Search alternatives:
feature » features (Expand Search)
Showing 481 - 500 results of 1,858 for search 'Feature detection problem', query time: 0.15s Refine Results
  1. 481

    A traffic pattern detection algorithm based on multimodal sensing by Yanjun Qin, Haiyong Luo, Fang Zhao, Zhongliang Zhao, Mengling Jiang

    Published 2018-10-01
    “…Although much work has been done on transportation mode detection problem, the accuracy is not sufficient. …”
    Get full text
    Article
  2. 482

    An image and text-based fake news detection with transfer learning. by Esther Irawati Setiawan, Patrick Sutanto, Christian Nathaniel Purwanto, Joan Santoso, F X Ferdinandus, Nemuel Daniel Pah, Mauridhi Hery Purnomo

    Published 2025-01-01
    “…Fake news has emerged as a significant problem in today's information age, threatening the reliability of information sources. …”
    Get full text
    Article
  3. 483

    Optical Prior-Based Underwater Object Detection with Active Imaging by Jie Shen, Zhenxin Xu, Zhe Chen, Huibin Wang, Xiaotao Shi

    Published 2021-01-01
    “…To address this problem, this paper proposes an optical prior-based underwater object detection approach that takes advantage of optical principles to identify optical collimation over underwater images, providing valuable guidance for extracting object features. …”
    Get full text
    Article
  4. 484

    Using lightweight method to detect landslide from satellite imagery by Jinchi Dai, Xiaoai Dai, Renyuan Zhang, JiaXin Ma, Wenyu Li, Heng Lu, Weile Li, Shuneng Liang, Tangrui Dai, Yunfeng Shan, Donghui Zhang, Lei Zhao

    Published 2024-12-01
    “…Increasingly general-purpose detection models are being deployed for these complex and dynamic tasks involving features that are difficult to characterize. …”
    Get full text
    Article
  5. 485

    Application of machine learning methods for automated detection of network intrusions by M. V. Babicheva, I. A. Tretyakov

    Published 2023-05-01
    “…It is shown that a machine learning-based network intrusion detection system can solve the problem of flexible protection that could adapt to the ever-changing nature of network attacks, since one of the most important advantages of machine learning in detecting network intrusions is the ability to learn the signs of attacks and identify cases that are uncharacteristic of those that were observed earlier.…”
    Get full text
    Article
  6. 486

    An Interpretable Method for Anomaly Detection in Multivariate Time Series Predictions by Shijie Tang, Yong Ding, Huiyong Wang

    Published 2025-07-01
    “…Our method transforms the interpretation of anomalous features into solving an optimization problem in a normal “reference” state. …”
    Get full text
    Article
  7. 487

    Analysis for Detecting Banana Leaf Disease Using the CNN Method by Nita Helmawati, Ema Utami

    Published 2025-03-01
    “…To solve this problem, fast and accurate automated detection is needed to help farmers effectively identify diseases on banana leaves. …”
    Get full text
    Article
  8. 488

    Unsupervised Anomaly Detection of Forceps Force by Localizing the Region of Interest by Wenhui Zhuang, Kimihiko Masui, Naoto Kume, Megumi Nakao

    Published 2025-01-01
    “…In this study, we propose an alternative approach by formulating the force feedback problem as an image-based anomaly detection task. …”
    Get full text
    Article
  9. 489
  10. 490

    Research on Feature Extraction Method and Process Optimization of Rolling Bearing Faults Based on Electrostatic Monitoring by Ruochen Liu, Han Yin, Jianzhong Sun, Lanchun Zhang

    Published 2025-04-01
    “…In order to solve this problem, a sparse representation based on cluster-contraction stagewise orthogonal matching pursuit (CcStOMP) is proposed to extract the fault features in the electrostatic signals of rolling bearings. …”
    Get full text
    Article
  11. 491

    A fish counting model based on pyramid vision transformer with multi-scale feature enhancement by Jiaming Xin, Yiying Wang, Dashe Li, Zhongliang Xiang

    Published 2025-05-01
    “…This feature effectively addresses the problem of fish occlusion for improving the accuracy and reliability of the counting process. …”
    Get full text
    Article
  12. 492

    Multi-user physical layer authentication mechanism based on lightweight CNN and channel feature assistance by Yankun WANG, Dengke GUO, Dongtang MA, Jun XIONG, Xiaoying ZHANG

    Published 2023-11-01
    “…To address the problems of poor robustness and high complexity of current physical layer user authentication algorithms, a lightweight convolutional neural network (CNN) channel feature extraction algorithm was proposed to reduce the channel state response required for training by changing the form of network input, and a multi-user physical layer channel feature-assisted authentication mechanism was established based on this algorithm to design a detailed process from user registration to authentication, and multi-user authentication and network parameter update online were completed.Simulation results show that the proposed algorithm can complete multi-user authentication, obtain good detection performance with smaller training rounds, and require fewer training samples than existing multi-user authentication algorithms.…”
    Get full text
    Article
  13. 493
  14. 494

    Pig Detection Algorithm Based on Sliding Windows and PCA Convolution by Longqing Sun, Yan Liu, Shuaihua Chen, Bing Luo, Yiyang Li, Chunhong Liu

    Published 2019-01-01
    “…In order to solve the problems of low computational efficiency and low precision in pig detection algorithm based on sliding windows, this paper proposed a simple and efficient pig detection algorithm. …”
    Get full text
    Article
  15. 495

    Detection and monitoring of stress using wearables: a systematic review by Anuja Pinge, Vinaya Gad, Dheryta Jaisighani, Surjya Ghosh, Sougata Sen

    Published 2024-12-01
    “…One health-related area that has rapidly adopted wearable devices is the mental health monitoring and well-being area, which covers problems such as psychological distress. The continuous monitoring capability of wearable devices allows the detection and monitoring of stress, thus enabling early detection of mental health problems. …”
    Get full text
    Article
  16. 496

    Interaction based on method for spam detection in online social networks by Kan CHEN, Liang CHEN, Pei-dong ZHU, Yue-shan XIONG

    Published 2015-07-01
    “…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
    Get full text
    Article
  17. 497
  18. 498

    Efficient Intrusion Detection System for SDN Orchestrated Internet of Things by Esubalew M. Zeleke, Henock M. Melaku, Fikreselam G. Mengistu

    Published 2021-01-01
    “…It is an important technology that is aimed to solve the different problems existing in the traditional network systems. …”
    Get full text
    Article
  19. 499

    Fault Detection System of Photovoltaic Based on Artificial Neural Network by Ali Salman Zamzeer, Mansour S. Farhan, Haider TH. ALRikabi

    Published 2023-04-01
    “…Thus, the primary objective of the proposed study is to detect and diagnose particular types of PV system problems using an artificial neural network (ANN). …”
    Get full text
    Article
  20. 500

    Automatic detection and counting of wheat spike based on DMseg-Count by Hecang Zang, Yilong Peng, Meng Zhou, Guoqiang Li, Guoqing Zheng, Hualei Shen

    Published 2024-11-01
    “…However, in actual production, due to the susceptibility of wheat spike images to factors such as lighting conditions, shooting angles, occlusion, and overlap, the contour and features of wheat spike is unclear, which affects the accuracy of automatic detection and counting of wheat spike. …”
    Get full text
    Article