Showing 1,521 - 1,540 results of 3,615 for search 'complex detection (coefficient OR (efficient OR efficiency))', query time: 0.25s Refine Results
  1. 1521

    Detection and functional assessment of structural variants using whole-genome re-sequencing data in Nellore cattle by Natalia A. Marín-Garzón, Lucio F. M. Mota, Giovana Vargas, Leonardo M. Arikawa, Larissa F. S. Fonseca, Gerardo A. Fernandes Júnior, Roberto Carvalheiro, Lucia G. Albuquerque

    Published 2025-08-01
    “…Abstract Ongoing advances in genome sequencing technologies have enabled the identification of numerous structural variants (SVs) in livestock genomes, which are the main determinants of complex traits due to their impact on gene expression. …”
    Get full text
    Article
  2. 1522

    LDDFSF-YOLO11: A Lightweight Insulator Defect Detection Method Focusing on Small-Sized Features by Peng Shen, Keyu Mei, Huiqiong Cao, Yongxiang Zhao, Guoqing Zhang

    Published 2025-01-01
    “…This study proposes a lightweight insulator defect detection method (LDDFSF-YOLO11) that focuses on small-sized features to efficiently detect and identify insulator defects. …”
    Get full text
    Article
  3. 1523

    Research on multi class pests identification and detection based on fusion attention mechanism with Mask-RCNN-CBAM by Xingwang Wang, Xingwang Wang, Xingwang Wang, Can Hu, Xufeng Wang, Hainie Zha, Xueyong Chen, Shanshan Yuan, Jing Zhang, Jianfeng Liao, Zhangying Ye

    Published 2025-05-01
    “…This study addresses challenges in agricultural pest detection, such as false positives and missed detections in complex environments, by proposing an enhanced Mask-RCNN model integrated with a Convolutional Block Attention Module (CBAM). …”
    Get full text
    Article
  4. 1524

    Detection and Segmentation of Glioma Tumors Using an Improved Visual Geometry Group (IVGG) Deep Learning Structure by Parameswari Alagarsamy, Vinoth Kumar Kalimuthu, Bhavani Sridharan

    Published 2025-02-01
    “…Analysis of the performance efficiency has been done in relation to the Jaccard index, recall, precision, and detection rate.…”
    Get full text
    Article
  5. 1525

    Improved Building Information Modeling Based Method for Prioritizing Clash Detection in the Building Construction Design Phase by Iman Bitaraf, Ali Salimpour, Pedram Elmi, Ali Akbar Shirzadi Javid

    Published 2024-11-01
    “…The proposed method substantially improves clash detection and prioritization efficiency and accuracy, yielding considerable benefits in project management and resource allocation.…”
    Get full text
    Article
  6. 1526

    SAG-YOLO: A Lightweight Real-Time One-Day-Old Chick Gender Detection Method by Yulong Chang, Rongqian Sun, Zheng Yang, Shijun Li, Qiaohua Wang

    Published 2025-03-01
    “…This study proposes an improved SAG-YOLO method for chick sex detection. Firstly, the model reduces both parameter size and computational complexity by replacing the original feature extraction with the StarNet lightweight Backbone. …”
    Get full text
    Article
  7. 1527

    A multi-scale small object detection algorithm SMA-YOLO for UAV remote sensing images by Shilong Zhou, Haijin Zhou, Lei Qian

    Published 2025-03-01
    “…Abstract Detecting small objects in complex remote sensing environments presents significant challenges, including insufficient extraction of local spatial information, rigid feature fusion, and limited global feature representation. …”
    Get full text
    Article
  8. 1528

    Fractional Artificial Protozoa Optimization Enabled Deep Learning for Intrusion Detection and Mitigation in Cyber-Physical Systems by Shaik Abdul Rahim, Arun Manoharan

    Published 2024-01-01
    “…Thereafter, intrusion detection is carried out with Spiking VGG-16. Lastly, attack classification is accomplished utilizing Spiking VGG-16 trained by FAPO, and then attack mitigation is detected. …”
    Get full text
    Article
  9. 1529

    Design and implementation of a 100 kVA transformer monitoring and fault detection system for distribution network by Charity M. Nkinyam, Leo Tanyam Encho, Nfah Eustace Mbaka

    Published 2025-06-01
    “…Abstract The increasing complexity of today’s power distribution networks requires reliable and intelligent monitoring and maintenance systems, especially as the demand for electricity increases due to technological and population growth. …”
    Get full text
    Article
  10. 1530

    An optimized anomaly detection framework in industrial control systems through grey wolf optimizer and autoencoder integration by Muhammad Muzamil Aslam, Liyanage Chandratilak De Silva, Rosyzie Anna Awg Haji Mohd Apong, Ali Tufail

    Published 2025-07-01
    “…Abstract Ensuring reliable Internet connectivity in Industrial Control Systems is critical for real-time monitoring and anomaly detection. Existing methods, however, struggle with high computational complexity, limited applicability to specific datasets, and elevated false-positive rates. …”
    Get full text
    Article
  11. 1531

    A novel lightweight YOLOv8-PSS model for obstacle detection on the path of unmanned agricultural vehicles by Zhijian Chen, Yijun Fang, Jianjun Yin, Shiyu Lv, Farhan Sheikh Muhammad, Lu Liu

    Published 2024-12-01
    “…PConv significantly reduces processing load during convolution operations, enhancing the model's real-time detection performance. Second, a Slim-neck lightweight neck network is introduced, replacing the original neck network's conventional convolution with GSConv, to further improve detection efficiency and accuracy. …”
    Get full text
    Article
  12. 1532

    Real-Time Human Group Detection and Clustering in Crowded Environments Using Enhanced Multi-Object Tracking by Hyunmin Lee, Donggoo Kang, Hasil Park, Sangwoo Park, Dasol Jeong, Joonki Paik

    Published 2024-01-01
    “…Group detection is a critical yet challenging task in video-based applications such as surveillance analysis, especially in crowded and dynamic environments where complex pedestrian interactions occur. …”
    Get full text
    Article
  13. 1533

    Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment by Binod Sapkota, Arjun Ray, Manish Kumar Yadav, Babu R. Dawadi, Shashidhar R. Joshi

    Published 2025-03-01
    “…Additionally, the IDS decouples from the controllers, preserves controller resources, and allows for efficient near-real-time attack detection and mitigation. …”
    Get full text
    Article
  14. 1534

    LPCF-YOLO: A YOLO-Based Lightweight Algorithm for Pedestrian Anomaly Detection with Parallel Cross-Fusion by Peiyi Jia, Hu Sheng, Shijie Jia

    Published 2025-04-01
    “…To address the issue of high complexity in current pedestrian anomaly detection network models, which hinders real-world deployment, this paper proposes a lightweight anomaly detection network called LPCF-YOLO (Lightweight Parallel Cross-Fusion YOLO) based on the YOLOv8n model. …”
    Get full text
    Article
  15. 1535
  16. 1536

    Detection, Isolation, and Identification of Multiplicative Faults in a DC Motor and Amplifier Using Parameter Estimation Techniques by Sanja Antić, Marko Rosić, Branko Koprivica, Alenka Milovanović, Milentije Luković

    Published 2025-07-01
    “…The increasing complexity of modern control systems highlights the need for reliable and robust fault detection, isolation, and identification (FDII) methods, particularly in safety-critical and industrial applications. …”
    Get full text
    Article
  17. 1537
  18. 1538

    A Multi-Category Defect Detection Model for Rail Fastener Based on Optimized YOLOv8n by Mei Chen, Maolin Zhang, Jun Peng, Jiabin Huang, Haitao Li

    Published 2025-06-01
    “…Currently, object detection-based rail fastener defect detection methods still face challenges such as limited detection categories, insufficient accuracy, and high computational complexity. …”
    Get full text
    Article
  19. 1539

    Two–Stage Detection and Localization of Inter–Frame Tampering in Surveillance Videos Using Texture and Optical Flow by Naheed Akhtar, Muhammad Hussain, Zulfiqar Habib

    Published 2024-11-01
    “…The authenticity of surveillance videos cannot be taken for granted, but tampering detection is challenging. Existing techniques face significant limitations, including restricted applicability, poor generalizability, and high computational complexity. …”
    Get full text
    Article
  20. 1540

    A Comparative Study of Machine Learning Algorithms for Intrusion Detection Systems using the NSL-KDD Dataset by Rulyansyah Permata Putra, Amarudin Amarudin

    Published 2025-07-01
    “…In today’s digital era, cyberattacks are becoming increasingly complex, rendering traditional rule-based Intrusion Detection Systems (IDS) often ineffective in recognizing new attack patterns. …”
    Get full text
    Article