Showing 21 - 40 results of 1,858 for search 'features detection problem', query time: 0.19s Refine Results
  1. 21

    A robust cyclic-feature detection against noise uncertainty by Qiang CHEN, Ming JIN, Jingwen TONG

    Published 2016-10-01
    “…However, noise uncertainty will degrade its performance severely. Aiming at this problem, a cyclic-feature detection method resisting to noise uncertainty was proposed. …”
    Get full text
    Article
  2. 22

    SIFT Feature-Based Video Camera Boundary Detection Algorithm by Lingqiang Kong

    Published 2021-01-01
    “…Aiming at the problem of low accuracy of edge detection of the film and television lens, a new SIFT feature-based camera detection algorithm was proposed. …”
    Get full text
    Article
  3. 23

    Bacterial Disease Detection of Cherry Plant Using Deep Features by Hatice Kayhan, Emrah Dönmez, Yavuz Ünal

    Published 2024-04-01
    “…These machine learning-based features have been used for the detection of bacteria-based diseases commonly seen on the leaves of cherry plants. …”
    Get full text
    Article
  4. 24

    Impact of Lexical Features on Answer Detection Model in Discussion Forums by Atif Khan, Muhammad Adnan Gul, Abdullah Alharbi, M. Irfan Uddin, Shaukat Ali, Bader Alouffi

    Published 2021-01-01
    “…However, this study proposed an answer detection model that is exclusively relying on lexical features and employs a random forest classifier for classification of answers in discussion boards. …”
    Get full text
    Article
  5. 25

    Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature by LI Kun, LI Bin, ZHU Wenjing, ZHOU Qinglei

    Published 2025-03-01
    “…A cross-architecture vulnerability detection method combining semantic and attribute feature is proposed. …”
    Get full text
    Article
  6. 26

    Exploiting Full-Scale Feature for Remote Sensing Object Detection Based on Refined Feature Mining and Adaptive Fusion by Honghui Xu, Xinqing Wang, Ting Rui, Baoguo Duan, Dong Wang

    Published 2021-01-01
    “…Object detection for remote sensing images remains a challenging problem. …”
    Get full text
    Article
  7. 27

    Enhancing Facial Feature Detection: Hybrid Active Shape and Active Appearance Model (HASAAM) by Musab Iqtait, Jafar Ababneh, Mohammad Rasmi, Amer Abu-Jassar, Suhaila Abuowaida

    Published 2024-01-01
    “…The aim of the HASAAM integrated fitting model is to find new solutions for the feature identification issue by combining the strengths of the Active Shape Model (ASM) and Active Appearance Model (AAM) to provide unique findings on the feature detection problem. …”
    Get full text
    Article
  8. 28
  9. 29
  10. 30

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  11. 31

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  12. 32

    Deep blur detection network with boundary-aware multi-scale features by Xiaoli Sun, Qiwei Wang, Xiujun Zhang, Chen Xu, Weiqiang Zhang

    Published 2022-12-01
    “…To solve this problem, we newly establish a boundary-aware multi-scale deep network in this paper. …”
    Get full text
    Article
  13. 33

    The Impact of Feature Extraction in Random Forest Classifier for Fake News Detection by Dhani Ariatmanto, Anggi Muhammad Rifai

    Published 2024-12-01
    “…This research focuses on detecting and classifying fake news using the Random Forest algorithm by investigating the impact of feature extraction techniques on classification accuracy, this study specifically employs the TF-IDF method. …”
    Get full text
    Article
  14. 34

    Straight Line Features Detection and Mosaic of Wind Power Blades Image by MA Baoyan, TANG Lei, ZHAO Jing, HE Yongjun

    Published 2020-10-01
    “…A splicing method based on line features is proposed to solve this problem. This method first detects straight lines in the images of the wind power blade, then selects the deduplication as the feature for image registration, and finally splices the blade image according to translation rotation matrix.Experimental results show that the proposed method shows strong robustness and stability in complex situations such as single structure, small coincidence degree and diverse backgroundstability.…”
    Get full text
    Article
  15. 35

    Surface Defect Detection Based on Adaptive Multi-Scale Feature Fusion by Guochen Wen, Li Cheng, Haiwen Yuan, Xuan Li

    Published 2025-03-01
    “…However, the diversity of defects and the presence of complex backgrounds bring significant challenges to salient object detection. To this end, this study proposes a new adaptive multi-scale feature fusion network (AMSFF-Net) to solve the SOD problem of object surface defects. …”
    Get full text
    Article
  16. 36

    Infrared dim tiny-sized target detection based on feature fusion by Peng Zhang, Yaman Jing, Guodong Liu, Ziyang Chen, Xiaoyan Wu, Osami Sasaki, Jixiong Pu

    Published 2025-02-01
    “…These two main modules are employed as the core to form a feature fusion network to realize the detection of infrared dim tiny-sized targets. …”
    Get full text
    Article
  17. 37

    Camouflage Target Detection Method with Mutual Compensation of Local-Global Features by HE Wenhao, GE Haibo

    Published 2025-02-01
    “…In response to the above problems, this paper proposes a camouflaged target detection method based on local-global feature mutual compensation, which uses local features and global features to compensate for each other to detect camouflaged targets. …”
    Get full text
    Article
  18. 38

    Webshell malicious traffic detection method based on multi-feature fusion by Yuan LI, Yunpeng WANG, Tao LI, Baoqiang MA

    Published 2021-12-01
    “…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
    Get full text
    Article
  19. 39

    Multi-Scale Feature Fusion Model for Bridge Appearance Defect Detection by Rong Pang, Yan Yang, Aiguo Huang, Yan Liu, Peng Zhang, Guangwu Tang

    Published 2024-03-01
    “…To deal with these issues, this paper proposes a novel Multi-scale Feature Fusion (MFF) model for bridge appearance disease detection. …”
    Get full text
    Article
  20. 40

    Investigating feature extraction by SIFT methods for prostate cancer early detection by Shadan Mohammed Jihad, Ali A. Alsaud, Firas H. Almukhtar, Shahab Kareem, Raghad Zuhair Yousif

    Published 2025-03-01
    “…This study, therefore, highlights the potential for use in the early detection of prostate cancer with advanced feature extraction methods, such as SIFT, and points toward a very promising direction of further research on applying computer vision techniques to problems in medical diagnostic applications. …”
    Get full text
    Article