Showing 1 - 20 results of 56 for search '"algorithmic detection"', query time: 0.11s Refine Results
  1. 1

    Discrepancies between physician review and algorithmic detection of the zoll rescuenet post-cardiac arrest case review by Ayal Z. Pierce, Cody Couperus, Jordan Parker, Allison LaRocco, Michael Mazzeffi, Nicholas A. Morris

    Published 2025-07-01
    “…These findings support manual review of raw data and improved algorithmic detection of compressions to ensure feedback to resuscitation teams is reliable.…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Traffic Sign Detection and Quality Assessment Using YOLOv8 in Daytime and Nighttime Conditions by Ziyad N. Aldoski, Csaba Koren

    Published 2025-02-01
    “…Human evaluations further provided insights into subjective perceptions of visibility and their relationship with algorithmic detection, underscoring areas for potential improvement. …”
    Get full text
    Article
  6. 6

    Machine learning classifiers to detect data pattern change of continuous emission monitoring system: A typical chemical industrial park as an example by Zhefeng Xu, Xiahong Shi, Wei Shu, Yilu Xin, Xuan Zan, Zhaonian Si, Jinping Cheng

    Published 2025-07-01
    “…Temporal emission pattern analysis revealed significant changes in 334 instances (90% confidence) across collection weeks, though only 24 aligned with regulatory offsite supervision records, highlighting discrepancies between algorithmic detection and traditional compliance checks. …”
    Get full text
    Article
  7. 7

    Efficient Malaria Parasite Detection From Diverse Images of Thick Blood Smears for Cross-Regional Model Accuracy by Yuming Zhong, Ying Dan, Yin Cai, Jiamin Lin, Xiaoyao Huang, Omnia Mahmoud, Eric S. Hald, Akshay Kumar, Qiang Fang, Seedahmed S. Mahmoud

    Published 2023-01-01
    “…This integration involves image acquisition and algorithmic detection of malaria parasites in various thick blood smear (TBS) datasets sourced from different global regions, including low-quality images from Sub-Saharan Africa. …”
    Get full text
    Article
  8. 8

    Trade-Offs Between Simplifying Inertial Measurement Unit–Based Movement Recordings and the Attainability of Different Levels of Analyses: Systematic Assessment of Method Variations... by Manu Airaksinen, Okko Räsänen, Sampsa Vanhatalo

    Published 2025-06-01
    “…The IMU data can be used for an algorithmic detection of different postures and movements, which may support more detailed assessments of complex behaviors, such as daily activities. …”
    Get full text
    Article
  9. 9

    Social Media Suicide Watch by Katherine Prothro

    Published 2025-07-01
    “…These distinctions are critical in determining the appropriate level of intervention, something that human judgment may handle more effectively than algorithmic detection. Additionally, existing systems designed to prevent suicide already infringe on individual rights. …”
    Get full text
    Article
  10. 10

    High resolution remote sensing image object detection algorithm based on improved YOLOv8 by ZHANG Xia, QIAO Huanyu, CAO Feng

    Published 2025-01-01
    “…Finally, combining NWD and WIoU loss functions, a new loss function NWD-WIoU was designed to accelerate the convergence speed of algorithm detection and improve the detection performance of the algorithm for small objects. …”
    Get full text
    Article
  11. 11

    Hadoop bottleneck detection algorithm based on information gain by Zaole TAN, Zhifeng HAO, Ruichu CAI, Xiaojun XIAO, Yu LU

    Published 2016-07-01
    “…Hadoop has become a major platform for big data storage and large data mining nowadays.Although Hadoop platform achieves high performance parallel computing through a distributed cluster of machines,the bottlenecks will inevitably appear on a machine when cluster load increases,because the cluster is composed of inexpensive host.Aiming at this problem,a bottleneck detection algorithms based on information gain was proposed.The algorithm detected cluster's bottlenecks resource by computing the information gain of each resource.The experiments show that the bottleneck detection algorithm is feasible.…”
    Get full text
    Article
  12. 12

    ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION by Alexis J. LOPEZ, Perfecto M. QUINTERO, Ana K. HERNANDEZ

    Published 2020-06-01
    “…The experimental results show that the algorithm detects optimally the abnormal routes using historical data as a base. …”
    Get full text
    Article
  13. 13

    A System for the Real-Time Detection of the U-Shaped Steel Bar Straightness on a Production Line by Yen-Jen Chen, Yu-Hsiu Yeh, Jen-Fu Yang

    Published 2025-06-01
    “…The experiment results show that the algorithm detects 123,128 steel bars in 193 h with an average accuracy of 99.64% for straight steel and an average recall of 95.70% for bent steel. …”
    Get full text
    Article
  14. 14

    Detection of Sentence Boundaries in Polish Based on Acoustic Cues by Magdalena IGRAS, Bartosz ZIÓŁKO

    Published 2016-01-01
    “…In the first stage, the algorithm detects pauses and divides a speech signal into segments. …”
    Get full text
    Article
  15. 15

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  16. 16

    Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1

    Published 2007-01-01
    “…A geographic E-mail path based algorithm called GEPA(geographic E-mail path analysis) was proposed to al-low network administrators to cut off spam traffic on E-mail delivery.The algorithm first extracted route information to build E-mail path subset,and then uesed an effective method mapping IP addresses or domain names of nodes in an E-mail path into geographic information.Further,the algorithm detected spam by their geographic information deviation,using E-mail traffics from a link of backbone border router in China,which crosses the country boundary of China,the performance of GEPA algorithm is evaluated.The experimental results indicated that a 13.9% reduction of E-mail can be achieved with method.The results also showed GEPA was effective and practical which can be implemented in a mas-sive traffic environment handling over millions of mails every day with small memory consumption.…”
    Get full text
    Article
  17. 17

    Design and Test of an Embedded Real-Time Compact Voltage Fingerprinting Algorithm for Enhanced Automotive Cybersecurity by Pierpaolo Dini, Ettore Soldaini, Sergio Saponara

    Published 2025-01-01
    “…The article proposes an algorithm for monitoring data traffic in CAN networks on board vehicles. This algorithm detects cyber-attacks through statistical analysis of voltage samples from the protocol’s physical layer. …”
    Get full text
    Article
  18. 18

    Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures by S. Nandhini, A. Rajeswari, N. R. Shanker

    Published 2024-12-01
    “…Abstract In this paper, cyber-attacks in IOT-WSN are detected through proposed optimized-Neural Network algorithms such as (i) Equilibrium Optimizer Neural Network (EO-NN), (ii) Particle Swarm Optimization (PSO-NN), (iii) Single Candidate Optimizer Neural Network (SCO-NN) and (iv) Single Candidate Optimizer Long Short-Term Memory (SCO-LSTM) with different connecting, hidden neural network layers and threat intelligence data. The proposed algorithms detect the attacker node, which frequently changes the behaviour such as attacker node/ normal node. …”
    Get full text
    Article
  19. 19

    A Novel Complex Networks Clustering Algorithm Based on the Core Influence of Nodes by Chao Tong, Jianwei Niu, Bin Dai, Zhongyu Xie

    Published 2014-01-01
    “…The clustering process is a simulation of the process of cluster formation in sociology. The algorithm detects the nodes with core influence through their betweenness centrality, and builds the cluster’s core structure by discriminant functions. …”
    Get full text
    Article
  20. 20

    Research of neural network algorithms for recognizing railway infrastructure objects in video images by E.V. Medvedeva, A.A. Perevoshchikova

    Published 2025-06-01
    “…Both algorithms are aimed at improving railway traffic safety. One algorithm detects foreign objects on railway tracks and objects relating to the railway infrastructure. …”
    Get full text
    Article