Showing 1,241 - 1,260 results of 1,858 for search 'features detection problem', query time: 0.10s Refine Results
  1. 1241

    Influence of Geometry and Boundary Conditions in Area of Cohesion between Materials on the Reflection of an Ultrasonic Beam. Part 1. Theoretical research by A. R. Bayev, A. L. Mayorov, N. V. Levkovich, D. V. Shavlovskiy, M. V. Asadchaya

    Published 2021-06-01
    “…The improvement of efficiency, reliability and productivity of ultrasonic testing of objects with cohesion between materials connected by welding, soldering, gluing, etc. is 'an important problem of the modern production technologies. The purpose of the paper is to determine in 3D space the conditions for increasing the sensitivity and reliability of the flaw detection in the cohesion zone between materials when the form of defect interface can be different.In the first part of the theoretical study the features of the formation of the acoustic fields of ultrasonic waves scattered from solid's interface when spot of an acoustic beam crosses the boundary of the defective region in the shape of an ellipse or a long strip have been investigated. …”
    Get full text
    Article
  2. 1242

    Hardware and Software Complex for the Study of the Joint Use of Technical Means Based on Various Physical Principles by E. I. Mikhnionok, A. V. Khizniak

    Published 2023-04-01
    “…This hardware and software complex is a set of jointly functioning security equipment (optoelectronic system, seismic sensors, fiber-optic sensors) that solve the problem of automatic detection of moving objects in a given area of space. …”
    Get full text
    Article
  3. 1243

    Rapid acquisition and surface defects recognition based on panoramic image of small-section hydraulic tunnel by Haoyu Wang, Jichen Xie, Jinyang Fu, Cong Zhang, Dingping Chen, Zhiheng Zhu, Xuesen Zhang

    Published 2025-04-01
    “…The proposed YOLOv5-DECA has great detection performance for targets with variable shapes and can solve the problem of classification imbalance in surface defects. …”
    Get full text
    Article
  4. 1244

    Practical Malware Analysis by D. A. Elizarov, A. V. Katkov

    Published 2023-10-01
    “…Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. …”
    Get full text
    Article
  5. 1245

    Systematically constructing the likelihood for boosted $H\to gg$ decays by Andrew J. Larkoski

    Published 2025-04-01
    “…Though this decay mode of the Higgs is unlikely to be discovered at the LHC, we analytically demonstrate several features of the likelihood ratio for this problem through explicit analysis of signal and background matrix elements. …”
    Get full text
    Article
  6. 1246

    Optimizing cervical cancer diagnosis with accurate cell classification using modified HDFF by Pooja Patre, Dipti Verma

    Published 2025-01-01
    “…By enhancing the feature extraction process and combining multiple layers of deep learning models, the Modified HDFF method improves classification performance across various tasks, ranging from binary to multi-class problems. …”
    Get full text
    Article
  7. 1247

    Traffic Classification in Software-Defined Networking Using Genetic Programming Tools by Spiridoula V. Margariti, Ioannis G. Tsoulos, Evangelia Kiousi, Eleftherios Stergiou

    Published 2024-09-01
    “…The key element of the GenClass method is that it can generate classification rules programmatically and detect the hidden associations that exist between the problem features and the desired classes. …”
    Get full text
    Article
  8. 1248

    Temporal Analysis of Multispectral Satellite Data for the Purpose of Urbanization Monitoring by V. Kević, I. Racetin, A. Krtalić

    Published 2025-07-01
    “…Monitoring the urbanization process and early detection of illegal construction should enable meaningful urban planning and the protection of natural and cultural features of the community. …”
    Get full text
    Article
  9. 1249

    FocusDet: an efficient object detector for small object by Yanli Shi, Yi Jia, Xianhe Zhang

    Published 2024-05-01
    “…It consists of three parts: backbone, feature fusion structure, and detection head. STCF-EANet was used as the backbone for feature extraction, the Bottom Focus-PAN for feature fusion, and the detection head for object localization and recognition.To maintain sufficient global context information and extract multi-scale features, the STCF-EANet network backbone is used as the feature extraction network.PAN is a feature fusion module used in general object detectors. …”
    Get full text
    Article
  10. 1250

    Development of methods for neutralizing «Zero-day» threats by A. I. Dubrovina, M. H. Alcordi

    Published 2024-01-01
    “…The actual problem of information systems security - the threat of «zero-day» is considered. …”
    Get full text
    Article
  11. 1251

    Dual Function Radar and Communication Waveform Design Based on Sub-pulse Hybrid Modulation by Yu LIU, Junhao ZHANG, Xue YAO, Xianxiang YU, Guolong CUI

    Published 2025-08-01
    “…The DFRC waveform design problem is formulated based on minimizing cross- and auto-correlation Peak Sidelobe Levels (PSL), while considering constant envelope and SHM constraints. …”
    Get full text
    Article
  12. 1252

    Diversities between pediatric extra-pulmonary and pulmonary tuberculosis: a warning sign for the future by ilker devrim, Hüseyin Aktürk, Hüseyin Aktürk, Nuri Bayram, Nuri Bayram, Hurşit Apa, Hurşit Apa, Şener Tulumoğlu, Şener Tulumoğlu, Fatma Devrim, Fatma Devrim, Tulin Erdem, Tulin Erdem, Yüce Ayhan, Yüce Ayhan, İpek Tamsel, İpek Tamsel, Demet Can, Demet Can, Hüdaver Alper, Hüdaver Alper

    Published 2014-08-01
    “…Background: Tuberculosis(TB) remains a major global health problem. The childhood tuberculosis has some unique features different which makes the diagnosis more complicated. …”
    Get full text
    Article
  13. 1253

    Attack traffic allocation and load balancing mechanism for SDN by LI Man, ZHOU Huachun, XU Qi, DENG Shuangxing, ZOU Tao, ZHANG Ruyun

    Published 2025-03-01
    “…To tackle the problem of traditional traffic allocation methods in software-defined networks (SDN) potentially failing to effectively detect distributed denial of service (DDoS) attacks, a traffic allocation and load balancing mechanism for attack traffic was proposed. …”
    Get full text
    Article
  14. 1254

    Robust screening of atrial fibrillation with distribution classification by Pierre-François Massiani, Lukas Haverbeck, Claas Thesing, Friedrich Solowjow, Marlo Verket, Matthias Daniel Zink, Katharina Schütt, Dirk Müller-Wieland, Nikolaus Marx, Sebastian Trimpe

    Published 2025-07-01
    “…It achieves state-of-the-art performance and unprecedented robustness on the screening problem while only leveraging one interpretable feature and little training data. …”
    Get full text
    Article
  15. 1255

    Conceptual Approaches аnd the Program of Polimas-Stability Study of Migration of Foreign Students in Russia by N. A. Shchitova, V. S. Belozerov, I. A. Soloviev

    Published 2023-01-01
    “…An analysis of the state of the theoretical and methodological base on the problem of migration of foreign students made it possible to establish the lack of elaboration of aspects related to the spatial features of their transformation and, in particular, the adaptation of foreign students in host countries. …”
    Get full text
    Article
  16. 1256

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article
  17. 1257

    Reliable identification method of intrusion personnel in front of underground moving equipment by Bin LIANG, Guang LI, Guangpeng SHAN

    Published 2025-08-01
    “…By introducing the Sobel residual block structure, a fusion model of infrared and visible images based on improved STDFusionNet network architecture is constructed to enhance the feature representation of the fused image. Then, a reliable identification method of underground personnel based on YOLOv5s is proposed, and the visible light and infrared dual-modal features are combined to fuse and complement each other, and an end-to-end single-stage detection model of intrusive personnel in front of underground moving equipment is constructed, which realizes the reliable detection of intrusive personnel in front of underground moving equipment. …”
    Get full text
    Article
  18. 1258

    On the Equilibrium State Stability of a Neural Network Model by Y. V. Bogomolov

    Published 2014-06-01
    “…In the paper, a neural network model based on three McCulloch–Pitts adder neurons is considered. Previously, the features of the model dynamics were numerically analyzed and the stability of various dynamic modes of the network with small changes of the current state was studied, including the detection of parameters specific for the chaotic system dynamics. …”
    Get full text
    Article
  19. 1259

    Method for reconstructing safety and arming motion process by integrating Kalman filter and KCF by Yinhuan Zhang, Qinkun Xiao, Xing Liu, Yongquan Wei, Jingyun Xue

    Published 2025-03-01
    “…Abstract This paper addresses the challenge of reconstructing the motion process of the safety and arming (S&A) mechanism in fuze by transforming the problem into a target detection and tracking problem. …”
    Get full text
    Article
  20. 1260

    Design of Enhanced License Plate Information Recognition Algorithm Based on Environment Perception by Zilu Wang, Limin Zheng, Gang Li

    Published 2025-01-01
    “…Aiming at the problem of difficulty in completely and accurately identifying number plate information in bad weather, this study proposes an algorithm based on environmental perception and the enhanced recognition of number plate information. …”
    Get full text
    Article