Showing 1,421 - 1,440 results of 5,656 for search 'complex (selection OR detection) (efficient OR efficiency)', query time: 0.27s Refine Results
  1. 1421
  2. 1422
  3. 1423

    TARGE: large language model-powered explainable hate speech detection by Muhammad Haseeb Hashir, Memoona, Sung Won Kim

    Published 2025-05-01
    “…The proliferation of user-generated content on social networking sites has intensified the challenge of accurately and efficiently detecting inflammatory and discriminatory speech at scale. …”
    Get full text
    Article
  4. 1424

    Multi-defect detection and classification for aluminum alloys with enhanced YOLOv8. by Ying Han, Xingkun Li, Gongxiang Cui, Jie Song, Fengyu Zhou, Yugang Wang

    Published 2025-01-01
    “…Experimental results show that the proposed method performs effectively in target detection and classification. The number of model parameters is reduced from more than 300,000 to 160,000, significantly reducing the complexity of the model. …”
    Get full text
    Article
  5. 1425
  6. 1426

    Research and optimization of a multilevel fire detection framework based on deep learning and classical pattern recognition techniques by Qi Liu, Hong Chen, Da Lin

    Published 2025-07-01
    “…Our objective is to further develop FFDNet into a robust, efficient, and widely applicable tool for flame detection, thereby providing significant technical support for fire prevention and response initiatives.…”
    Get full text
    Article
  7. 1427

    Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment by Vikas K. Soman, V. Natarajan

    Published 2025-01-01
    “…The Crayfish Optimization algorithm is used to select the most suitable pixels for steganography, ensuring that the secret image is embedded in a way that minimizes detection. …”
    Get full text
    Article
  8. 1428

    The Optimal Acoustic Measurement Point Selection for UHV Reactors in Substations Based on Equivalent Impedance and Information Entropy Theory by Yingwen Li, Zhen Wei, Huilian Liao, Lin Li, Peizhong Zhang, Jingyun Zhao

    Published 2025-01-01
    “…Finally, the model accurately reconstructed and simulated the near-field of the parallel reactor, and achieved quantitative evaluation of the optimal voiceprint detection position. The results indicate the high accuracy and reliability of the sound field reconstruction model, significantly improving computational efficiency, and the measurement point can fully characterize the acoustic properties of the reactor. …”
    Get full text
    Article
  9. 1429

    Performance validation of microchannel heat sinks based on single/multiobjective topology optimization and manufactured by selective laser melting by Guangzhao Yang, Mingxuan Cao, Pingnan Huang, Linlin Pan, Xin Zhong, Liang Yang, Weiwei Guo, Matthew M.F. Yuen, Huijun Li

    Published 2025-10-01
    “…This study confirms that the P3D-MOTO provides efficient and energy-saving thermal management solutions, while emphasizing that the integration of topology optimization with SLM can create complex geometries, thereby enhancing thermal performance.…”
    Get full text
    Article
  10. 1430

    Rice disease detection method based on multi-scale dynamic feature fusion by Qian Fan, Runhao Chen, Bin Li

    Published 2025-05-01
    “…In order to enhance the accuracy of rice leaf disease detection in complex farmland environments, and facilitate the deployment of the deep learning model onto mobile terminals for rapid real-time inference, this paper introduces a disease detection network titled YOLOv11 Multi-scale Dynamic Feature Fusion for Rice Disease Detection (YOLOv11-MSDFF-RiceD). …”
    Get full text
    Article
  11. 1431

    CMCD: A Consistency Model-Based Change Detection Method for Remote Sensing Images by Xiongjie Li, Weiying Xie, Jiaqing Zhang, Yunsong Li

    Published 2025-01-01
    “…We also develop a pruning strategy of skip connections and a top–down feature aggregation module to improve feature utilization efficiency. Extensive experiments demonstrate that CMCD significantly reduces computational complexity and inference time compared to existing diffusion model-based methods. …”
    Get full text
    Article
  12. 1432

    G-RCenterNet: Reinforced CenterNet for Robotic Arm Grasp Detection by Jimeng Bai, Guohua Cao

    Published 2024-12-01
    “…First, a channel and spatial attention mechanism is introduced to improve the network’s capability to extract target features, significantly enhancing grasp detection performance in complex backgrounds. Second, an efficient attention module search strategy is proposed to replace traditional fully connected layer structures, which not only increases detection accuracy but also reduces computational overhead. …”
    Get full text
    Article
  13. 1433

    An optimized stacking-based TinyML model for attack detection in IoT networks. by Anshika Sharma, Shalli Rani, Mohammad Shabaz

    Published 2025-01-01
    “…To address these challenges, a stacking-based Tiny Machine Learning (TinyML) models has been proposed for attack detection in IoT networks. This ensures detection efficiently and without additional computational overhead. …”
    Get full text
    Article
  14. 1434

    DeepAT: A Deep Learning Wheat Phenotype Prediction Model Based on Genotype Data by Jiale Li, Zikang He, Guomin Zhou, Shen Yan, Jianhua Zhang

    Published 2024-11-01
    “…This provides a data-driven selection criterion for genomic selection, making the selection process more efficient and targeted. …”
    Get full text
    Article
  15. 1435

    Integrated feature selection-based stacking ensemble model using optimized hyperparameters to predict breast cancer with smart web application by Rajib Kumar Halder, Marzana Akter Lima, Mohammed Nasir Uddin, Md.Aminul Islam, Adri Saha

    Published 2025-12-01
    “…Breast cancer is a leading cause of morbidity and mortality among women worldwide, arising from malignant cell transformations in breast tissue. Early detection is paramount as it significantly improves survival rates and reduces the complexity and cost of treatment. …”
    Get full text
    Article
  16. 1436

    Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks. by Rong Wang, Weibin Jiang, Yanjin Shen, Qiqing Yue, Kan-Lin Hsiung

    Published 2025-01-01
    “…Traditional eavesdropping detection methods struggle to adapt to complex and dynamic attack patterns, necessitating the exploration of more intelligent and efficient anomaly localization approaches. …”
    Get full text
    Article
  17. 1437

    HLSK-CASMamba: hybrid large selective kernel and convolutional additive self-attention mamba for hyperspectral image classification by Xiaoqing Wan, Yupeng He, Feng Chen, Ziqi Sun, Dongtao Mo

    Published 2025-06-01
    “…Conversely, transformers, despite their efficacy in modeling spectral-spatial dependencies, introduce significant computational overhead due to their complexity. Mamba, leveraging the state space model (SSM), presents a compelling alternative that efficiently captures long-range dependencies in HSIs while ensuring computational efficiency with linear complexity. …”
    Get full text
    Article
  18. 1438

    Optimization Design of the Transmission System of Small-size Shrub Brush Cutter based on MATLAB by Yang Chunmei, Guo Minghui, Ma Yan, Liu Qianjun, Yang Tie

    Published 2017-01-01
    “…By determining the objective function of the transmission system,selecting the independent design variables,determining the constraints,the mathematical model of transmission system is established.The analysis and optimization of the design variables,objective function and the boundary conditions are carried out,the complex method optimization program of MATLAB is written,and by using its powerful ability of optimization design to optimize the transmission system of the brush cutter. …”
    Get full text
    Article
  19. 1439

    A parallel algorithm for network traffic anomaly detection based on Isolation Forest by Xiaoling Tao, Yang Peng, Feng Zhao, Peichao Zhao, Yong Wang

    Published 2018-11-01
    “…With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic data is crucial to many network applications, such as malware detection, load balancing, network intrusion detection. …”
    Get full text
    Article
  20. 1440

    Enhancing IDS for the IoMT based on advanced features selection and deep learning methods to increase the model trustworthiness. by Ahmed Muqdad Alnasrallah, Maheyzah Md Siraj, Hanan Ali Alrikabi

    Published 2025-01-01
    “…This study indicates that the proposed strategy decreases computational complexity and enhances IDS efficiency in resource-constrained IoMT environments.…”
    Get full text
    Article