Search alternatives:
feature » features (Expand Search)
Showing 1,281 - 1,300 results of 1,858 for search 'Feature detection problem', query time: 0.15s Refine Results
  1. 1281

    Traffic Classification in Software-Defined Networking Using Genetic Programming Tools by Spiridoula V. Margariti, Ioannis G. Tsoulos, Evangelia Kiousi, Eleftherios Stergiou

    Published 2024-09-01
    “…The key element of the GenClass method is that it can generate classification rules programmatically and detect the hidden associations that exist between the problem features and the desired classes. …”
    Get full text
    Article
  2. 1282

    A Crowd Counting Framework Combining with Crowd Location by Jin Zhang, Sheng Chen, Sen Tian, Wenan Gong, Guoshan Cai, Ying Wang

    Published 2021-01-01
    “…In this paper, a new framework is proposed to resolve the problem. The proposed framework includes two parts. …”
    Get full text
    Article
  3. 1283

    Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion by Zhenwan Zou, Bin Wang, Tao Chen, Jia Chen

    Published 2025-06-01
    “…To solve this problem, this paper proposes a hybrid method that combines multimodal data-aware attacks with Light Gradient Boosting Machine (LightGBM) and Support Vector Regression (SVR) agent models. …”
    Get full text
    Article
  4. 1284

    YOLOv5 garbage classification method with GhostNet by Li Yao, Hu Junguo, Le Yang

    Published 2024-01-01
    “…By adding an improved version of channel attention module to the network, the important channel features are strengthened and more deep-level feature information is obtained. …”
    Get full text
    Article
  5. 1285

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article
  6. 1286

    Proteomic selection of immunodiagnostic antigens for Trypanosoma congolense. by Jennifer R Fleming, Lalitha Sastry, Thomas W M Crozier, Grant B Napier, Lauren Sullivan, Michael A J Ferguson

    Published 2014-06-01
    “…Animal African Trypanosomosis (AAT) presents a severe problem for agricultural development in sub-Saharan Africa. …”
    Get full text
    Article
  7. 1287

    Integration of Multivariate Beta-based Hidden Markov Models and Support Vector Machines with Medical Applications by Narges Manouchehri, Nizar Bouguila

    Published 2022-05-01
    “…Moreover, in some applications, data may have various feature-length. We tackle this problem with Fisher Kernel. …”
    Get full text
    Article
  8. 1288

    Railway safety monitoring algorithm based on distributed optical fiber vibration sensor by Fuyang CHEN, Bin JIANG, Yu SHA

    Published 2020-09-01
    “…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
    Get full text
    Article
  9. 1289

    Transient Voltage Unit Protection Based on Fault Information Fusion by Zhenwei Guo, Ruiqiang Zhao, Haojie Li, Yongyan Jiang

    Published 2024-01-01
    “…Transient voltage high-frequency instantaneous amplitudes are obtained and integrated using the Variational Mode Decomposition Hilbert Transform (VMD-HT) to increase the stability of high-frequency fault signal detection. This algorithm solved the original problem of 42.2% cross-data, 41.6% false operations, and 8.9% refusal to operate. …”
    Get full text
    Article
  10. 1290

    Social Navigation in Warehouse Logistics Based on Artificial Intelligence and RGB-D by Burhan Turgut Ulutürk, Emre Sebat, Hilal Öztemel, Bilal Gürevin

    Published 2025-04-01
    “…Purpose: Ensuring both human safety and transportation efficiency simultaneously during the navigation of autonomous mobile robots (AMRs) in warehouse logistics is a challenging problem due to dynamic environments and diverse obstacles. …”
    Get full text
    Article
  11. 1291

    CONTROL RESEARCH AND AUTOMATION OF STOCHASTIC DEVIATIONS IN ORGANISATIONAL MANAGEMENT PRODUCTION PROCESS SYSTEMS by R. B. Aghajanyan, D. O. Baizhanova, M. V. Markosyan

    Published 2018-06-01
    “…A method is proposed for the automated realisation of deviation from identification processes based on the processing of unstructured messages, the automatic generation of characteristic control parameters and a comparison of registered values with normative ones. The problem of detecting the primary cause of deviations is considered on the basis of the algorithm for processing the cause-effect relationships and probabilistic values of the relationship between the different defined groups of deviations.Results. …”
    Get full text
    Article
  12. 1292

    Application of Split-frequency AVO Technology in the Evaluation of Middle-depth Thin Reservoirs in the Xihu Depression by Yangsen LI, Wei WANG, Bingying LI, Yunxin MAO, Xiaohui LIU

    Published 2025-05-01
    “…To address the complex thin layer simulation problem, this study uses the reflectivity method to conduct AVO forward simulations of thin reservoirs, and finds that the AVO response of the thin layer has an obvious “V” feature at the far offset owing to the tuning effect. …”
    Get full text
    Article
  13. 1293

    Corner Enhancement Module Based on Deformable Convolutional Networks and Parallel Ensemble Processing Methods for Distorted License Plate Recognition in Real Environments by Sehun Kim, Seongsoo Cho, Jangyeop Kim, Kwangchul Son

    Published 2025-06-01
    “…For this purpose, the proposed system incorporates vehicle and license plate detection based on YOLOv8 and integrates a Corner Enhancement Module (CEM) utilizing a Deformable Convolutional Network (DCN) into the model’s neck to ensure robust feature extraction against geometric transformations. …”
    Get full text
    Article
  14. 1294

    Robust screening of atrial fibrillation with distribution classification by Pierre-François Massiani, Lukas Haverbeck, Claas Thesing, Friedrich Solowjow, Marlo Verket, Matthias Daniel Zink, Katharina Schütt, Dirk Müller-Wieland, Nikolaus Marx, Sebastian Trimpe

    Published 2025-07-01
    “…It achieves state-of-the-art performance and unprecedented robustness on the screening problem while only leveraging one interpretable feature and little training data. …”
    Get full text
    Article
  15. 1295

    Research and Implementation of Travel Aids for Blind and Visually Impaired People by Jun Xu, Shilong Xu, Mingyu Ma, Jing Ma, Chuanlong Li

    Published 2025-07-01
    “…To address embedded device computational constraints, we developed a lightweight object detection and segmentation algorithm. Key innovations include a multi-scale attention feature extraction backbone, a dual-stream fusion module incorporating the Mamba architecture, and adaptive context-aware detection/segmentation heads. …”
    Get full text
    Article
  16. 1296
  17. 1297

    Development of Impact Factors Reverse Analysis Method for Software Complexes’ Support Automation by Andrii Pukach, Vasyl Teslyuk, Nataliia Lysa, Liubomyr Sikora

    Published 2025-05-01
    “…This research represents a corresponding and developed specialized impact factors reverse analysis method for software complexes’ support automation; it is intended for the analysis of impact factors affecting the supported software’s (or processes of its comprehensive support) subjective perception results, as one of the constituent tasks of the more complex problem of software complexes’ support automation. …”
    Get full text
    Article
  18. 1298

    An efficient cost calculation method for disparity estimation of stereo matching considering shadow occlusion by Hongjun Sha, Wei Yuan, Xunping Wang, Xiuliu Yuan, Shunichi Koshimura

    Published 2025-05-01
    “…This research work proposes a novel cost calculation method that considers shadow occlusion areas to address the issues of poor disparity estimation in urban areas, termed Matching Cost based on Shadow Properties (MCSP), error estimation of the shadow occlusion area, which not only considers the problem of disparity error estimation in the shadow occlusion areas but also considers the problem of edge integrity and smoothness in the disparity estimation results. …”
    Get full text
    Article
  19. 1299

    Cotton Weed-YOLO: A Lightweight and Highly Accurate Cotton Weed Identification Model for Precision Agriculture by Jinghuan Hu, He Gong, Shijun Li, Ye Mu, Ying Guo, Yu Sun, Tianli Hu, Yu Bao

    Published 2024-12-01
    “…In this paper, a novel weed recognition model, Cotton Weed-YOLO, is proposed to improve the accuracy and efficiency of weed detection. CW-YOLO is based on YOLOv8 and introduces a dual-branch structure combining a Vision Transformer and a Convolutional Neural Network to address the problems of the small receptive field of the CNN and the high computational complexity of the transformer. …”
    Get full text
    Article
  20. 1300

    A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks by Yuhong Wang

    Published 2022-01-01
    “…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
    Get full text
    Article