Search alternatives:
feature » features (Expand Search)
Showing 41 - 60 results of 1,858 for search 'Feature detection problem', query time: 0.15s Refine Results
  1. 41

    Camouflage Target Detection Method with Mutual Compensation of Local-Global Features by HE Wenhao, GE Haibo

    Published 2025-02-01
    “…In response to the above problems, this paper proposes a camouflaged target detection method based on local-global feature mutual compensation, which uses local features and global features to compensate for each other to detect camouflaged targets. …”
    Get full text
    Article
  2. 42

    YOLO-v4 Small Object Detection Algorithm Fused With L-α by ZHANG Ning, YU Ming, REN Honge, AO Rui, ZHAO Long

    Published 2023-02-01
    “… The detection ability for small object is still need to be improved urgently in spite of the rapidly developing object detection technology based on deep learning at present.Compared with large objects, small object detection tasks hold drawbacks of low resolution and feature loss which leads to that many general algorithms cannot be directly applied to small object detection.The feature pyramid fusion can effectively combine the features of deep and shallow layers to enhance the performance.To solve the problem most models existing ignoring the imbalance of information during the feature fusion between adjacent layers, it is proposed to integrate the idea of fusion factor into the PANet of YOLOv4, use the fusion factor L-αto control the amount of information transmitted from the deep layer to the shallow, so as to effectively improve the efficiency of information fusion and enhance the ability of YOLO-v4 for small objects detection.With the addition of L-αin YOLO- V4 model, the experiment results show that the APtiny50and APsmall50on the TinyPerson are improved by 2.14% and 1.85% respectively, while the AP and APS on the MS COCO are separately increased by 1.4% and 2.7%.It is proved that this improved method is effective for small object detection with the evidence of better result than other small object detection algorithms.…”
    Get full text
    Article
  3. 43

    YOLO-OD: Obstacle Detection for Visually Impaired Navigation Assistance by Wei Wang, Bin Jing, Xiaoru Yu, Yan Sun, Liping Yang, Chunliang Wang

    Published 2024-11-01
    “…To solve the problem of detecting relatively small obstacles in outdoor environments, we propose the Enhanced Feature Attention Head (EFAH). …”
    Get full text
    Article
  4. 44
  5. 45
  6. 46

    Lightweight blasthole image detection and positioning method by Shan PAN, Ting YU, Zhongwen YUE, Zijian TIAN, Qingyu JIN

    Published 2025-03-01
    “…In terms of blasthole detection accuracy, the algorithm addresses the issue of false detection caused by the influence of surrounding rock backgrounds and rock shadows, as well as the problem of missed detection due to limited contextual information and identifiable features of blastholes in images. …”
    Get full text
    Article
  7. 47

    Fish Detection in Fishways for Hydropower Stations Using Bidirectional Cross-Scale Feature Fusion by Junming Wang, Yuanfeng Gong, Wupeng Deng, Enshun Lu, Xinyu Hu, Daode Zhang

    Published 2025-03-01
    “…Firstly, the backbone network integrates FasterNet-Block, C2f, and an efficient multi-scale EMA attention mechanism to address attention dispersion problems during feature extraction, delivering real-time object detection across different scales. …”
    Get full text
    Article
  8. 48

    Multiscale feature cross‐layer fusion remote sensing target detection method by Yuting Lin, Jianxun Zhang, Jiaming Huang

    Published 2023-03-01
    “…Finally, a multiscale feature cross‐layer fusion structure (S‐160) is proposed based on YOLOv5, which improves the detection accuracy of each scale target by fusing shallow and deep feature information and introduces new large‐scale features for small target detection to solve the problem that ultrasmall targets in remote sensing images cannot be recognised. …”
    Get full text
    Article
  9. 49

    A photovoltaic anomaly data identification method based on image feature detection by QIU Yutao, ZHANG Lei, ZHOU Kaiyun, YAN Min, SUN Jintong, LONG Huan

    Published 2025-05-01
    “…To address this, this paper introduces an anomaly data identification algorithm based on image feature detection and dual-threshold processing. This method maps numerical data to images, transforming the anomaly detection problem into an image processing problem. …”
    Get full text
    Article
  10. 50

    Ship detection optimization method in SAR imagery based on multi-feature weighting by Quanhua ZHAO, Xiao WANG, Yu LI, Guanghui WANG

    Published 2020-03-01
    “…Aiming at the problem that the accuracy of traditional ship detection algorithms is not satisfying in complex scene with many false alarm targets,a ship detection optimization method in SAR imagery based on multi-feature weighting was proposed.Firstly,the marker-based watershed algorithm was employed to remove land from SAR amplitude image.Then,the CFAR algorithm based on log-normal distribution was used to obtain candidate targets from no land image.Furthermore,the length to width ratio,the ship area and the contrast ratio of the candidate targets were extracted.Finally,a variance coefficient method was proposed to distribute the weight of the three features,and the confidence levels were calculated by combining the normalized feature vectors of the candidate targets with the feature weight.By determining the best confidence level,false alarm targets among the candidate targets were removed to optimize ship detection results.In order to verify the proposed method,experiments were carried on with the GF-3 SAR images of different complex scenes.The experimental results show that the proposed method is feasible and effective.…”
    Get full text
    Article
  11. 51

    A feature-based intelligent deduplication compression system with extreme resemblance detection by Xiaotong Wu, Jiaquan Gao, Genlin Ji, Taotao Wu, Yuan Tian, Najla Al-Nabhan

    Published 2021-07-01
    “…In this paper, we study the problem of utilising the duplicate and resemblance detection techniques to further compress data. …”
    Get full text
    Article
  12. 52

    Multilevel Feature Fusion-Based GCN for Rumor Detection with Topic Relevance Mining by Shenyu Chen, Meng Li, Weifeng Yang

    Published 2023-01-01
    “…This paper addresses the problem of detecting internet rumors in social media. …”
    Get full text
    Article
  13. 53

    Music Classification and Detection of Location Factors of Feature Words in Complex Noise Environment by Yulan Xu, Qiaowei Li

    Published 2021-01-01
    “…In order to solve the problem of the influence of feature word position in lyrics on music emotion classification, this paper designs a music classification and detection model in complex noise environment. …”
    Get full text
    Article
  14. 54

    Leaf disease detection and classification in food crops with efficient feature dimensionality reduction. by Khasim Syed, Shaik Salma Asiya Begum, Anitha Rani Palakayala, G V Vidya Lakshmi, Sateesh Gorikapudi

    Published 2025-01-01
    “…This study proposes a computer vision system that integrates BiLSTM with CNN features for image categorization tasks. The system effectively reduces feature dimensionality using learned features, addressing the high dimensionality problem in leaf image data and enabling early, accurate disease identification. …”
    Get full text
    Article
  15. 55

    Fan Blade Crack Detection Algorithm Based on Multi-Scale Feature Fusion by Yongjun Qi, Hailin Tang, Altangerel Khuder

    Published 2025-01-01
    “…In order to quickly and accurately detect and maintain the fan blades, based on the intelligent big data from the environment, we propose the convolutional neural network model to solve the problem of low recognition rate due to the lack of feature extraction in the fan blade crack image, and the long short-term memory network (Long Short-Term Memory, LSTM) convolutional neural network model, and the dimensionality reduction of the captured image data, which is beneficial to improve the recognition rate of the picture and reduce the loss rate of the picture through the detection model’s suitable recognition of complex background problems such as target occlusion and overlap. …”
    Get full text
    Article
  16. 56

    Insulator Surface Defect Detection Method Based on Graph Feature Diffusion Distillation by Shucai Li, Na Zhang, Gang Yang, Yannong Hou, Xingzhong Zhang

    Published 2025-06-01
    “…Aiming at the difficulties of scarcity of defect samples on the surface of power insulators, irregular morphology and insufficient pixel-level localization accuracy, this paper proposes a defect detection method based on graph feature diffusion distillation named GFDD. …”
    Get full text
    Article
  17. 57

    DMFFNet: Dual-Mode Multiscale Feature Fusion-Based Pedestrian Detection Method by Ruizhe Hu, Ting Rui, Yan Ouyang, Jinkang Wang, Qunyan Jiang, Yinan Du

    Published 2025-01-01
    “…To address this problem, we propose a dual-modal multi-scale feature fusion network (DMFFNet). …”
    Get full text
    Article
  18. 58

    Machine learning algorithm for intelligent detection of WebShell by Hua DAI, Jing LI, Xin-dai LU, Xin SUN

    Published 2017-04-01
    “…WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To solve these problems,a supervised machine learning algorithm was put forward to detect WebShell intelligently.By learning the features of existing WebShell and non-existing WebShell pages,the algorithm can make prediction of the unknown pages,and the flexibility and adaptability were both very good.Compared with the traditional WebShell detection methods,the experiment proves that the algorithm has higher detection efficiency and accuracy,and at the same time there is a certain probability to detect new types of WebShell.…”
    Get full text
    Article
  19. 59

    A Moving Object Detection Method Based on Conditional Information and Feature Deepening by Hongrui Zhang, Luxia Yang

    Published 2025-01-01
    “…In the field of moving object detection methods relying on generative adversarial networks, there are problems such as uncontrollable generation results and incomplete extraction of target details. …”
    Get full text
    Article
  20. 60

    Multi-stage detection method for APT attack based on sample feature reinforcement by Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG

    Published 2022-12-01
    “…Given the problems that the current APT attack detection methods were difficult to perceive the diversity of stage flow features and generally hard to detect the long duration APT attack sequences and potential APT attacks with different attack stages, a multi-stage detection method for APT attack based on sample feature reinforcement was proposed.Firstly, the malicious flow was divided into different attack stages and the APT attack identification sequences were constructed by analyzing the characteristics of the APT attack.In addition, sequence generative adversarial network was used to simulate the generation of identification sequences in the multi-stage of APT attacks.Sample feature reinforcement was achieved by increasing the number of sequence samples in different stages, which improved the diversity of multi-stage sample features.Finally, a multi-stage detection network was proposed.Based on the multi-stage perceptual attention mechanism, the extracted multi-stage flow features and identification sequences were calculated by attention to obtain the stage feature vectors.The feature vectors were used as auxiliary information to splice with the identification sequences.The detection model’s perception ability in different stages was enhanced and the detection accuracy was improved.The experimental results show that the proposed method has remarkable detection effects on two benchmark datasets and has better effects on multi-class potential APT attacks than other models.…”
    Get full text
    Article