mode decomposition (DMD), all combined with the GMM. …”
    Get full text
    Article
  10. 830

    Yolov4 High-Speed Train Wheelset Tread Defect Detection System Based on Multiscale Feature Fusion by Changfan Zhang, Xinliang Hu, Jing He, Na Hou

    Published 2022-01-01
    “…The Yolov4 detection algorithm does not sufficiently extract local semantic and location information. …”
    Get full text
    Article
  11. 831

    Utilizing Enhanced Particle Swarm Optimization for Feature Selection in Gender-Emotion Detection From English Speech Signals by Ammar Amjad, Li-Chia Tai, Hsien-Tsung Chang

    Published 2024-01-01
    “…We extract pitch and acoustic-related statistical features from speech samples and develop separate models for gender prediction and emotion detection. …”
    Get full text
    Article
  12. 832

    An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments by Mimouna Abdullah Alkhonaini

    Published 2025-08-01
    “…Furthermore, the FOFSDL-SCD model utilizes the Fox optimizer algorithm (FOA) method for the feature selection process to select the most significant features from the dataset. …”
    Get full text
    Article
  13. 833

    Android malware detection method based on deep neural network by Fan CHAO, Zhi YANG, Xuehui DU, Yan SUN

    Published 2020-10-01
    “…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
    Get full text
    Article
  14. 834

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  15. 835

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  16. 836

    A Multi-Objective Bio-Inspired Optimization for Voice Disorders Detection: A Comparative Study by Maria Habib, Victor Vicente-Palacios, Pablo García-Sánchez

    Published 2025-06-01
    “…This paper introduces a multi-objective bio-inspired, AI-based optimization approach for the automated detection of voice disorders. Different multi-objective evolutionary algorithms (the Non-dominated Sorting Genetic Algorithm (NSGA-II), Strength Pareto Evolutionary Algorithm (SPEA-II), and the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D)) have been compared to detect voice disorders by optimizing two conflicting objectives: error rate and the number of features. …”
    Get full text
    Article
  17. 837

    An airport apron ground service surveillance algorithm based on improved YOLO network by Yaxi Xu, Yi Liu, Ke Shi, Xin Wang, Yi Li, Jizong Chen

    Published 2024-06-01
    “…The improved algorithm can efficiently extract the information features of small-sized objects, medium-sized objects, and moving objects in large scenes, and it achieves effective detection of activities of ground service in the apron area. …”
    Get full text
    Article
  18. 838
  19. 839

    YOLO-RDM: A high accuracy and efficient algorithm for magnetic tile surface defect detection with practical applications. by Wei Niu, Cheng Lv, Enxu Zhang, Zhongbin Wei

    Published 2025-01-01
    “…To solve these problems, this study proposes a novel magnetic tile defect detection algorithm called YOLO-RDM. First, we apply DOConv to the neck network. …”
    Get full text
    Article
  20. 840

    LI-YOLOv8: Lightweight small target detection algorithm for remote sensing images that combines GSConv and PConv. by Pingping Yan, Xiangming Qi, Liang Jiang

    Published 2025-01-01
    “…We propose a lightweight small target detection algorithm for remote sensing images that combines GSConv and PConv, named LI-YOLOv8. …”
    Get full text
    Article