Showing 1,741 - 1,760 results of 3,615 for search 'complex detection (coefficient OR (efficient OR efficiency))', query time: 0.24s Refine Results
  1. 1741

    SD-YOLOv8: SAM-Assisted Dual-Branch YOLOv8 Model for Tea Bud Detection on Optical Images by Xintong Zhang, Dasheng Wu, Fengya Xu

    Published 2025-03-01
    “…This demonstrates its superior capability in efficiently detecting tea buds against complex backgrounds. …”
    Get full text
    Article
  2. 1742

    Early Detection of Alzheimer’s Disease: An Extensive Review of Advancements in Machine Learning Mechanisms Using an Ensemble and Deep Learning Technique by Renjith Prabhavathi Neelakandan, Ramesh Kandasamy, Balasubramani Subbiyan, Mariya Anto Bennet

    Published 2023-12-01
    “…The findings of this study contribute significantly to the field of AD diagnoses and pave the way for more precise and efficient early detection strategies.…”
    Get full text
    Article
  3. 1743

    Underwater Magnetic Sensors Network by Arkadiusz Adamczyk, Maciej Klebba, Mariusz Wąż, Ivan Pavić

    Published 2025-04-01
    “…This study explores the design and performance of an underwater magnetic sensor network (UMSN) tailored for intrusion detection in complex environments such as riverbeds and areas with dense vegetation. …”
    Get full text
    Article
  4. 1744

    A Scalable Framework for Real-Time Network Security Traffic Analysis and Attack Detection Using Machine and Deep Learning by Zineb Maasaoui, Mheni Merzouki, Abdella Battou, Ahmed Lbath

    Published 2025-04-01
    “…This dual approach of real-time and static analysis provides a robust foundation for developing scalable, efficient, and automated security solutions, essential for managing the evolving threats in modern networks.…”
    Get full text
    Article
  5. 1745

    Evaluating model generalization for cow detection in free-stall barn settings: Insights from the COw LOcalization (COLO) dataset by Mautushi Das, Gonzalo Ferreira, C.P. James Chen

    Published 2025-08-01
    “…This study investigates the generalization capabilities of object detection models for cow detection in indoor free-stall barn settings, focusing on varying training data characteristics such as view angles and lighting, and model complexities. …”
    Get full text
    Article
  6. 1746

    FED-GEM-CN: A federated dual-CNN architecture with contrastive cross-attention for maritime radar intrusion detection by Md. Alamgir Hossain

    Published 2025-09-01
    “…These findings substantiate the efficacy of the proposed system in delivering robust, energy-efficient, and privacy-aware intrusion detection tailored to the constraints of maritime radar networks. …”
    Get full text
    Article
  7. 1747

    Multi-Modal Dynamic Fusion for Defect Detection in Electronic Products: A Novel Approach Based on Energy and Deep Learning by Yulin Liu, Yang Gao

    Published 2025-01-01
    “…Conventional defect detection approaches, which typically depend on a single modality, often fall short in both efficiency and reliability. …”
    Get full text
    Article
  8. 1748

    A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction by Md. Alamin Talukder, Majdi Khalid, Nasrin Sultana

    Published 2025-02-01
    “…The model employs classifiers such as Decision Tree Classifier, Random Forest Classifier (RFC), and gradient boosting techniques like XGBoost (XGBC) to enhance detection accuracy and efficiency. The proposed hybrid (KMS + PCA + RFC) approach achieves remarkable performance, with an accuracy of 99.94% and an f1-score of 99.94% on the WSN-DS dataset. …”
    Get full text
    Article
  9. 1749

    Enhanced framework for credit card fraud detection using robust feature selection and a stacking ensemble model approach by Rahul Kumar Gupta, Asmaul Hassan, Samir Kumar Majhi, Nikhat Parveen, Abu Taha Zamani, Raju Anitha, Binayak Ojha, Abhinav Kumar Singh, Debendra Muduli

    Published 2025-06-01
    “…With the increase in online payment volumes, conventional fraud detection technologies are increasingly confronted by the complexity of fraudulent strategies that require intelligent and scalable alternatives. …”
    Get full text
    Article
  10. 1750

    Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit by Rama Devi Maddineni, Deepak Ch

    Published 2025-01-01
    “…The emergence of machine learning and deep learning models has enhanced the feasibility of hardware Trojan detection, as these models can learn complex patterns and representations from extensive datasets. …”
    Get full text
    Article
  11. 1751

    A Small-Sample Target Detection Method of Side-Scan Sonar Based on CycleGAN and Improved YOLOv8 by Ye Zheng, Jun Yan, Junxia Meng, Ming Liang

    Published 2025-02-01
    “…Because of their low cost and ease of deployment, side-scan sonars is one of the most widely used underwater survey instruments. However, the complexity of the marine environment and the difficulty in target acquisition limit the detection accuracy of side-scan sonars. …”
    Get full text
    Article
  12. 1752
  13. 1753

    High-resolution accurate mass- mass spectrometry based- untargeted metabolomics: Reproducibility and detection power across data-dependent acquisition, data-independent acquisition... by Hanane El Boudlali, Laura Lehmicke, Uta Ceglarek

    Published 2025-01-01
    “…Here, we compare three acquisition modes—Data-Dependent Acquisition (DDA), Data-Independent Acquisition (DIA), and AcquireX —to evaluate performance and reproducibility in detecting low-abundance metabolites in a complex matrix. …”
    Get full text
    Article
  14. 1754

    Non-Destructive Detection of Fillet Fish Quality Using MQ135 Gas Sensor and Neutrosophic Logic-Enhanced System by M. Y. Shams, M. R. Darwesh, Roheet Bhatnagar, N. S. A. Al-Sattary, A. A. Salama, M. S. Ghoname

    Published 2025-04-01
    “…This integration enhances decision-making by accurately modeling complex real-world uncertainties. These methods, combining electronic nose technology, artificial intelligence, and neutrosophic inference, provide a robust, non-destructive, and cost-effective approach to detecting spoilage in fillet fish. …”
    Get full text
    Article
  15. 1755

    BlockDroid: detection of Android malware from images using lightweight convolutional neural network models with ensemble learning and blockchain for mobile devices by Emre Şafak, İbrahim Alper Doğru, Necaattin Barışçı, İsmail Atacak

    Published 2025-05-01
    “…Because these methods can automatically extract meaningful features from data and efficiently learn complex relationships, they can achieve better performance in malware detection as well as in solving many other problems. …”
    Get full text
    Article
  16. 1756

    A Novel Convolutional Neural Network–Long Short-term Memory Model for Interplanetary Coronal Mass Ejection Detection by Junpei Li, Hong Chen, Jingjing Wang, Yanhong Chen, Bingxian Luo, Hao Deng

    Published 2025-01-01
    “…This study presents a convolutional neural network–long short-term memory (CNN-LSTM) model with dynamic loss function, designed to efficiently process complex multidimensional spatiotemporal data. …”
    Get full text
    Article
  17. 1757

    Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge by Rodolphe Picot, Felipe Gohring de Magalhaes, Ahmad Shahnejat Bushehri, Maroua Ben Atti, Gabriela Nicolescu, Alejandro Quintero

    Published 2025-01-01
    “…Its protocol-agnostic design and customized preprocessing method enable it to efficiently detect network attacks across multiple protocols while preserving the original packet structure. …”
    Get full text
    Article
  18. 1758

    Secure Quantum Communication With Multi-Users in Quantum Networks by As'Ad Mahmoud As'Ad Alnaser, Hazem Moh'D Said Hatamleh, Nawaf Abdualziz Almolhis, Salahaldeen Duraibi, Yahya Alqahtani

    Published 2025-01-01
    “…The performance of the system has been analyzed with metrics like detection accuracy of eavesdrop attack (97%), communication complexity (95%), effective key rate (590 b/s), communication efficiency (96%), and computational overhead (98%). …”
    Get full text
    Article
  19. 1759
  20. 1760

    Identifying All Matches of a Rigid Object in an Input Image Using Visible Triangles by Abdullah N. Arslan

    Published 2025-03-01
    “…It has been suggested that for objects identifiable by their corners, every triangle formed by these corner points can serve as a reference for detecting other corner points. This approach enables effective rigid object detection, including partial matches. …”
    Get full text
    Article