Showing 261 - 280 results of 2,490 for search '(flow OR low) detection algorithm', query time: 0.23s Refine Results
  1. 261

    Detection of Wood Boring Insects’ Larvae Based on the Acoustic Signal Analysis and the Artificial Intelligence Algorithm by Piotr BILSKI, Piotr BOBIŃSKI, Adam KRAJEWSKI, Piotr WITOMSKI

    Published 2016-10-01
    “…The results allowed us to assess the effectiveness of the old house borer’s detection by the acoustic analysis enhanced with the AI algorithm.…”
    Get full text
    Article
  2. 262
  3. 263

    YOLO-Helmet: A Novel Algorithm for Detecting Dense Small Safety Helmets in Construction Scenes by Guoliang Yang, Xinfang Hong, Yangyang Sheng, Liuyan Sun

    Published 2024-01-01
    “…However, the current algorithms for detecting helmet-wearing face several challenges, including high missed detection rates and low accuracy in detecting dense small safety helmets. …”
    Get full text
    Article
  4. 264

    Improved Algorithm for Vehicle Bottom Safety Detection Based on YOLOv8n: PSP-YOLO by Di Zhao, Yulin Cheng, Sizhe Mao

    Published 2024-12-01
    “…To address these issues and improve the real-time performance of under-vehicle safety inspection, the YOLOv8n object-detection algorithm was enhanced, resulting in the PSP-YOLO algorithm. …”
    Get full text
    Article
  5. 265

    Enhancing Real-Time Road Object Detection: The RD-YOLO Algorithm With Higher Precision and Efficiency by Weijian Wang, Wei Yu

    Published 2024-01-01
    “…To address the challenges of low detection accuracy, high miss rates, and inefficient model computation in complex road scenes, this study introduces RD-YOLO, an enhanced version of the YOLOX algorithm. …”
    Get full text
    Article
  6. 266

    Research on surface loss detection algorithm of wind turbine blade based on FRE-DETR network by Jingwei Yang, Xiaocong Chen, Shengxian Cao, Bo Zhao, Zhenhao Tang, Gong Wang, Xingyu Li, Han Gao

    Published 2025-04-01
    “…Wind turbine generators operate in harsh areas for a long time, resulting in frequent problems such as blade breakage, and traditional blade defect detection methods have low detection accuracy. In this paper, an end-toend target detection algorithm FRE-DETR based on wind turbine blade defects is designed, and the detection speed and detection accuracy of the end-to-end detection model are further improved by redesigning the feature extraction location in the backbone network and proposing a feature selection and fusion module. …”
    Get full text
    Article
  7. 267
  8. 268

    YOLO-SRW: An Enhanced YOLO Algorithm for Detecting Prohibited Items in X-Ray Security Images by Minwei Chen, Zhixian Zhang, Nian Jiang, Xingxing Li, Xin Zhang

    Published 2025-01-01
    “…To address the challenges of false positives and false negatives in prohibited item detection within X-ray security images, caused by complex backgrounds, poor image quality, and varying scales, this paper proposes an improved algorithm based on YOLOv8, named YOLO-SRW, to improve the accuracy of detecting prohibited items. …”
    Get full text
    Article
  9. 269

    A Lightweight Algorithm for Detection and Grading of Olive Ripeness Based on Improved YOLOv11n by Fengwu Zhu, Suyu Wang, Min Liu, Weijie Wang, Weizhi Feng

    Published 2025-04-01
    “…To address these limitations, this study proposes a lightweight algorithm for detection and grading of olive ripeness based on an Improved YOLOv11n framework. …”
    Get full text
    Article
  10. 270

    A novel myocarditis detection combining deep reinforcement learning and an improved differential evolution algorithm by Jing Yang, Touseef Sadiq, Jiale Xiong, Muhammad Awais, Uzair Aslam Bhatti, Roohallah Alizadehsani, Juan Manuel Gorriz

    Published 2024-12-01
    “…However, the detection of myocarditis using CMR images can be challenging due to low contrast, variable noise, and the presence of multiple high CMR slices per patient. …”
    Get full text
    Article
  11. 271

    An Asynchronous Training-Free SSVEP-BCI Detection Algorithm for Non-Equal Prior Probability Scenarios by Junsong Wang, Yuntian Cui, Hongxin Zhang, Haolin Wu, Chen Yang

    Published 2024-01-01
    “…Most of the existing steady-state visual evoked potential (SSVEP) detection algorithms treat the prior probability of each alternative target being selected as equal. …”
    Get full text
    Article
  12. 272
  13. 273

    A global object-oriented dynamic network for low-altitude remote sensing object detection by Daoze Tang, Shuyun Tang, Yalin Wang, Shaoyun Guan, Yining Jin

    Published 2025-05-01
    “…However, achieving high accuracy with deep learning algorithms remains challenging due to the stringent requirements for low computational cost, minimal parameters, and real-time performance. …”
    Get full text
    Article
  14. 274

    Developing an Algorithm for Detecting Suspicious Trades in Tehran Stock Exchange Based on Spoof Trading Model by Reza Tehrani, Saeed Fallahpour, Hamid Nouralidokht

    Published 2023-03-01
    “…More specifically, this paper studies manipulated stocks by looking at market microstructure (intraday transactions) and aims to introduce an algorithm for detecting suspicious trades so that regulators can detect them beforehand. …”
    Get full text
    Article
  15. 275
  16. 276

    MSFA-YOLO: A Multi-Scale SAR Ship Detection Algorithm Based on Fused Attention by Zhao Liangjun, Ning Feng, Xi Yubin, Liang Gang, He Zhongliang, Zhang Yuanyang

    Published 2024-01-01
    “…Exhibiting superior performance to existing SAR ship detection models in terms of accuracy, the MSFA-YOLO algorithm represents a significant advancement, establishing itself as the current state-of-the-art algorithm in SAR ship detection.…”
    Get full text
    Article
  17. 277

    Research and Application of a Multitarget Detection Algorithm Based on Improved YOLOv8 for Indoor Objects by Yanzhen Wang, Wei Wang, Xiaolong Zhou, Xubin Dong, Jianyong Li, Qi Zhao, Xinyu Yang, Yao Wang

    Published 2025-01-01
    “…The goal is to achieve efficient multitarget detection of everyday objects and to improve the accuracy and recall of the detection algorithm. …”
    Get full text
    Article
  18. 278

    Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny by ZHANG Guanghua, LI Congfa, LI Gangying, LU Weidang

    Published 2025-05-01
    “…Among these, the pedestrian, people, and motor categories show especially strong detection performance. 4) The detection performance of the improved algorithm is verified in real-world scenarios through comparative analysis. …”
    Get full text
    Article
  19. 279

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article
  20. 280

    Intrusion detection model based on fuzzy theory and association rules by Jianwu ZHANG, Jiasen HUANG, Di ZHOU

    Published 2019-05-01
    “…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
    Get full text
    Article