Showing 501 - 520 results of 2,109 for search 'low detection algorithm', query time: 0.17s Refine Results
  1. 501

    FMCW radar range estimation algorithm based on fast iterative interpolation by Yongchang DUAN, Xin LI, Yaohui HUANG, Ping HUANG

    Published 2019-09-01
    “…For the multi-target detection,a multi-objective range estimation algorithm was proposed based on iterative interpolation to solve the problem of the range accuracy of frequency modulation continuous wave (FMCW) radar being easy to be interfered by spectrum.Firstly,the number of targets and the rough location of the target were obtained through the fast Fourier transform (FFT) and the constant false alarm (CFAR) detection algorithm.Then spectrum was iteratively interpolate,and the inter-spectral interference was eliminated during each iteration to obtain more accurate distance.Simulation results show that the proposed algorithm has higher estimation accuracy in multi-target environment and low Signal-to-noise ratio(SNR).The proposed algorithm is implemented by DSP,which proved that the algorithm meets the real-time requirements and is easy to be implemented in engineering.…”
    Get full text
    Article
  2. 502

    Attention-Based Lightweight YOLOv8 Underwater Target Recognition Algorithm by Shun Cheng, Zhiqian Wang, Shaojin Liu, Yan Han, Pengtao Sun, Jianrong Li

    Published 2024-11-01
    “…The detection frame rate reaches 189 frames per second on the ROUD dataset, thus meeting the high accuracy requirements for underwater object detection algorithms and facilitating lightweight and fast edge deployment.…”
    Get full text
    Article
  3. 503

    Crowd anomaly estimation and detection: A review by A. Hussein, M.W. Raed, A. Al-Shaikhi, M. Mohandes, B. Liu

    Published 2024-09-01
    “…We present a comprehensive literature review on crowd anomaly detection using disruptive technologies such as radio frequency identification, wireless sensor networks, Wi-Fi, and Bluetooth low energy, employing device-free noninvasive algorithms based on received signal strength indicator variations to detect the speed and direction of a moving crowd to predict the onset of a stampede. …”
    Get full text
    Article
  4. 504

    Robot Visual Tracking Model Based on Improved GOTURN-LD Algorithm by Lijuan Xu, Dalong Liu, Huanjian Ma

    Published 2024-01-01
    “…Therefore, this paper studies the use of the You Only Look Once series algorithm and the use of the regression network general target tracking algorithm to improve the detection and tracker part of the track-learning-detection algorithm. …”
    Get full text
    Article
  5. 505

    Optimization Algorithms for Cable Fault Localization and Assessment in Smart Power Systems by Wenxuan Wang, Yali Shi, Minghui Liu

    Published 2025-01-01
    “…Firstly, we use the good self-sustainability of the optical soliton (Soliton) in fiber optic communication to modulate its spectral information into the reflection information of the cable frequency domain, secondly, we define the attenuation operator to compensate for the attenuation of the spectral information and the integral kernel function, and set up the Chebyshev window function to weaken the low-frequency components of the spectrum to be detected. …”
    Get full text
    Article
  6. 506

    A Biphase Code Sidelobe Suppression Method Based on the CLEAN Algorithm by Yiding Liang, Liyu Tian

    Published 2025-01-01
    “…To address this issue, this paper proposes a sidelobe suppression method based on the CLEAN algorithm. First, the digital moving target detection (DMTD) algorithm is employed to estimate the target velocity, and the phase of the echo signal is dynamically adjusted to eliminate straddle loss. …”
    Get full text
    Article
  7. 507

    Research on lightweight weed recognition algorithm based on improved YOLOv8 by Zhang Chao, Liu Bin, Li Kun

    Published 2025-01-01
    “…Aiming at the problems of low accuracy of current field weed identification models and the difficulty of deploying multiple parameters in mobile devices and embedded devices with limited computing resources, a lightweight field weed identification model based on YOLOv8 is proposed in this paper. …”
    Get full text
    Article
  8. 508

    Research on Interference Resource Optimization Based on Improved Whale Optimization Algorithm by Xuyi Chen, Mingxi Ma, Chengkui Liu, Haifeng Xie, Shaoqi Wang

    Published 2025-01-01
    “…Then, in the solution process, to address the issues of the Whale Optimization Algorithm (WOA) easily falling into local optima and low convergence accuracy, the BIO-WOA (Bernoulli Chaotic mapping In-nonlinear Factors and Opposition-based Learning Improved Whale Optimization Algorithm, BIO-WOA) is proposed. …”
    Get full text
    Article
  9. 509
  10. 510

    High-Resolution Vegetation Optical Depth Retrieved From Sentinel-1 C-Band SAR Data by Lihong Zhu, Yiman Li, Qing Xia, Qiong Zheng, Shuang Zhao, Zhi Huang

    Published 2025-01-01
    “…A high-resolution Sentinel-1 VOD time series, was developed based on the water cloud model (WCM) coupled with the TU-Wien (Vienna University of Technology, TU-Wien) change detection algorithm over Guangxi, China, during 2018–2020. …”
    Get full text
    Article
  11. 511

    An Improved UNet-Based Path Recognition Method in Low-Light Environments by Wei Zhong, Wanting Yang, Junhuan Zhu, Weidong Jia, Xiang Dong, Mingxiong Ou

    Published 2024-11-01
    “…These results significantly enhance path recognition accuracy in trellis orchards, particularly under low light under conditions. Compared to the FCN and SegNet algorithms, this method provides higher detection accuracy and offers a new theoretical foundation and research approach for path recognition in low-light environments.…”
    Get full text
    Article
  12. 512

    ICP Enhancement Algorithm for 6D Pose Tracking of Household Objects by Hyunho Hwang, Hyunsoo Shin, Ji-Hun Bae, Sungon Lee

    Published 2025-01-01
    “…While the performance was relatively limited for objects with low RGB texture, our algorithm achieved stable and high accuracy when sufficient RGB texture was present. …”
    Get full text
    Article
  13. 513

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  14. 514

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  15. 515

    Presenting a Text Mining Algorithm to Identify Emotion in Persian Corpus by Masoud Garshasbi, Anahid Rais-Rohani, Mohammadreza Kabaranzadeh Ghadim

    Published 2018-06-01
    “…In the first approach, the algorithm is capable of detecting only one emotional word in a sentence, and then it improves to detect boosters and negating and stop word list as well. …”
    Get full text
    Article
  16. 516

    Commutation Algorithm for Three-Phase Unbalanced Load Regulation in Distribution Network by Yongxia LI, Yulei GONG, Xiuxiao GUO, Yanyan ZHAO

    Published 2020-03-01
    “…Automatic phase commutation system is widely used to deal with the load imbalance problem in low voltage distribution network. It consists of an intelligent commutation terminal and a number of phase commutation switches. …”
    Get full text
    Article
  17. 517
  18. 518

    Homogenization of the Probability Distribution of Climatic Time Series: A Novel Algorithm by Peter Domonkos

    Published 2025-05-01
    “…The algorithm decides about statistical significance for each break detected during the homogenization of the section means, and skips the insignificant breaks. …”
    Get full text
    Article
  19. 519

    How to identify a patient with autoinflammatory syndrome: Clinical and diagnostic algorithms by Mikhail Mikhailovich Kostik, L S Snegireva, M F Dubko, V V Masalova, T S Likhacheva, O V Kalashnikova, V G Chasnyk

    Published 2013-10-01
    “…A clinical diagnostic algorithm is presented, which can be used to detect patients with AIS and to determine indications to and the time of molecular genetic typing, and to choose priority genes.…”
    Get full text
    Article
  20. 520

    Adaptive GDDA-BLAST: fast and efficient algorithm for protein sequence embedding. by Yoojin Hong, Jaewoo Kang, Dongwon Lee, Damian B van Rossum

    Published 2010-10-01
    “…Herein, we describe the logic and algorithmic process for a heuristic embedding strategy named "Adaptive GDDA-BLAST." …”
    Get full text
    Article