Showing 721 - 740 results of 4,968 for search 'data set detection', query time: 0.22s Refine Results
  1. 721

    Deep Learning Techniques for Early Fault Detection in Bearings: An Intelligent Approach by Omar Mohammed Amin Ali, Rebin Abdulkareem Hamaamin, Shahab Wahhab Kareem

    Published 2025-02-01
    “…The Case Western Reserve University (CWRU) bearing data set identifies abnormalities in machinery bearings. …”
    Get full text
    Article
  2. 722

    FPGA-oriented lightweight multi-modal free-space detection network by Feiyi Fang, Junzhu Mao, Wei Yu, Jianfeng Lu

    Published 2023-12-01
    “…It comprises operators that FPGA prefers and achieves a $ 95.54\% $ MaxF score on the test set of KITTI-Road free-space detection tasks and 81 ms runtime when running on 700 W GPU devices. …”
    Get full text
    Article
  3. 723

    Mine underground object detection algorithm based on TTFNet and anchor-free by Song Zhen, Qing Xuwen, Zhou Meng, Men Yuting

    Published 2024-11-01
    “…First, CenterNet and TTFNet algorithms are introduced, then pooling is introduced into CSPNet basic structure to design a lightweight feature extraction network, at the same time optimizing the feature fusion way in the original algorithm, optimizing residual shrinkage network structure, and introducing it into object detection task. Experiments were conducted on the established underground data set. …”
    Get full text
    Article
  4. 724

    Pulscan: Binary Pulsar Detection Using Unmatched Filters on NVIDIA GPUs by Jack White, Karel Adámek, Jayanta Roy, Scott M. Ransom, Wesley Armour

    Published 2025-01-01
    “…The Fourier domain acceleration search (FDAS) and Fourier domain jerk search (FDJS) are proven matched-filtering techniques for detecting binary pulsar signatures in time-domain radio astronomy data sets. …”
    Get full text
    Article
  5. 725

    DRPM: An advanced predictive model for early diabetes detection and risk stratification by Fulei Nie, Xiaoming Song, Wei Chen

    Published 2025-09-01
    “…In this study, we developed a deep learning-based risk prediction model using data from the National Health and Nutrition Examination Survey (NHANES) spanning from 2011 to 2018. …”
    Get full text
    Article
  6. 726

    SWMD-YOLO: A Lightweight Model for Tomato Detection in Greenhouse Environments by Quan Wang, Ye Hua, Qiongdan Lou, Xi Kan

    Published 2025-06-01
    “…Experiments on greenhouse tomato data sets demonstrate that SWMD-YOLO achieves 93.47% mAP50 with a detection speed of 75.68 FPS, outperforming baseline models in accuracy while reducing parameters by 18.9%. …”
    Get full text
    Article
  7. 727

    Real-Time Fire Object Detection System Using Machine Learning by Akuthota Venkata Bhargavi., Syed Khadar Basha., Ramineni Dhanush., Guduru Vikram.

    Published 2025-01-01
    “…Future research will be the integration of the system into real-time surveillance systems and exploring added sensory data to increase the detection capabilities.…”
    Get full text
    Article
  8. 728

    Detecting Simulated Nosocomial Disease Outbreaks with Sequential Monte Carlo Methods by Dr Conor Rosato

    Published 2025-03-01
    “…Discussion: The proposed algorithm successfully detects outbreaks in a timely manner. A drawback of the scenarios considered is that the algorithm runs on synthetic data. …”
    Get full text
    Article
  9. 729
  10. 730

    A software pipeline for systematizing machine learning of speech data by Jimuel Celeste, Mashrura Tasnim, Amable J. Valdés Cuervo, Enrique A. de la Cal, Eleni Stroulia

    Published 2025-07-01
    “…The machine-learning community has a long-established practice of sharing data sets so that researchers can report the performance of their models on the same data. …”
    Get full text
    Article
  11. 731

    Ensuring the basic rights in fighting against corruption using Big Data in the People’s Republic of China: the main laws, risks and paths by R. Hu

    Published 2020-12-01
    “…Objective: to analyze the observance of fundamental rights in fighting corruption using Big Data in China.Methods: dialectical approach to the cognition of social phenomena, which allows analyzing them in their historical development and functioning in the context of a set of objective and subjective factors, which determined the choice of the following research methods: formal-logical, comparative-legal, and sociological.Results: following the rapid development of information technologies, Big Data has become a sharp sword of the Chinese regulatory authorities fighting corruption. …”
    Get full text
    Article
  12. 732

    PCB defect detection based on pseudo-inverse transformation and YOLOv5. by Xiaoli Wang, Siti Sarah Maidin, Malathy Batumalay

    Published 2024-01-01
    “…The average detection accuracy of six types of defects in the self-made PCB data set was over 98.52%, and the average detection accuracy was as high as 99.1%. …”
    Get full text
    Article
  13. 733
  14. 734

    Educational Data Mining by Optimally Fusing Shallow and Deep Features by Bo-An Xiao

    Published 2022-01-01
    “…The conclusive product is a flat semantic description that effectively detects copying and objection. Experiments are performed on a generic dataset, and we use the old-fashioned manual birth method and two well-known data sets VGG16 and fine-tune AlexNet.…”
    Get full text
    Article
  15. 735

    Detection of surface defects on conveyor belts based on adversarial repair networks by YANG Zelin, YANG Liqing, HAO Bin

    Published 2024-09-01
    “…In response to the challenges of acquiring and labeling defect data on conveyor belts, as well as the low accuracy of deep learning-based conveyor belt defect detection methods due to unstable factors and data fluctuations in working environments, this study proposed a surface defect detection model based on adversarial repair networks. …”
    Get full text
    Article
  16. 736

    Recognition of Handwritten Characters in Birch-Bark Manuscripts via Object Detection by Ivan P. Malashin, Vadim S. Tynchenko, Andrei P. Gantimurov, Vladimir A. Nelyub, Aleksei S. Borodulin

    Published 2025-01-01
    “…This study adapts the YOLO-based object detection framework for detection and recognition of handwritten characters in digital photographs of Novgorod birch-bark fragments. …”
    Get full text
    Article
  17. 737

    A Novel Authentication Management for the Data Security of Smart Grid by Imtiaz Parvez, Maryamossadat Aghili, Hugo Riggs, Aditya Sundararajan, Arif I. Sarwat, Anurag K. Srivastava

    Published 2024-01-01
    “…In this setting, one server handles the data encryption between the meter and control center/central database, and the other server administers the random sequence of data transmission. …”
    Get full text
    Article
  18. 738
  19. 739

    Evaluation of Artificial Intelligence Effectiveness in Detection of Lumbosacral Spine Degenerative Diseases by N. В. Nudnov, A. V. Korobov, А. А. Skachkov, T. V. Kulneva, V. V. Sherstoboev, L. А. Titova, A. S. Rusakov, V. V. Tumko, R. S. Sarbaev, N. А. Uspenskaya, E. А. Andrienko, M. Е. Ivannikov

    Published 2024-06-01
    “…Objective: comparative evaluation of output data of a set of trained convolutional neural network (CNN) models and interpretation of pathological changes in lumbar spine by radiologists during magnetic resonance imaging.Material and methods. …”
    Get full text
    Article
  20. 740