Suggested Topics within your search.
Suggested Topics within your search.
-
1841
An Advanced LSTM Framework for Pest Detection and Classification in Agricultural Settings
Published 2025-01-01Get full text
Article -
1842
Pupil Detection Execution Time Reduction in Iris Recognition System
Published 2008-12-01“…The results of the study proved that the best technique for pupil detection is when using the combined technique. It gives about 100% success rate for pupil detection.…”
Get full text
Article -
1843
Surface roughness detection based on spindle motor current signal
Published 2024-02-01“…The total harmonic distortion feature achieves built-up edge detection during the machining process. The workpiece surface roughness detection accuracy is as high as 95%. …”
Get full text
Article -
1844
Target Detection Label Assignment Method Based on Global Information
Published 2022-08-01“…Aiming at this problem, this paper proposes a target detection label allocation method based on global information, which uses the assignment method to establish a global optimal label allocation mathematical model based on the loss function in the model training stage, and gives the fusion mode of the model with other object detection models, and the role played by the method in the process of object detection. …”
Get full text
Article -
1845
Multimodal Fusion Anomaly Detection Model for Agricultural Wireless Sensors
Published 2024-12-01“…In order to detect anomalous data accurately for agricultural wireless sensors, in this article, we propose an anomaly detection model that combines multimodal fusion and error reconstruction. …”
Get full text
Article -
1846
Enhanced Detection of Human Plasma Proteins on Nanostructured Silver Surfaces
Published 2013-08-01“…We also studied the effect of a working electrode polishing process on electrodeposition and identification of proteins. …”
Get full text
Article -
1847
Un/Detectability in Times of “Equality”: HIV, Queer Health, and Homonormativity
Published 2017-03-01Get full text
Article -
1848
APPLICATION OF CLASSIFICATION BASED ASSOCIATION (CBA) FOR MONKEYPOX DISEASE DETECTION
Published 2025-01-01“…In this study, researchers developed another method to detect monkeypox disease based on its symptoms using the classification by association (CBA) method. …”
Get full text
Article -
1849
SSCANL decoder based joint iterative detection and decoding algorithm
Published 2022-10-01“…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
Get full text
Article -
1850
Recognition and Application of Wear Detection BTA Deep Hole Drilling
Published 2018-10-01“…First,getting a clear image of the wear area through the tool wear image preprocessing which include image gray,filter denoising and threshold segmentation; Then the tool wear was obtained by using the minimum external rectangle method in the preprocessed image,and the effect of the wear rate on the processing aperture was analyzed; The above detection method is used to test the BTA deep hole drilling, which provides data support for improving the service life of the tool.…”
Get full text
Article -
1851
Application of machine learning methods for automated detection of network intrusions
Published 2023-05-01“…Development of automated network attack detection systems capable of adapting to the ever-changing nature of network attacks and new types of threats. …”
Get full text
Article -
1852
SSCANL decoder based joint iterative detection and decoding algorithm
Published 2022-10-01“…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
Get full text
Article -
1853
Enhancing Weakly-Supervised Video Anomaly Detection With Temporal Constraints
Published 2025-01-01“…Anomaly Detection has been a significant field in Machine Learning since it began gaining traction. …”
Get full text
Article -
1854
Progress in Nondestructive Detection Techniques for Internal Defects of Agro-products
Published 2025-08-01“…Internal defects can easily develop during the growth process of agro-products, significantly affecting their economic value. …”
Get full text
Article -
1855
Impedance Spectrum Measurement and Fault Detection for XLPE Coaxial Cables
Published 2024-10-01“… XLPE coaxial cables are prone to faults and defects in the process of power transmission, seriously jeopardizing the safe operation of the power system. …”
Get full text
Article -
1856
Prediction of Wafer Performance: Use of Functional Outlier Detection and Regression
Published 2025-01-01“…Optical emission spectroscopy (OES) data is essential for virtual metrology, enabling accurate predictions of wafer performance in plasma etching processes. This approach not only reduces the need for physical measurements of product quality, leading to significant resource savings, but also supports improved decision-making, particularly in process control and quality assurance. …”
Get full text
Article -
1857
Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces
Published 2023-01-01“…The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. …”
Get full text
Article -
1858
Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection
Published 2025-01-01“…Detection of defects on wood during quality processes in the wood industry is extremely important both economically and in terms of production and use. …”
Get full text
Article -
1859
AI-driven epidemic intelligence: the future of outbreak detection and response
Published 2025-07-01“…Epidemic intelligence, the process of detecting, verifying, and analyzing public health threats to enable timely responses, traditionally relies heavily on manual reporting and structured data, often causing delays and coverage gaps. …”
Get full text
Article -
1860
Detecting House of Spirit Attacks by Glibc Heap Information Extraction
Published 2024-02-01“…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
Get full text
Article