Showing 1,901 - 1,920 results of 25,128 for search 'detection (process OR programs)', query time: 0.31s Refine Results
  1. 1901

    Early detection of risky spatio-temporal congestion in urban traffic by Shaobo Sui, Dan Xu, Mingyang Bai, Xiaoke Zhang, Zhaojun Mao, Daqing Li

    Published 2025-01-01
    “…In this article, we develop a detection method for risky congestion based on its spatio-temporal evolution feature, which can detect risky spatio-temporal congestion clusters (SCCs) when they are small. …”
    Get full text
    Article
  2. 1902

    Mixed Gas Detection and Temperature Compensation Based on Photoacoustic Spectroscopy by Sun Chao, Hu Runze, Liu Niansong, Ding Jianjun

    Published 2024-01-01
    “…Experimental results show that, compared to the traditional SVM algorithm, the KNN-SVM algorithm performs better in gas classification prediction, with an accuracy rate of 99.167% and an AUC indicator of 99.375%, enhancing the accuracy of gas detection. In response to the impact of temperature on the system during the experimental process, a WOA-BP temperature compensation model was established to compensate for temperature in gas concentration detection. …”
    Get full text
    Article
  3. 1903

    Capacity Constraint Analysis Using Object Detection for Smart Manufacturing by Hafiz Mughees Ahmad, Afshin Rahimi, Khizer Hayat

    Published 2024-10-01
    “…The increasing adoption of Deep Learning (DL)-based Object Detection (OD) models in smart manufacturing has opened up new avenues for optimizing production processes. …”
    Get full text
    Article
  4. 1904

    Automated detection of hospital outbreaks: A systematic review of methods. by Brice Leclère, David L Buckeridge, Pierre-Yves Boëlle, Pascal Astagneau, Didier Lepelletier

    Published 2017-01-01
    “…<h4>Results</h4>Twenty-nine studies were included. The detection algorithms were grouped into 5 categories: simple thresholds (n = 6), statistical process control (n = 12), scan statistics (n = 6), traditional statistical models (n = 6), and data mining methods (n = 4). …”
    Get full text
    Article
  5. 1905

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  6. 1906

    Weed detection on embedded systems using computer vision algorithms by D. Shadrin, S. Illarionova, R. Kasatov, M. Akimenkova, G. Rudensky, E. Erhan

    Published 2025-02-01
    “…They allow one to automate data analysis process and to make decisions faster. However, the weed detection task in agriculture requires not only high recognition accuracy, but also fast computations on portable devices with low memory availability that makes it possible to embed computer vision systems on unmanned aerial vehicles (UAVs). …”
    Get full text
    Article
  7. 1907

    Automatic Acne Detection Model Based on Improved YOLOv7 by Delong Zhang, Chunyang Jin, Zhidong Zhang, Xiyuan Cao, Chenyang Xue

    Published 2024-01-01
    “…The mAP is 4.57% higher than the initial model and better than the general object detection model. This model holds promise for effectively managing patient health status and providing valuable assistance to physicians in the diagnostic process.…”
    Get full text
    Article
  8. 1908

    Detection-Oriented Evaluation of SAR Dexterous Barrage Jamming Effectiveness by Hai Zhu, Sinong Quan, Shiqi Xing, Haoyu Zhang, Yun Ren

    Published 2025-03-01
    “…Starting from the detection, it divides the evaluation process into two stages: (1) for the case in which the target can be detected under the jamming scenario, two feature parameters, namely, the target exposion area and target relative magnitude, are extracted; (2) for the case in which the target cannot be detected under the jamming scenario, another three feature parameters, namely, jamming relative magnitude, average edge brightness, and local information entropy, are extracted. …”
    Get full text
    Article
  9. 1909

    Terahertz Metasurfaces for Polarization Manipulation and Detection: Principles and Emerging Applications by Yongliang Liu, Yifei Xu, Bo Yu, Wenwei Liu, Zhengren Zhang, Hua Cheng, Shuqi Chen

    Published 2025-02-01
    “…Abstract Terahertz frequencies locating between microwave and infrared regions can record and process optical information for next‐generation information technology such as 6G communication. …”
    Get full text
    Article
  10. 1910

    Radar Detection Simulation by Digital Twins of Target and Antenna System by A. S. Grigoriev, A. A. Kazantsev, A. M. Terentyev, B. S. Stavtsev

    Published 2025-03-01
    “…Development of an algorithmic support for simulating the radar detection process using digital twins of the antenna system and the observation object.Materials and methods. …”
    Get full text
    Article
  11. 1911

    Underground helmet detection algorithm based on improved YOLOv8s by Jiaru YANG, Yinan QIN, Tianxu LI, Han ZHUANG

    Published 2025-05-01
    “…In the process of coal mine underground operation, the safety helmet is the most direct and effective protective measure, and it is an important measure to ensure the safety of miners. …”
    Get full text
    Article
  12. 1912

    Target Detection and Characterization of Multi-Platform Remote Sensing Data by Koushikey Chhapariya, Emmett Ientilucci, Krishna Mohan Buddhiraju, Anil Kumar

    Published 2024-12-01
    “…Conventionally, target detection in remote sensing has relied on statistical methods that typically assume a linear process for image formation. …”
    Get full text
    Article
  13. 1913

    QEDetr: DETR with Query Enhancement for Fine-Grained Object Detection by Chenguang Dong, Shan Jiang, Haijiang Sun, Jiang Li, Zhenglei Yu, Jiasong Wang, Jiacheng Wang

    Published 2025-03-01
    “…Fine-grained object detection aims to accurately localize the object bounding box while identifying the specific model of the object, which is more challenging than conventional remote sensing object detection. …”
    Get full text
    Article
  14. 1914

    An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection by Chengsheng Yuan, Zhenyu Xu, Xinting Li, Zhili Zhou, Junhao Huang, Ping Guo

    Published 2024-01-01
    “…Consequently, a fingerprint presentation attack detection (PAD) strategy is proposed to ensure the security of these systems. …”
    Get full text
    Article
  15. 1915

    Transfer Learning-Based Anomaly Detection System for Autonomous Vehicle by Md. Humayun Kabir, Mohammad Nadib Hasan, Ahmad, Hassan Jaki

    Published 2023-11-01
    “…A system that combines the control of a physical process with computing technology and communication networks is called a cyber–physical system (CPS). …”
    Get full text
    Article
  16. 1916

    Real Time Person Detection and Distance Estimation Using Stereovision by Rachidi Oumayma, Bououlid Idrissi Badr, Ed-Dahmani Chafik

    Published 2025-01-01
    “…Pedestrian detection constitutes a fundamental component of Advanced Driver Assistance Systems (ADAS). playing a pivotal role in ensuring road safety and reducing the risk of accidents. …”
    Get full text
    Article
  17. 1917
  18. 1918

    Reusable Biosensor for Easy RNA Detection from Unfiltered Saliva by Paweł Wityk, Agata Terebieniec, Robert Nowak, Jacek Łubiński, Martyna Mroczyńska-Szeląg, Tomasz Wityk, Dorota Kostrzewa-Nowak

    Published 2025-01-01
    “…Biosensors are transforming point-of-care diagnostics by simplifying the detection process and enabling rapid, accurate testing. …”
    Get full text
    Article
  19. 1919

    RADAR: Reasoning AI-Generated Image Detection for Semantic Fakes by Haochen Wang, Xuhui Liu, Ziqian Lu, Cilin Yan, Xiaolong Jiang, Runqi Wang, Efstratios Gavves

    Published 2025-07-01
    “…Specifically, RADAR contains a specialized multimodal LLM to process given images and detect semantic fakes. To improve the generalization ability, we further incorporate ChatGPT as an assistor to detect unrealistic components in grounded text descriptions. …”
    Get full text
    Article
  20. 1920

    Optimizing credit card fraud detection with random forests and SMOTE by P. Sundaravadivel, R. Augustian Isaac, D. Elangovan, D. KrishnaRaj, V. V. Lokesh Rahul, R. Raja

    Published 2025-05-01
    “…Subsequently, various techniques are employed to pre-process the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). …”
    Get full text
    Article