Showing 1,201 - 1,220 results of 3,615 for search 'complex detection (coefficient OR (efficient OR efficiency))', query time: 0.23s Refine Results
  1. 1201

    Enhanced Anomaly Detection in IoT Networks Using Deep Autoencoders with Feature Selection Techniques by Hamza Rhachi, Younes Balboul, Anas Bouayad

    Published 2025-05-01
    “…Compared to some IoT-based anomaly detection models, the experimental results reveal that the suggested model is more efficient at enhancing the accuracy of detecting malicious data. …”
    Get full text
    Article
  2. 1202

    Research on the Rapid Detection of Formaldehyde Emission From Wood-Based Panels Based on the AMSHKELM by Yinuo Wang, Huanqi Zheng, Hua Wang, Yucheng Zhou

    Published 2025-01-01
    “…To enable quick and accurate detection of formaldehyde emissions from wood-based panels and to address the complexities of the full-scale chamber method and the inaccuracy of sensor-based methods, a modified formaldehyde emission model based on AdaBoost-MSBKA-SVMD-HKELM (AMSHKELM) is proposed. …”
    Get full text
    Article
  3. 1203

    Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers by Raja Azlina Raja Mahmood, AmirHossien Abdi, Masnida Hussin

    Published 2021-06-01
    “…Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  …”
    Get full text
    Article
  4. 1204

    Cutting-Edge Phishing Detection Using Novel Features and Hybrid Machine Learning Techniques by Jin Zhang

    Published 2025-03-01
    “…Classification Information Mining (DM) strategies are highly effective tools for identifying and detecting e-banking phishing websites. This study introduces a novel approach to address the challenges and complexities associated with predicting and identifying such websites. …”
    Get full text
    Article
  5. 1205

    Deep learning-based ensemble stacking for enhanced intrusion detection in IoT-edge platforms by P. R. Chithra Rani, K. Baalaji

    Published 2025-08-01
    “…This research contributes a scalable, efficient, and resource-aware intrusion-detection approach to extending the resilience of IoT-edge systems in distributed computing environments.…”
    Get full text
    Article
  6. 1206

    Target detection of helicopter electric power inspection based on the feature embedding convolution model. by Dakun Liu, Wei Zhou, Linzhen Zhou, Wen Guan

    Published 2024-01-01
    “…In addition, this study further optimizes the model with reinforcement learning technology, conducts a comparative analysis of different flight environments and facilities, and reveals the diversity and complexity of inspection objectives. The performance of the optimized model in fault detection is increased by more than 36%. …”
    Get full text
    Article
  7. 1207

    A Rotation Target Detection Network Based on Multi-Kernel Interaction and Hierarchical Expansion by Qi Wang, Guanghu Xu, Donglin Jing

    Published 2025-08-01
    “…Through multi-scale feature interaction and direction-aware optimization, MIHE-Net effectively addresses the challenges posed by scale gradation and direction diversity in remote sensing target detection, providing an efficient and feasible solution for high-precision remote sensing target detection.…”
    Get full text
    Article
  8. 1208

    A lightweight model for echo trace detection in echograms based on improved YOLOv8 by Jungang Ma, Jianfeng Tong, Minghua Xue, Junfan Yao

    Published 2024-12-01
    “…YOLOv8-SBE adds the C2f_ScConv module to improve efficiency and reduce parameters, incorporates the BiFPN structure to enhance information transfer, and uses the EMA attention module for better small target recognition. …”
    Get full text
    Article
  9. 1209

    Research on anomaly detection model for traffic time series data integrating multiple mechanisms by Peipei ZHANG, Jiaqi LIU

    Published 2025-06-01
    “…The results show that adding each module on the basis of LSTM significantly improves the model's prediction and anomaly detection ability; Compared with the general hybrid model Transformer-Bi-LSTM, the proposed model has stronger prediction ability and lower computational complexity. …”
    Get full text
    Article
  10. 1210

    Surface anomaly detection on island-based PV panels using edge neural networks by ZHANG Yinxian, ZHANG Zhanyao, ZHANG Xiya

    Published 2024-12-01
    “…Due to the poor accuracy and low efficiency of existing detection methods, the paper proposes a surface anomaly detection method for island-based PV panels using edge neural networks. …”
    Get full text
    Article
  11. 1211

    Semi-supervised anomaly detection from Chlorella vulgaris cultivations using hyperspectral imaging by Salli Pääkkönen, Ilkka Pölönen, Pauliina Salmi

    Published 2025-12-01
    “…More evolved anomaly detection methods are needed to ensure efficient quality control of microalgae cultivations. …”
    Get full text
    Article
  12. 1212

    Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection by Luis D. Espino-Mandujano, Rogelio Hasimoto-Beltran

    Published 2025-05-01
    “…The increasing demand for real-time multimedia communications has driven the need for highly secure and computationally efficient encryption schemes. In this work, we present a novel chaos-based encryption system that provides remarkable levels of security and performance. …”
    Get full text
    Article
  13. 1213

    Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems by Yunkai Song, Huihui Huang, Hongmin Wang, Qiang Wei

    Published 2024-11-01
    “…Conventional anomaly detection techniques often lack the ability to provide clear explanations for their detection, and their inherent complexity can impede practical implementation in the resource-constrained environments typical of ICSs. …”
    Get full text
    Article
  14. 1214

    Detecting command injection attacks in web applications based on novel deep learning methods by Xinyu Wang, Jiqiang Zhai, Hailu Yang

    Published 2024-10-01
    “…Abstract Web command injection attacks pose significant security threats to web applications, leading to potential server information leakage or severe server disruption. Traditional detection methods struggle with the increasing complexity and obfuscation of these attacks, resulting in poor identification of malicious code, complicated feature extraction processes, and low detection efficiency. …”
    Get full text
    Article
  15. 1215

    Novel transfer learning based acoustic feature engineering for scene fake audio detection by Ahmad Sami Al-Shamayleh, Hafsa Riasat, Ala Saleh Alluhaidan, Ali Raza, Sahar A. El-Rahman, Diaa Salama AbdElminaam

    Published 2025-03-01
    “…We have tuned hyperparameters of applied machine learning approaches, and cross-validation is applied to validate performance results. In addition, the complexity of the computation is measured. The proposed research aims to enhance the accuracy measure, and efficiency of identifying manipulated audio content, thereby contributing to the integrity and reliability of digital communications.…”
    Get full text
    Article
  16. 1216

    Combination of Principal Component Analysis and Time-Frequency Representation for P-Wave Arrival Detection by Jacek Wodecki, Justyna Hebda-Sobkowicz, Adam Mirek, Radosław Zimroz, Agnieszka Wyłomańska

    Published 2019-01-01
    “…Due to the significant difference between the spectra of recorded seismic wave and pure noise which precedes the event, time-frequency representation allows for better accuracy of signal change detection. However, with an additional domain, the complexity rises. …”
    Get full text
    Article
  17. 1217

    Enhancing Software Quality with AI: A Transformer-Based Approach for Code Smell Detection by Israr Ali, Syed Sajjad Hussain Rizvi, Syed Hasan Adil

    Published 2025-04-01
    “…In this study, we introduce Relation-Aware BERT (RABERT), a novel transformer-based model that integrates relational embeddings to enhance automated code smell detection. By modeling interdependencies among software complexity metrics, RABERT surpasses classical machine-learning methods, achieving an accuracy of 90.0% and a precision of 91.0%. …”
    Get full text
    Article
  18. 1218

    Adaptive distributed honeypot detection network for enhanced cybersecurity against DoS and DDoS attacks by V. Selva Kumar, K.R. Mohan Raj, S. Gopalakrishnan, G. Vennila, D. Dhinakaran, P. Kavitha

    Published 2025-06-01
    “…Traditional detection techniques often fall short in addressing the complexities posed by dynamic traffic patterns, diverse attack types, and real-time processing demands. …”
    Get full text
    Article
  19. 1219

    Visual impairment prevention by early detection of diabetic retinopathy based on stacked auto-encoder by Shagufta Almas, Fazli Wahid, Sikandar Ali, Ahmed Alkhyyat, Kamran Ullah, Jawad Khan, Youngmoon Lee

    Published 2025-01-01
    “…While various computer-aided systems have been developed to assist in DR detection, there remains a need for accurate and efficient methods to classify its stages. …”
    Get full text
    Article
  20. 1220

    Can YOLO Detect Retinal Pathologies? A Step Towards Automated OCT Analysis by Adriana-Ioana Ardelean, Eugen-Richard Ardelean, Anca Marginean

    Published 2025-07-01
    “…Through the advancement of technology, the volume and complexity of OCT data have rendered manual analysis infeasible, creating the need for automated means of detection. …”
    Get full text
    Article