Showing 601 - 620 results of 2,490 for search '(flow OR low) detection algorithm', query time: 0.22s Refine Results
  1. 601

    MODERN METHODS OF AUTOMATIC RECTANGLE OBJECTS DETECTION by E. S. Matusevich, I. E. Kheidorov

    Published 2019-06-01
    “…Low-level and high-level feature extraction methods and algorithms for the image formation of a rectangular object were considered. …”
    Get full text
    Article
  2. 602

    Automated anomaly detection of IPTV user experience by Xiaomin TAN, Ai FANG, Duo JIN, Changjiang LI

    Published 2019-07-01
    “…The practice indicates that the algorithm with low calculation cost adapts to abnormal changes in the network and detect anomalies accurately and quickly, which reduces labor costs, improves operation efficiency and promotes intelligent operation.…”
    Get full text
    Article
  3. 603

    Lightweight blasthole image detection and positioning method by Shan PAN, Ting YU, Zhongwen YUE, Zijian TIAN, Qingyu JIN

    Published 2025-03-01
    “…To tackle the issues of large parameter size and low frames per second (FPS) in the blasthole image detection and localization algorithm network model, a lightweight Sc_C2f module is proposed to optimize the network structure. …”
    Get full text
    Article
  4. 604

    An experimental method for detecting objects in an aqueous environment by Kuzmin Yuri, Proshkin Stanislav

    Published 2025-01-01
    “…To facilitate this process, the researchers developed a specialized algorithm designed to filter out pulse and fluctuation interference. …”
    Get full text
    Article
  5. 605

    CME Velocity Field Calculation Model Based on an Unsupervised Transformer Optical Flow Network by Qingyang Chen, Hong Lin, Zhenping Qiang, Hui Liu, Kaifan Ji, Zhenhong Shang

    Published 2024-01-01
    “…The optical flow algorithm (OF) is one the main methods for calculating image velocity field and has many applications in space weather. …”
    Get full text
    Article
  6. 606

    Low-dimensional multiscale fast SAR image registration method by Jiamu Li, Wenbo Yu, Zijian Wang, Jiaxin Xie, Xiaojie Zhou, Yabo Liu, Zhongjun Yu, Meng Li, Yi Wang

    Published 2024-12-01
    “…First, the candidate points are detected in the modulus map of phase congruency (PC). …”
    Get full text
    Article
  7. 607

    Crowd anomaly estimation and detection: A review by A. Hussein, M.W. Raed, A. Al-Shaikhi, M. Mohandes, B. Liu

    Published 2024-09-01
    “…We present a comprehensive literature review on crowd anomaly detection using disruptive technologies such as radio frequency identification, wireless sensor networks, Wi-Fi, and Bluetooth low energy, employing device-free noninvasive algorithms based on received signal strength indicator variations to detect the speed and direction of a moving crowd to predict the onset of a stampede. …”
    Get full text
    Article
  8. 608

    An embedded intelligence engine for driver drowsiness detection by Shirisha Vadlamudi, Ali Ahmadinia

    Published 2022-01-01
    “…This drowsiness of drivers can be detected using various methods, for example, algorithms based on behavioural gestures, physiological signals and vitals. …”
    Get full text
    Article
  9. 609

    Fracture Detection in Traumatic Pelvic CT Images by Jie Wu, Pavani Davuluri, Kevin R. Ward, Charles Cockrell, Rosalyn Hobson, Kayvan Najarian

    Published 2012-01-01
    “…Manual detection of bone fracture from computed tomography (CT) images is very challenging due to low resolution of the images and the complex pelvic structures. …”
    Get full text
    Article
  10. 610

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  11. 611

    Concealed Weapon Detection Using Thermal Cameras by Juan D. Muñoz, Jesus Ruiz-Santaquiteria, Oscar Deniz, Gloria Bueno

    Published 2025-02-01
    “…Key contributions include a lightweight algorithm optimized for low-end embedded devices, making it suitable for wearable and mobile applications, and the creation of a tailored thermal dataset for controlled concealment scenarios. …”
    Get full text
    Article
  12. 612

    Multiscale Convolutional Neural Networks for Hand Detection by Shiyang Yan, Yizhang Xia, Jeremy S. Smith, Wenjin Lu, Bailing Zhang

    Published 2017-01-01
    “…Developed from the region-based CNN (R-CNN) model, we propose a hand detection scheme based on candidate regions generated by a generic region proposal algorithm, followed by multiscale information fusion from the popular VGG16 model. …”
    Get full text
    Article
  13. 613

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception by Joseph Bao, Murat Kantaciourglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Published 2023-05-01
    “…This implies that, to build better honeypots and enhance cyber deception capabilities, IoT honeypots need to generate realistic network traffic flows. To achieve this goal, we propose a novel deep learning based approach for generating traffic flows that mimic real network traffic due to user and IoT device interactions. …”
    Get full text
    Article
  14. 614

    Ensemble Method for Anomaly Detection On the Internet of Things by Kurniabudi Kurniabudi, Eko Arip Winanto, Lola Yorita Astri, Sharipuddin Sharipuddin

    Published 2024-01-01
    “…Therefore, the attack detection method must be able to recognize the type of attack on a very large data traffic flow and unbalanced data. …”
    Get full text
    Article
  15. 615

    Complex Indoor Human Detection with You Only Look Once: An Improved Network Designed for Human Detection in Complex Indoor Scenes by Yufeng Xu, Yan Fu

    Published 2024-11-01
    “…However, the complex indoor environment and background pose challenges to the detection task. The YOLOv8 algorithm is a cutting-edge technology in the field of object detection, but it is still affected by indoor low-light environments and large changes in human scale. …”
    Get full text
    Article
  16. 616

    A Flow-Speed Model for Motorways in England: Analysis Under Various Weather Conditions by Ye Liu, Haibo Chen, Chuhan Yin, Vivi Michalaki, Phillip Proctor, Gavin Rowley, Xiaowei Wang, Hongyuan Wei

    Published 2025-01-01
    “…The proposed model was fitter on both four-lane and lane-by-lane conditions than the existing models, in terms of lower relative error and RMSE values and higher <i>R</i><sup>2</sup> values (minimum <i>R</i><sup>2</sup> = 0.79), which means the proposed model captured the speed–flow relationship better. In addition, the proposed model was used to fit traffic characteristics under different weather conditions and decided the threshold of the CM algorithms using the Gaussian function. …”
    Get full text
    Article
  17. 617

    MRP-YOLO: An Improved YOLOv8 Algorithm for Steel Surface Defects by Shuxian Zhu, Yajie Zhou

    Published 2024-12-01
    “…This study proposes a novel method for steel defect detection based on the YOLO v8 algorithm, which improves detection accuracy while maintaining low computational complexity. …”
    Get full text
    Article
  18. 618

    DETECTION OF SOMATIC MUTATIONS IN THE BRAF GENE BY PYROSEQUENCING by O. P. Dribnokhodova, E. A. Dunaeva, G. V. Leshkina, E. A. Yarygina, A. Yu. Bukharina, Ya. A. Voiciehovskaya, E. V. Borisova, S. K. Bormotova, A. I. Daoud, V. N. Khlavich, K. O. Mironov

    Published 2021-10-01
    “…The pyrogram signal values for samples without mutations ranged from 0 to 19.5 % for different mutations. An analysis algorithm was developed to confirm the presence and differentiation of mutations in the 600 codon at a low proportion of the mutant allele based on the signals ratio on the pyrogram. …”
    Get full text
    Article
  19. 619
  20. 620

    Accurate and efficient insulator maintenance: A DETR algorithm for drone imagery. by Yanfeng Tian, Rodina Binti Ahmad, Nor Aniza Binti Abdullah

    Published 2025-01-01
    “…To address these challenges and achieve a more accurate inspection system, this manuscript introduces an insulator defect detection algorithm tailored for the low-quality images collected by drone-based imaging systems. …”
    Get full text
    Article