Search alternatives:
method » methods (Expand Search)
Showing 101 - 120 results of 8,230 for search 'Optimal detection method', query time: 0.22s Refine Results
  1. 101

    Optimizing Sensor Placement for Event Detection: A Case Study in Gaseous Chemical Detection by Priscile Fogou Suawa, Christian Herglotz

    Published 2025-04-01
    “…In dynamic industrial environments, strategic sensor placement is key to accurately monitoring equipment and detecting critical events. Despite progress in Industry 4.0 and the Internet of Things, research on optimal sensor placement remains limited. …”
    Get full text
    Article
  2. 102

    Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer by Brij B. Gupta, Akshat Gaurav, Wadee Alhalabi, Varsha Arya, Eman Alharbi, Kwok Tai Chui

    Published 2025-06-01
    “…After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. …”
    Get full text
    Article
  3. 103
  4. 104
  5. 105

    Detection and Optimization of Traffic Networks Based on Voronoi Diagram by Rui Tao, Jian Liu, Yuqing Song, Rui Peng, Dali Zhang, Jiangang Qiao

    Published 2021-01-01
    “…We present a traffic peak detection method, which constructs the Voronoi diagram of the input traffic flow data and computes the prominence of candidate peak points using the diagram. …”
    Get full text
    Article
  6. 106

    Adaptive weight optimization with large pretraining for pest detection by Kejian Yu, Wenwen Xu, Fuqin Geng, Yunzhi Wu

    Published 2025-12-01
    “…Herein, we propose an adaptive weight optimization method based on transfer learning for multimodal pest detection. …”
    Get full text
    Article
  7. 107

    Optimizing screening procedures for early detection of glycemic disorders by Inna Vladimirovna Misnikova, Alexander Vasil'evich Dreval, Yulia Alexandrovna Kovaleva, Valeria Alekseevna Gubkina, Tatiana Sergeevna Lakeeva

    Published 2014-03-01
    “…To estimate the actual prevalence of type 2 diabetes mellitus (T2DM) and prediabetes in individuals at high risk for T2DM and to develop an optimized stepwise screening procedure. Materials and Methods. …”
    Get full text
    Article
  8. 108

    Hybrid metaheuristic optimization for detecting and diagnosing noncommunicable diseases by Saleem Malik, S. Gopal Krishna Patro, Chandrakanta Mahanty, Saravanapriya Kumar, Ayodele Lasisi, Quadri Noorulhasan Naveed, Anjanabhargavi Kulkarni, Abdulrajak Buradi, Addisu Frinjo Emma, Naoufel Kraiem

    Published 2025-03-01
    “…Abstract In our data-driven world, the healthcare sector faces significant challenges in the early detection and management of Non-Communicable Diseases (NCDs). …”
    Get full text
    Article
  9. 109
  10. 110

    Initial evaluation of a state-wide multi-method survey to estimate koala occupancy and abundance by Graeme R. Gillespie, Nicole Gallahar, Allen P. McIlwee, Benjamin Douglas Hope, Elliot B. Webb, Matthew Clements, Veronica F. Gama, Madison Casley, Tim S. Jessop

    Published 2025-07-01
    “…We evaluated how these methods, individually and combined, influenced koala detection, occupancy, and relative abundance-related performance criteria to optimise the state-wide koala survey. …”
    Get full text
    Article
  11. 111
  12. 112

    A Coverage-Based Cooperative Detection Method for CDUAV: Insights from Prediction Error Pipeline Modeling by Jiong Li, Xianhai Feng, Yangchao He, Lei Shao

    Published 2025-05-01
    “…To address the challenges of detection and acquisition caused by trajectory prediction errors during the midcourse–terminal guidance handover phase in cross-domain unmanned aerial vehicles (CDUAV), this study proposes a collaborative multi-interceptor detection coverage optimization method based on predictive error pipeline modeling. …”
    Get full text
    Article
  13. 113

    Optimization of Parameters and Comparison of Detection Signals for Planar Coil Particle Detection Sensors with Different Core Materials by Changzhi Gu, Chao Liu, Bo Liu, Wenbo Zhang, Chenzhao Bai, Chenyong Wang, Yuqing Sun, Hongpeng Zhang

    Published 2024-12-01
    “…We obtain the sensor structure after optimizing the magnetic field. The sensor is made using experimental methods, and the iron particles and copper particles are detected. …”
    Get full text
    Article
  14. 114

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  15. 115
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120

    Model updating method for detect and localize structural damage using generalized flexibility matrix and improved grey wolf optimizer algorithm (I-GWO) by Sina Sadraei, Majid Gholhaki, Omid Rezaifar

    Published 2025-07-01
    “…Furthermore, they show that when compared to grey wolf optimizer (GWO) and particle swarm optimizer (PSO), I-GWO can offer a dependable method for precisely detecting damage.…”
    Get full text
    Article