Showing 1,601 - 1,620 results of 4,166 for search 'features detection algorithms', query time: 0.16s Refine Results
  1. 1601

    Financial phishing detection method based on sensitive characteristics of webpage by Xiang-dong HU, Ke LIU, Feng ZHANG, Jia-fu LIN, Jun FU, Zhi-hui GUO

    Published 2017-02-01
    “…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). Then, the method locates and cuts logo image of webpage, and utilizes PCA-SIFT algorithm to extract image features and match features with library of webpage logo which was established beforehand. …”
    Get full text
    Article
  2. 1602

    An Innovative Approach for Fake News Detection using Machine Learning by Maya Hisham, Raza Hasan, Saqib Hussain

    Published 2023-06-01
    “…The project uses an open-source online dataset of fake and real news to determine the credibility of news. Various text feature extraction techniques and classification algorithms are reviewed, with the Support Vector Machine (SVM) linear classification algorithm using TF-IDF feature extraction achieving the highest accuracy of 99.36%. …”
    Get full text
    Article
  3. 1603

    BLSTM based night-time wildfire detection from video. by Ahmet K Agirman, Kasim Tasdemir

    Published 2022-01-01
    “…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
    Get full text
    Article
  4. 1604

    YOLO-WAD for Small-Defect Detection Boost in Photovoltaic Modules by Yin Wang, Wang Yun, Gang Xie, Zhicheng Zhao

    Published 2025-03-01
    “…Subsequently, an additional detection layer is added to the neck, and C2f is replaced by C2f-EMA (CSP bottleneck with two convolutions–efficient multi-scale attention mechanism), which can redistribute feature weights and prioritize relevant features and spatial details across image channels to improve feature extraction. …”
    Get full text
    Article
  5. 1605

    An explainable EEG epilepsy detection model using friend pattern by Turker Tuncer, Sengul Dogan

    Published 2025-05-01
    “…EEG signals have commonly been used to detect epilepsy. Therefore, the main objective of this research is to demonstrate the epilepsy detection capability of the presented new-generation relation-centric feature extraction function. …”
    Get full text
    Article
  6. 1606

    PUE Attack Detection in CWSN Using Collaboration and Learning Behavior by Javier Blesa, Elena Romero, Alba Rozas, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
    Get full text
    Article
  7. 1607

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  8. 1608

    Siamese comparative transformer-based network for unsupervised landmark detection. by Can Zhao, Tao Wu, Jianlin Zhang, Zhiyong Xu, Meihui Li, Dongxu Liu

    Published 2024-01-01
    “…Current landmark detection algorithms often train a sophisticated image pose encoder by reconstructing the source image to identify landmarks. …”
    Get full text
    Article
  9. 1609

    Detecting House of Spirit Attacks by Glibc Heap Information Extraction by ZHAI Jiqiang, WANG Jiaqian, HAN Xu, SUN Haixu

    Published 2024-02-01
    “…In addition,the House of Spirit heap attack is studied,established an attack model,and extracted its attack features. A detection algorithm for House of Spirit attack is designed based on the extracted attack features. …”
    Get full text
    Article
  10. 1610

    Object Detection using YOLOv8 : A Systematic Review by Nugraha Asthra Megantara, Ema Utami

    Published 2025-05-01
    “…This study evaluates the performance of YOLOv8 based on precision, recall, F1-score, and mean average precision (mAP) metrics, and compares its advantages and limitations with previous YOLO versions and other object detection algorithms. Improvements in the YOLOv8 architecture, including attention mechanisms, improved feature extraction, and hyperparameter optimization, enable significant improvements in accuracy and computational efficiency, especially for small objects and low-light conditions. …”
    Get full text
    Article
  11. 1611

    A Method of Abnormal Behavior Detection for Safety Site Surveillance by Wenjing Wang, Yangyang Zhang, QingE Wu

    Published 2025-01-01
    “…For the complex background in the image, a multiframe differential superposition algorithm is proposed to denoise the target image; a feature extraction method is given to extract features for the target image, and then a more complete image with target features is obtained after filtering; a normal behavior model is established to extract the motion information of the target from a single frame of the image; an abnormal detection method is proposed to determine whether it belongs to abnormal behavior. …”
    Get full text
    Article
  12. 1612

    Detection of egg appreance based on Fasternet and YOLOv5 model by WEI Jingxin, CHEN Zhongju, XU Haoran

    Published 2024-08-01
    “…The Bottleneck module in the C3 structure was replaced by the Fasternet Block module to reduce the parameters and improve the percision in the process of detection. The Soft-NMS, a non-maximum suppression was utilized to improve the detection of eggs with similar features. …”
    Get full text
    Article
  13. 1613

    Fitting Penalized Estimator for Sparse Covariance Matrix with Left-Censored Data by the EM Algorithm by Shanyi Lin, Qian-Zhen Zheng, Laixu Shang, Ping-Feng Xu, Man-Lai Tang

    Published 2025-01-01
    “…Estimating the sparse covariance matrix can effectively identify important features and patterns, and traditional estimation methods require complete data vectors on all subjects. …”
    Get full text
    Article
  14. 1614

    An Enhanced Human Evolutionary Optimization Algorithm for Global Optimization and Multi-Threshold Image Segmentation by Liang Xiang, Xiajie Zhao, Jianfeng Wang, Bin Wang

    Published 2025-05-01
    “…Thresholding image segmentation aims to divide an image into a number of regions with different feature attributes in order to facilitate the extraction of image features in the context of image detection and pattern recognition. …”
    Get full text
    Article
  15. 1615

    SEPDNet: simple and effective PCB surface defect detection method by Du Lang, Zhenzhen Lv

    Published 2025-03-01
    “…Abstract Replacing time-consuming and costly manual inspections on production lines with efficient and accurate defect detection algorithms for Printed Circuit Boards (PCBs) remains a significant challenge. …”
    Get full text
    Article
  16. 1616

    TATPat based explainable EEG model for neonatal seizure detection by Turker Tuncer, Sengul Dogan, Irem Tasci, Burak Tasci, Rena Hajiyeva

    Published 2024-11-01
    “…In this EFE model, there are four essential phases and these phases: (i) automaton and transformer-based feature extraction, (ii) feature selection deploying cumulative weight-based neighborhood component analysis (CWNCA), (iii) the Directed Lobish (DLob) and Causal Connectome Theory (CCT)-based explainable result generation and (iv) classification deploying t algorithm-based support vector machine (tSVM). …”
    Get full text
    Article
  17. 1617
  18. 1618

    ARC-LIGHT: Algorithm for Robust Characterization of Lunar Surface Imaging for Ground Hazards and Trajectory by Alexander Cushen, Ariana Bueno, Samuel Carrico, Corrydon Wettstein, Jaykumar Ishvarbhai Adalja, Mengxiang Shi, Naila Garcia, Yuliana Garcia, Mirko Gamba, Christopher Ruf

    Published 2025-02-01
    “…Using these data streams, ARC-LIGHT will remove erroneous signals and recover a useful detection of the surface features to then be used by the spacecraft to correct its descent profile. …”
    Get full text
    Article
  19. 1619

    Deep Learning Innovations for Underwater Waste Detection: An In-Depth Analysis by Jaskaran Singh Walia, Kavietha Haridass, L. K. Pavithra

    Published 2025-01-01
    “…In this study, we present a novel deep learning framework for real-time underwater waste detection by evaluating state-of-the-art object detection algorithms on a manually annotated custom dataset comprising images across various water bodies to represent real-world turbidity, illumination, and occlusion. …”
    Get full text
    Article
  20. 1620

    Remote Sensing Change Detection by Pyramid Sequential Processing With Mamba by Jiancong Ma, Bo Li, Hanxi Li, Siying Meng, Ruitao Lu, Shaohui Mei

    Published 2025-01-01
    “…Change detection (CD) in remote sensing imagery is crucial for monitoring environmental variations over time. …”
    Get full text
    Article