Showing 1,061 - 1,080 results of 3,615 for search 'complex detection (coefficiency OR efficiency)', query time: 0.20s Refine Results
  1. 1061

    Mt or not Mt: Temporal variation in detection probability in spatial capture-recapture and occupancy models by Sollmann, Rahel

    Published 2024-01-01
    “…Here, I investigate whether closed spatial capture-recapture (SCR) and single season occupancy models are robust to ignoring temporal variation in detection probability. Ignoring temporal variation allows collapsing detection data across repeated sampling occasions, speeding up computations, which can be important when analyzing large datasets with complex models. …”
    Get full text
    Article
  2. 1062

    Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks by Wasim Khan, Afsaruddin Mohd, Mohammad Suaib, Mohammad Ishrat, Anwar Ahamed Shaikh, Syed Mohd Faisal

    Published 2025-06-01
    “…This study introduces an innovative approach that synergizes the strengths of graph convolutional networks with advanced deep residual learning and a unique residual-based attention mechanism, thereby creating a more nuanced and efficient method for anomaly detection in complex networks. …”
    Get full text
    Article
  3. 1063

    Enhanced YOLOv5s Model for Improved Multi-Sized Object Detection in Road Scenes by Sangavi Sivanandham, Dharanibai Gunaseelan

    Published 2025-01-01
    “…Detecting objects in complex driving environments is crucial for autonomous vehicles to navigate safely. …”
    Get full text
    Article
  4. 1064

    An Improved Unmanned Aerial Vehicle Forest Fire Detection Model Based on YOLOv8 by Bensheng Yun, Xiaohan Xu, Jie Zeng, Zhenyu Lin, Jing He, Qiaoling Dai

    Published 2025-03-01
    “…Taking into account efficiency and cost-effectiveness, deep-learning-driven UAV remote sensing fire detection algorithms have emerged as a favored research trend and have seen extensive application. …”
    Get full text
    Article
  5. 1065

    TomaFDNet: A multiscale focused diffusion-based model for tomato disease detection by Rijun Wang, Rijun Wang, Yesheng Chen, Fulong Liang, Xiangwei Mou, Xiangwei Mou, Guanghao Zhang, Hao Jin

    Published 2025-04-01
    “…Current tomato leaf disease detection methods, however, encounter challenges in extracting multi-scale features, identifying small targets, and mitigating complex background interference. …”
    Get full text
    Article
  6. 1066

    Research on the detection of obstacles in front of unmanned vehicles in opencast mines based on binocular vision by Shunling RUAN, Huiguo ZHANG, Qinghua GU, Caiwu LU, Di LIU, Jing MAO

    Published 2024-12-01
    “…Driverless cars in the complex environment of the open pit mining area encountered falling rocks, puddles, pedestrians and other obstacles have great safety hazards, easy to cause vehicle rollover, stuck in the car, resulting in the risk of loss of property or pose a threat to the safety of personnel, therefore, the complex and changing terrain environment on the road of the open pit mine as an important problem solving of the open pit mine unmanned vehicles in the mining intelligence, the need to measure the depth of obstacles in front of the car of the while guaranteeing the accuracy and speed of obstacle detection. …”
    Get full text
    Article
  7. 1067

    YOLO-WAS: A Lightweight Apple Target Detection Method Based on Improved YOLO11 by Xinwu Du, Xiaoxuan Zhang, Tingting Li, Xiangyu Chen, Xiufang Yu, Heng Wang

    Published 2025-07-01
    “…To overcome the limitations of existing apple target detection methods, including low recognition accuracy of multi-species apples in complex orchard environments and a complex network architecture that occupies large memory, a lightweight apple recognition model based on the improved YOLO11 model was proposed, named YOLO-WAS model. …”
    Get full text
    Article
  8. 1068

    Towards precision agriculture tea leaf disease detection using CNNs and image processing by Irfan Sadiq Rahat, Hritwik Ghosh, Suresh Dara, Shashi Kant

    Published 2025-05-01
    “…Our model’s architecture is not just a testament to the sophistication of modern deep learning techniques but also highlights the novelty of applying such complex structures to the challenges of agricultural disease detection. …”
    Get full text
    Article
  9. 1069

    Target detection of helicopter electric power inspection based on the feature embedding convolution model. by Dakun Liu, Wei Zhou, Linzhen Zhou, Wen Guan

    Published 2024-01-01
    “…In addition, this study further optimizes the model with reinforcement learning technology, conducts a comparative analysis of different flight environments and facilities, and reveals the diversity and complexity of inspection objectives. The performance of the optimized model in fault detection is increased by more than 36%. …”
    Get full text
    Article
  10. 1070

    A lightweight model for echo trace detection in echograms based on improved YOLOv8 by Jungang Ma, Jianfeng Tong, Minghua Xue, Junfan Yao

    Published 2024-12-01
    “…However, current detection models are too parameter-heavy to embed in echosounders and struggle with noisy, irregular, and dense echograms. …”
    Get full text
    Article
  11. 1071

    YOLOv8-LSW: A Lightweight Bitter Melon Leaf Disease Detection Model by Shuang Liu, Haobin Xu, Ying Deng, Yixin Cai, Yongjie Wu, Xiaohao Zhong, Jingyuan Zheng, Zhiqiang Lin, Miaohong Ruan, Jianqing Chen, Fengxiang Zhang, Huiying Li, Fenglin Zhong

    Published 2025-06-01
    “…Bitter melon, an important medicinal and edible economic crop, is often threatened by diseases such as downy mildew, powdery mildew, viral diseases, anthracnose, and blight during its growth. Efficient and accurate disease detection is of significant importance for achieving sustainable disease management in bitter melon cultivation. …”
    Get full text
    Article
  12. 1072

    Research on anomaly detection model for traffic time series data integrating multiple mechanisms by Peipei ZHANG, Jiaqi LIU

    Published 2025-06-01
    “…The results show that adding each module on the basis of LSTM significantly improves the model's prediction and anomaly detection ability; Compared with the general hybrid model Transformer-Bi-LSTM, the proposed model has stronger prediction ability and lower computational complexity. …”
    Get full text
    Article
  13. 1073

    Use of Business Intelligence as a Strategic Information Technology in Banking: Farud Discovery & Detection by علی محقر, کارو لوکس, ، فرید حسینی, آصف علی منشی

    Published 2009-02-01
    “…It also explains how BI can be effective technology in industries like banking to overcome critical issue like fraud discovery and detection. The methodology, based on BI, in the form of model named BI model for fraud discovery and detection has been devised and suggested at the end of paper along with it its details for overcoming the above mentioned issue in more effective and efficient manner.…”
    Get full text
    Article
  14. 1074

    Surface anomaly detection on island-based PV panels using edge neural networks by ZHANG Yinxian, ZHANG Zhanyao, ZHANG Xiya

    Published 2024-12-01
    “…Due to the poor accuracy and low efficiency of existing detection methods, the paper proposes a surface anomaly detection method for island-based PV panels using edge neural networks. …”
    Get full text
    Article
  15. 1075

    Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems by Yunkai Song, Huihui Huang, Hongmin Wang, Qiang Wei

    Published 2024-11-01
    “…Conventional anomaly detection techniques often lack the ability to provide clear explanations for their detection, and their inherent complexity can impede practical implementation in the resource-constrained environments typical of ICSs. …”
    Get full text
    Article
  16. 1076

    Detecting command injection attacks in web applications based on novel deep learning methods by Xinyu Wang, Jiqiang Zhai, Hailu Yang

    Published 2024-10-01
    “…Abstract Web command injection attacks pose significant security threats to web applications, leading to potential server information leakage or severe server disruption. Traditional detection methods struggle with the increasing complexity and obfuscation of these attacks, resulting in poor identification of malicious code, complicated feature extraction processes, and low detection efficiency. …”
    Get full text
    Article
  17. 1077

    Novel transfer learning based acoustic feature engineering for scene fake audio detection by Ahmad Sami Al-Shamayleh, Hafsa Riasat, Ala Saleh Alluhaidan, Ali Raza, Sahar A. El-Rahman, Diaa Salama AbdElminaam

    Published 2025-03-01
    “…We have tuned hyperparameters of applied machine learning approaches, and cross-validation is applied to validate performance results. In addition, the complexity of the computation is measured. The proposed research aims to enhance the accuracy measure, and efficiency of identifying manipulated audio content, thereby contributing to the integrity and reliability of digital communications.…”
    Get full text
    Article
  18. 1078

    Combination of Principal Component Analysis and Time-Frequency Representation for P-Wave Arrival Detection by Jacek Wodecki, Justyna Hebda-Sobkowicz, Adam Mirek, Radosław Zimroz, Agnieszka Wyłomańska

    Published 2019-01-01
    “…Due to the significant difference between the spectra of recorded seismic wave and pure noise which precedes the event, time-frequency representation allows for better accuracy of signal change detection. However, with an additional domain, the complexity rises. …”
    Get full text
    Article
  19. 1079

    Enhancing Software Quality with AI: A Transformer-Based Approach for Code Smell Detection by Israr Ali, Syed Sajjad Hussain Rizvi, Syed Hasan Adil

    Published 2025-04-01
    “…In this study, we introduce Relation-Aware BERT (RABERT), a novel transformer-based model that integrates relational embeddings to enhance automated code smell detection. By modeling interdependencies among software complexity metrics, RABERT surpasses classical machine-learning methods, achieving an accuracy of 90.0% and a precision of 91.0%. …”
    Get full text
    Article
  20. 1080

    A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things by M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, Rajkumar Singh Rathore, Mohit Bajaj, Ievgen Zaitsev

    Published 2024-11-01
    “…Complex threats often go undetected by conventional security measures, requiring more sophisticated, adaptive detection methods. …”
    Get full text
    Article