Showing 441 - 460 results of 4,968 for search 'data set detection', query time: 0.23s Refine Results
  1. 441
  2. 442
  3. 443
  4. 444

    Efficient Small Object Detection You Only Look Once: A Small Object Detection Algorithm for Aerial Images by Jie Luo, Zhicheng Liu, Yibo Wang, Ao Tang, Huahong Zuo, Ping Han

    Published 2024-11-01
    “…As a result, object detection in aerial images faces challenges like difficulty in extracting small target information and poor integration of spatial and semantic data. …”
    Get full text
    Article
  5. 445

    Exploring End-to-End object detection with transformers versus YOLOv8 for enhanced citrus fruit detection within trees by Zineb Jrondi, Abdellatif Moussaid, Moulay Youssef Hadi

    Published 2024-12-01
    “…Our approach employs a data-driven methodology, dividing the dataset into training and testing sets, with rigorous validation to ensure robustness.For DETR, evaluation results demonstrate promising performance across various IoU thresholds, indicating its effectiveness in accurately localizing fruits within bounding boxes. …”
    Get full text
    Article
  6. 446

    The Role of Freehand Transperineal Prostate Biopsy Under Local Anesthesia Without Antibiotics in Outpatient Settings by Gonglin Tang, Rui Yang, Jianing Sun, Feng Zhang, Jitao Wu, Hongwei Zhao

    Published 2024-12-01
    “…The conclusions suggest that FTPB under LA in an outpatient setting without antibiotics is safe, feasible, and efficient.…”
    Get full text
    Article
  7. 447
  8. 448
  9. 449

    cpop: Detecting Changes in Piecewise-Linear Signals by Paul Fearnhead, Daniel Grose

    Published 2024-05-01
    “… Changepoint detection is an important problem with a wide range of applications. …”
    Get full text
    Article
  10. 450

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  11. 451
  12. 452

    Voice Detection Using Convolutional Neural Network by U. A. Vishniakou, B. H. Shaya

    Published 2023-04-01
    “…Unlike the existing modern works related to this area, proposed system was evaluated using a real set of environmental sound data, and not only on filtered or separated voice audio tracks. …”
    Get full text
    Article
  13. 453

    Stochastic List Generator for Iterative MIMO Detection by Stephen N. Jenkins, Behrouz Farhang-Boroujeny

    Published 2025-01-01
    “…We take note that to develop a low-complexity detector one should first obtain a list of candidate samples of the transmitted data symbols that closely match with the received signal. …”
    Get full text
    Article
  14. 454

    Robustness evaluation of commercial liveness detection platform by Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN

    Published 2022-02-01
    “…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
    Get full text
    Article
  15. 455

    Comparing vector and human surveillance strategies to detect arbovirus transmission: A simulation study for Zika virus detection in Puerto Rico. by Zachary J Madewell, Ryan R Hemme, Laura Adams, Roberto Barrera, Stephen H Waterman, Michael A Johansson

    Published 2019-12-01
    “…<h4>Objectives</h4>We leveraged a unique set of data from human and virological surveillance in Ae. aegypti during the 2016 ZIKV epidemic in Caguas, Puerto Rico, to compare alternative strategies for detecting and monitoring ZIKV activity.…”
    Get full text
    Article
  16. 456
  17. 457

    Exploring feature sparsity for out-of-distribution detection by Qichao Chen, Kuan Li, Zhiyuan Chen, Tomas Maul, Jianping Yin

    Published 2024-11-01
    “…Abstract Out-of-distribution (OOD) detection is a crucial problem in practice, especially, for the safe deployment of machine learning models in industrial settings. …”
    Get full text
    Article
  18. 458

    Detection of Crowd concentrations with YOLO V3 by Ba Duy Nguyen, Thanh Nhan Dinh, Thanh Bach Nguyen, Quoc Dinh Truong

    Published 2023-10-01
    “…The obtained results on test data extracted from 2 data sets STCrowd, SmartCity, and our self-collected dataset confirm the feasibility of the proposed method. …”
    Get full text
    Article
  19. 459

    Detection of Crowd concentrations with YOLO V3 by Ba Duy Nguyen, Thanh Nhan Dinh, Thanh Bach Nguyen, Quoc Dinh Truong

    Published 2023-10-01
    “…The obtained results on test data extracted from 2 data sets STCrowd, SmartCity, and our self-collected dataset confirm the feasibility of the proposed method. …”
    Get full text
    Article
  20. 460