Showing 301 - 320 results of 8,230 for search 'Optimal detection methods', query time: 0.20s Refine Results
  1. 301

    A Sensor Data Prediction and Early-Warning Method for Coal Mining Faces Based on the MTGNN-Bayesian-IF-DBSCAN Algorithm by Mingyang Liu, Xiaodong Wang, Wei Qiao, Hongbo Shang, Zhenguo Yan, Zhixin Qin

    Published 2025-07-01
    “…In the context of intelligent coal mine safety monitoring, an integrated prediction and early-warning method named MTGNN-Bayesian-IF-DBSCAN (Multi-Task Graph Neural Network–Bayesian Optimization–Isolation Forest–Density-Based Spatial Clustering of Applications with Noise) is proposed to address the challenges of gas concentration prediction and anomaly detection in coal mining faces. …”
    Get full text
    Article
  2. 302
  3. 303
  4. 304

    Bitemporal Remote Sensing Change Detection With State-Space Models by Lukun Wang, Qihang Sun, Jiaming Pei, Muhammad Attique Khan, Maryam M. Al Dabel, Yasser D. Al-Otaibi, Ali Kashif Bashir

    Published 2025-01-01
    “…This article investigates the impact of different scanning mechanisms within Mamba, evaluating five mainstream methods to optimize its performance in change detection. …”
    Get full text
    Article
  5. 305

    Gas sensors and real-time video for accurate classroom occupancy detection by Koundinya Challa, Issa W. AlHmoud, Chandra Jaiswal, Balakrishna Gokaraju, Raymond Tesireo

    Published 2025-06-01
    “…This study introduces an advanced methodology for optimizing HVAC efficiency through real-time classroom occupancy detection by combining video analysis with gas sensor data to enhance accuracy and reliability. …”
    Get full text
    Article
  6. 306

    An Accurate GNSS Spoofing Detection Method Based on Multiscale Eye Diagrams by Chuanyu Wu, Yuanfa Ji, Xiyan Sun

    Published 2025-02-01
    “…The results show that the MSC-MMP outperforms traditional edge extraction algorithms by over 0.072 in terms of the optimal dataset scale F score (ODS-F). Compared to signal quality monitoring (SQM) and Carrier-to-Noise Ratio methods, the EDDM-MSC-MMP method increases spoofing detection coverage by over 60%, achieving the highest detection rate in the TEXBAT dataset. …”
    Get full text
    Article
  7. 307

    A Classification Data Packets Using the Threshold Method for Detection of DDoS by Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, Muhammad Nur Faiz, Arif Wirawan Muhammad, Santi Purwaningrum, Laura Sari

    Published 2024-06-01
    “…Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.…”
    Get full text
    Article
  8. 308

    Text Detection Method With Emphasis on Text Component Importance and Lightweight Design by Lanlan Yin, Qiming Wu

    Published 2024-01-01
    “…As the main carrier of information exchange, text detection is crucial in image scenes. However, the complexity of text detection tasks is high, there are many interference items, and existing text detection methods have problems such as excessive smoothing. …”
    Get full text
    Article
  9. 309

    Harnessing feature pruning with optimal deep learning based DDoS cyberattack detection on IoT environment by Eunmok Yang, Sooyong Jeong, Changho Seo

    Published 2025-05-01
    “…In contrast, Artificial Intelligence (AI)-based methods have proven more effective in detecting cyber-attacks than conventional approaches. …”
    Get full text
    Article
  10. 310

    Non-destructive detection of early wheat germination via deep learning-optimized terahertz imaging by Guangming Li, Hongyi Ge, Yuying Jiang, Yuan Zhang, Xi Jin

    Published 2025-05-01
    “…Abstract Wheat, a major global cereal crop, is prone to quality degradation from early sprouting when stored improperly, resulting in substantial economic losses. Traditional methods for detecting early sprouting are labor-intensive and destructive, underscoring the need for rapid, non-destructive alternatives. …”
    Get full text
    Article
  11. 311
  12. 312

    Tensor Network Methods for Hyperparameter Optimization and Compression of Convolutional Neural Networks by A. Naumov, A. Melnikov, M. Perelshtein, Ar. Melnikov, V. Abronin, F. Oksanichenko

    Published 2025-02-01
    “…In this work, we address these challenges using Tensor Network-based methods. For HPO, we propose and evaluate the TetraOpt algorithm against various optimization algorithms. …”
    Get full text
    Article
  13. 313

    Optimal Skin Prick Test Panel for Detecting Respiratory Allergens in Children: A Retrospective Study by Aykut Eşki, Gökçen Kartal Öztürk, Figen Gülen, Esen Demir

    Published 2023-06-01
    “…This study aims to identify the sensitization pattern of children in different age groups and to define the minimum number and type of allergen extracts in an SPT to detect a sensitized child.Materials and Methods:This retrospective study was conducted in the Outpatient Clinic of the Pediatric Allergy, Immunology, and Pulmonology Unit of a tertiary Children’s Hospital from October 2019 to December 2020. …”
    Get full text
    Article
  14. 314

    Aptamer-based Gold Nanoparticles Colorimetric Method for Rapid Detection of Chlorpyrifos by Yao WANG, Xiyan YANG, Yanfei LI, Jiaxiang HUANG, Sijia LI, Kaile WANG, Aoshun HE, Shilin WANG, Yanyan LI, Zhaozhou LI, Xiujin CHEN, Huaibin KANG

    Published 2025-08-01
    “…Under the optimal conditions of 200 mmol/L NaCl concentration and 5000 nmol/L aptamer concentration, the method exhibited a good linear relationship within the chlorpyrifos concentration range of 10~1000 ng/mL (R2=0.997) and achieved a detection limit of 9.41 ng/mL. …”
    Get full text
    Article
  15. 315

    Computational intelligence to detect bearing faults using optimal features from motor current signals by G. Geetha, P. Geethanjali

    Published 2024-12-01
    “…The study aims to find the fewest and most reliable features in the dataset from Paderborn University so that a simple and accurate way can be found to diagnose faults using current signals. The selection of optimal features is initially performed using three algorithms: the equilibrium optimizer, the emperor penguin optimizer (EPO), and the butterfly optimization method. …”
    Get full text
    Article
  16. 316
  17. 317
  18. 318
  19. 319

    Stegan detection method for latent images for intellectual property protection systems by F. B. Tebueva, M. G. Ogur, I. V. Mandritsa, A. B. Chernyshev, G. I. Linets, V. P. Mochalov

    Published 2023-02-01
    “…Improving the quality of detection and stego-detection of latent images embedded in the protected object of intellectual property by various methods. …”
    Get full text
    Article
  20. 320

    Detection of Attacks in Network Traffic with the Autoencoder-Based Unsupervised Learning Method by Yalçın Özkan

    Published 2022-12-01
    “…The threshold value is calculated as a value that will optimize the model performance. It is observed that supervised learning methods lead to difficulties and cost increases in the detection of cyber-attacks and the labeling process. …”
    Get full text
    Article