Showing 41 - 60 results of 554 for search 'negative detection algorithm', query time: 0.14s Refine Results
  1. 41

    Re-Parameterization After Pruning: Lightweight Algorithm Based on UAV Remote Sensing Target Detection by Yang Yang, Pinde Song, Yongchao Wang, Lijia Cao

    Published 2024-12-01
    “…Lightweight object detection algorithms play a paramount role in unmanned aerial vehicles (UAVs) remote sensing. …”
    Get full text
    Article
  2. 42

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  3. 43

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  4. 44

    YOLO-SRW: An Enhanced YOLO Algorithm for Detecting Prohibited Items in X-Ray Security Images by Minwei Chen, Zhixian Zhang, Nian Jiang, Xingxing Li, Xin Zhang

    Published 2025-01-01
    “…To address the challenges of false positives and false negatives in prohibited item detection within X-ray security images, caused by complex backgrounds, poor image quality, and varying scales, this paper proposes an improved algorithm based on YOLOv8, named YOLO-SRW, to improve the accuracy of detecting prohibited items. …”
    Get full text
    Article
  5. 45
  6. 46

    Performance Evaluation of a Novel Sequence-Based Directional Detection Strategy for Protection of Active Distribution Networks by Kwasi Opoku, Aleksandar Dimitrovski, Maximiliano Ferrari

    Published 2025-01-01
    “…An SEL-411L relay is used to program the detection algorithm. This hardware-in-the-loop (HIL) setup is used to verify the performance of the method and the results are compared with existing directional methods…”
    Get full text
    Article
  7. 47

    Optimization of Sorghum Spike Recognition Algorithm and Yield Estimation by Mengyao Han, Jian Gao, Cuiqing Wu, Qingliang Cui, Xiangyang Yuan, Shujin Qiu

    Published 2025-06-01
    “…In the natural field environment, the high planting density of sorghum and severe occlusion among spikes substantially increases the difficulty of sorghum spike recognition, resulting in frequent false positives and false negatives. The target detection model suitable for this environment requires high computational power, and it is difficult to realize real-time detection of sorghum spikes on mobile devices. …”
    Get full text
    Article
  8. 48

    PdYOLO: A Lightweight Algorithm for Detecting Peach Fruits Against a Peach Tree Background by Jiajun Zhang, Jialin Zhang, Kazuki Kobayashi

    Published 2024-01-01
    “…First, the CIOU regression loss function in YOLOv8s is replaced with the WIoUv2 regression loss function, effectively alleviating the negative impact of uneven distribution of positive and negative samples during model training through a more balanced gradient gain distribution strategy, which significantly improves detection accuracy. …”
    Get full text
    Article
  9. 49
  10. 50

    A Novel Dataset and Detection Method for Unmanned Aerial Vehicles Using an Improved YOLOv9 Algorithm by Depeng Gao, Jianlin Tang, Hongqi Li, Bingshu Wang, Jianlin Qiu, Shuxi Chen, Xiangxiang Mei

    Published 2024-11-01
    “…Furthermore, we propose an anti-interference UAV detection method based on YOLOv9-C in which the dot distance is used as an evaluation index to assign positive and negative samples. …”
    Get full text
    Article
  11. 51

    Detection of vehicles and analysis of traffic volume by real-time video-graphic technique using python algorithm by Osman Kantunsung Ramadan, R. Srinivasa Kumar, A. Narender Reddy

    Published 2025-08-01
    “…YOLO performs object detection more effectively due to preprocessing functions, including negative image filtering and image rotation augmentation with enhanced classifier reliability. …”
    Get full text
    Article
  12. 52

    Accuracy of Smartphone-Mediated Snore Detection in a Simulated Real-World Setting: Algorithm Development and Validation by Jeffrey Brown, Zachary Mitchell, Yu Albert Jiang, Ryan Archdeacon

    Published 2025-03-01
    “…This study evaluated the accuracy of the SleepWatch snore detection algorithm in a simulated real-world setting. …”
    Get full text
    Article
  13. 53

    A comparative analysis of imaging-based algorithms for detecting focal cortical dysplasia type II in children by Jan Šanda, Zuzana Holubová, David Kala, Kateřina Jiránková, Martin Kudr, Tomáš Masák, Anežka Bělohlávková, Pavel Kršek, Jakub Otáhal, Martin Kynčl

    Published 2025-08-01
    “…Their performance was assessed using adult and pediatric healthy controls templates, with validation against both predictive radiological ROIs (PRR) and post-resection cavities (PRC). The junction algorithm achieved the highest median dice score (0.028, IQR 0.038, p < 0.01 when compared with other algorithms) and detected relevant clusters even in MRI-negative cases. …”
    Get full text
    Article
  14. 54

    EGRN-YOLO: An Enhanced Multi-View Remote Sensing Detection Algorithm for Onshore Wind Turbines Based on YOLOv7 by Renzheng Xue, Haiqiang Xu, Qianlong Wu

    Published 2025-01-01
    “…However, the challenges posed by complex backgrounds, significant variations in the scale of wind turbine targets, and arbitrary orientations in unmanned aerial vehicle (UAV) remote sensing images have significantly increased the difficulty of real-time wind turbine detection. To address these challenges, this paper introduces an enhanced multi-view onshore wind turbine remote sensing detection algorithm for UAVs based on YOLOv7, termed EGRN-YOLO. …”
    Get full text
    Article
  15. 55

    Lightweight malicious domain name detection model based on separable convolution by Luhui YANG, Huiwen BAI, Guangjie LIU, Yuewei DAI

    Published 2020-12-01
    “…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
    Get full text
    Article
  16. 56

    Weak and Occluded Vehicle Detection in Complex Infrared Environment Based on Improved YOLOv4 by Shuangjiang Du, Pin Zhang, Baofu Zhang, Honghui Xu

    Published 2021-01-01
    “…Meanwhile, added the hard negative example mining block to the YOLOv4 model, which could depress the disturbance of complex background thus further decrease the false detecting rate. …”
    Get full text
    Article
  17. 57
  18. 58

    Multi-keyword partial matching algorithm based on text fragments by LIAO Wei-qi, ZOU Wei

    Published 2010-01-01
    “…A novel multi-keyword partial matching algorithm was also de- signed and realized which could detect the fraction of keywords in data block without re-flow or re-file. …”
    Get full text
    Article
  19. 59

    Detecting Anomalies in CPU Behavior Using Clustering Algorithms from the Scikit-Learn Library in Python Programming Language by Artem Turashev, Vladimir Sukhomlin

    Published 2024-03-01
    “…This article examines the problem of detecting anomalies in central processing unit (CPU) operation using time series clustering algorithms. …”
    Get full text
    Article
  20. 60