Showing 581 - 600 results of 2,834 for search 'low (direction OR detection) algorithm', query time: 0.22s Refine Results
  1. 581

    An algorithm for automatic fitting and formula assignment in atmospheric mass spectra by V. Mickwitz, O. Peräkylä, F. Graeffe, D. Worsnop, D. Worsnop, M. Ehn

    Published 2025-04-01
    “…This algorithm provides an excellent starting point for a peak list, which, if needed, can be manually revised.…”
    Get full text
    Article
  2. 582

    Learned Shrinkage Approach for Low-Dose Reconstruction in Computed Tomography by Joseph Shtok, Michael Elad, Michael Zibulevsky

    Published 2013-01-01
    “…We propose a direct nonlinear reconstruction algorithm for Computed Tomography (CT), designed to handle low-dose measurements. …”
    Get full text
    Article
  3. 583

    Reflector-aided direct locations of multiple signals in the presence of small reflector position biases by Jiexin Yin, Ding Wang, Ying Wu, Zhidong Wu

    Published 2018-04-01
    “…It outperforms conventional two-step localization methods, especially under low signal-to-noise ratio conditions. This article proposes a reflector-aided DPD algorithm for multiple signals of known waveforms received by an array observer. …”
    Get full text
    Article
  4. 584

    Context-Aware Adaptive Encryption: Integrating Sensitive Data Detection and Network intrusion detection for Dynamic Data Security and Encryption by Leonardo C. Lawrence, Ramin Giovanni, Cynthia Calongne, Abdullah Alshboul

    Published 2024-11-01
    “…This research project develops and evaluates a novel context-aware adaptive encryption system that integrates sensitive data detection, network intrusion detection, and dynamic encryption techniques to enhance data security. …”
    Get full text
    Article
  5. 585

    A Low-Complexity Approach for Improving the Accuracy of Sensor Networks by Angelo Coluccia

    Published 2015-06-01
    “…Remarkably, the resulting cooperative algorithm does not require prior knowledge of the (hyper)parameters and is able to provide a “denoised” version of the monitored field without losing accuracy in detecting extreme (less frequent) values, which can be very important for a number of applications. …”
    Get full text
    Article
  6. 586

    Multiscale Eight Direction Descriptor-Based Improved SAR–SIFT Method for Along-Track and Cross-Track SAR Images by Wei Wang, Jinyang Chen, Zhonghua Hong

    Published 2025-07-01
    “…Image matching between spaceborne synthetic aperture radar (SAR) images are frequently interfered with by speckle noise, resulting in low matching accuracy, and the vast coverage of SAR images renders the direct matching approach inefficient. …”
    Get full text
    Article
  7. 587

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  8. 588

    Fast Photon-Counting Imaging With Low Acquisition Time Method by Kangjian Hua, Bo Liu, Zhen Chen, Huachuang Wang, Liang Fang, Jiang Yun

    Published 2021-01-01
    “…In this paper, we proposed a low acquisition time photon-counting imaging method based on two single element SPADs and pixel scanning structure. …”
    Get full text
    Article
  9. 589

    MODERN METHODS OF AUTOMATIC RECTANGLE OBJECTS DETECTION by E. S. Matusevich, I. E. Kheidorov

    Published 2019-06-01
    “…Low-level and high-level feature extraction methods and algorithms for the image formation of a rectangular object were considered. …”
    Get full text
    Article
  10. 590

    Automated anomaly detection of IPTV user experience by Xiaomin TAN, Ai FANG, Duo JIN, Changjiang LI

    Published 2019-07-01
    “…The practice indicates that the algorithm with low calculation cost adapts to abnormal changes in the network and detect anomalies accurately and quickly, which reduces labor costs, improves operation efficiency and promotes intelligent operation.…”
    Get full text
    Article
  11. 591

    Lightweight blasthole image detection and positioning method by Shan PAN, Ting YU, Zhongwen YUE, Zijian TIAN, Qingyu JIN

    Published 2025-03-01
    “…To tackle the issues of large parameter size and low frames per second (FPS) in the blasthole image detection and localization algorithm network model, a lightweight Sc_C2f module is proposed to optimize the network structure. …”
    Get full text
    Article
  12. 592

    Crowd anomaly estimation and detection: A review by A. Hussein, M.W. Raed, A. Al-Shaikhi, M. Mohandes, B. Liu

    Published 2024-09-01
    “…We present a comprehensive literature review on crowd anomaly detection using disruptive technologies such as radio frequency identification, wireless sensor networks, Wi-Fi, and Bluetooth low energy, employing device-free noninvasive algorithms based on received signal strength indicator variations to detect the speed and direction of a moving crowd to predict the onset of a stampede. …”
    Get full text
    Article
  13. 593

    Low-dimensional multiscale fast SAR image registration method by Jiamu Li, Wenbo Yu, Zijian Wang, Jiaxin Xie, Xiaojie Zhou, Yabo Liu, Zhongjun Yu, Meng Li, Yi Wang

    Published 2024-12-01
    “…First, the candidate points are detected in the modulus map of phase congruency (PC). …”
    Get full text
    Article
  14. 594

    Fracture Detection in Traumatic Pelvic CT Images by Jie Wu, Pavani Davuluri, Kevin R. Ward, Charles Cockrell, Rosalyn Hobson, Kayvan Najarian

    Published 2012-01-01
    “…Manual detection of bone fracture from computed tomography (CT) images is very challenging due to low resolution of the images and the complex pelvic structures. …”
    Get full text
    Article
  15. 595

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  16. 596

    Concealed Weapon Detection Using Thermal Cameras by Juan D. Muñoz, Jesus Ruiz-Santaquiteria, Oscar Deniz, Gloria Bueno

    Published 2025-02-01
    “…Key contributions include a lightweight algorithm optimized for low-end embedded devices, making it suitable for wearable and mobile applications, and the creation of a tailored thermal dataset for controlled concealment scenarios. …”
    Get full text
    Article
  17. 597

    Multiscale Convolutional Neural Networks for Hand Detection by Shiyang Yan, Yizhang Xia, Jeremy S. Smith, Wenjin Lu, Bailing Zhang

    Published 2017-01-01
    “…Developed from the region-based CNN (R-CNN) model, we propose a hand detection scheme based on candidate regions generated by a generic region proposal algorithm, followed by multiscale information fusion from the popular VGG16 model. …”
    Get full text
    Article
  18. 598

    Complex Indoor Human Detection with You Only Look Once: An Improved Network Designed for Human Detection in Complex Indoor Scenes by Yufeng Xu, Yan Fu

    Published 2024-11-01
    “…However, the complex indoor environment and background pose challenges to the detection task. The YOLOv8 algorithm is a cutting-edge technology in the field of object detection, but it is still affected by indoor low-light environments and large changes in human scale. …”
    Get full text
    Article
  19. 599

    MRP-YOLO: An Improved YOLOv8 Algorithm for Steel Surface Defects by Shuxian Zhu, Yajie Zhou

    Published 2024-12-01
    “…This study proposes a novel method for steel defect detection based on the YOLO v8 algorithm, which improves detection accuracy while maintaining low computational complexity. …”
    Get full text
    Article
  20. 600

    DETECTION OF SOMATIC MUTATIONS IN THE BRAF GENE BY PYROSEQUENCING by O. P. Dribnokhodova, E. A. Dunaeva, G. V. Leshkina, E. A. Yarygina, A. Yu. Bukharina, Ya. A. Voiciehovskaya, E. V. Borisova, S. K. Bormotova, A. I. Daoud, V. N. Khlavich, K. O. Mironov

    Published 2021-10-01
    “…The pyrogram signal values for samples without mutations ranged from 0 to 19.5 % for different mutations. An analysis algorithm was developed to confirm the presence and differentiation of mutations in the 600 codon at a low proportion of the mutant allele based on the signals ratio on the pyrogram. …”
    Get full text
    Article