Gotowa bibliografia na temat „Optimized detection model”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Optimized detection model”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Optimized detection model"
Huang, K. "An Optimized LightGBM Model for Fraud Detection". Journal of Physics: Conference Series 1651 (listopad 2020): 012111. http://dx.doi.org/10.1088/1742-6596/1651/1/012111.
Pełny tekst źródłaHu, JianSheng, JunJie Ma, Bin Xiao i Rui Zhang. "Improved Lightweight YOLOv3 model for Target Detection Algorithm". Journal of Physics: Conference Series 2370, nr 1 (1.11.2022): 012029. http://dx.doi.org/10.1088/1742-6596/2370/1/012029.
Pełny tekst źródłaBoonsim, Noppakun, i Saranya Kanjaruek. "Optimized transfer learning for polyp detection". ECTI Transactions on Computer and Information Technology (ECTI-CIT) 17, nr 1 (18.02.2023): 73–81. http://dx.doi.org/10.37936/ecti-cit.2023171.250910.
Pełny tekst źródłaBehera, Bibhuti Bhusana, Binod Kumar Pattanayak i Rajani Kanta Mohanty. "Deep Ensemble Model for Detecting Attacks in Industrial IoT". International Journal of Information Security and Privacy 16, nr 1 (1.01.2022): 1–29. http://dx.doi.org/10.4018/ijisp.311467.
Pełny tekst źródłaAl-Sarem, Mohammed, Faisal Saeed, Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed, Tawfik Al-Hadhrami, Mohammad T. Alshammari, Abdulrahman Alreshidi i Talal Sarheed Alshammari. "An Optimized Stacking Ensemble Model for Phishing Websites Detection". Electronics 10, nr 11 (28.05.2021): 1285. http://dx.doi.org/10.3390/electronics10111285.
Pełny tekst źródłaRagab, Mahmoud, Khalid Eljaaly, Maha Farouk S. Sabir, Ehab Bahaudien Ashary, S. M. Abo-Dahab i E. M. Khalil. "Optimized Deep Learning Model for Colorectal Cancer Detection and Classification Model". Computers, Materials & Continua 71, nr 3 (2022): 5751–64. http://dx.doi.org/10.32604/cmc.2022.024658.
Pełny tekst źródłaVasavi, CH, i N. Divya Sruthi. "Detection of Lung Cancer Using Optimized SVM-CNN Model". International Journal for Research in Applied Science and Engineering Technology 11, nr 6 (30.06.2023): 4608–13. http://dx.doi.org/10.22214/ijraset.2023.54496.
Pełny tekst źródłaGhaleb Al-Mekhlafi, Zeyad, Badiea Abdulkarem Mohammed, Mohammed Al-Sarem, Faisal Saeed, Tawfik Al-Hadhrami, Mohammad T. Alshammari, Abdulrahman Alreshidi i Talal Sarheed Alshammari. "Phishing Websites Detection by Using Optimized Stacking Ensemble Model". Computer Systems Science and Engineering 41, nr 1 (2022): 109–25. http://dx.doi.org/10.32604/csse.2022.020414.
Pełny tekst źródłaMoukhafi, Mehdi, Khalid El Yassini i Bri Seddik. "Intrusions detection using optimized support vector machine". International Journal of Advances in Applied Sciences 9, nr 1 (1.03.2020): 62. http://dx.doi.org/10.11591/ijaas.v9.i1.pp62-66.
Pełny tekst źródłaFeng, Junzhe, Chenhao Yu, Xiaoyi Shi, Zhouzhou Zheng, Liangliang Yang i Yaohua Hu. "Research on Winter Jujube Object Detection Based on Optimized Yolov5s". Agronomy 13, nr 3 (10.03.2023): 810. http://dx.doi.org/10.3390/agronomy13030810.
Pełny tekst źródłaRozprawy doktorskie na temat "Optimized detection model"
Montes, Martin Alejandro. "Monte carlo simulations as a tool to optimize target detection by AUV/ROV laser line scanners". [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001295.
Pełny tekst źródłaMohan, Rathish. "Algorithmic Optimization of Sensor Placement on Civil Structures for Fault Detection and Isolation". University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1353156107.
Pełny tekst źródłaChauhan, Ajay Singh. "Financial statement fraud detection Model based on Hybrid data mining methods: Proposing an optimized Detection model". Thesis, 2019. http://dspace.dtu.ac.in:8080/jspui/handle/repository/17200.
Pełny tekst źródłaCheng-YuanChen i 陳正元. "Facial Feature Point Detection using Shape Optimized Search and Tracking using Inverse Compositional Active Appearance Models". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/08075334818920959853.
Pełny tekst źródła國立成功大學
資訊工程學系碩博士班
101
Understanding human action is one of the most important issues of computer vision. In recent years, non-contact human action analysis system using camera has become more and more popular because the price of camera devices are getting lower. In human action analysis systems, facial feature points can tell a lot about the motion of human head such as gazing direction, drowsy and facial expression. In this thesis, a real-time system is proposed to detect the facial feature points and track these points with high accuracy and low computational cost. In the feature point detection algorithm of our system, approximately face position will be detected and compared with each feature template to create the location probability table for each point. After that, we can extract the feature points from the face by maximizing the sum of each feature point's location probability with suitable shape constraint. The feature point tracking algorithm of our system can be deliberated into three major steps. The first step is warping the face to frontal view by estimating current feature point positions. The second step is to estimate the current warping error by comparing the warped face with the trained frontal face template. The third step is updating the feature point positions by analyzing current warping error. System can track the feature points with high accuracy by iteratively updating the current feature point positions.
HAIKL, Petr. "Ověření funkce bezkontaktního snímače hladiny paliva v palivové nádrži". Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-156178.
Pełny tekst źródłaKsiążki na temat "Optimized detection model"
Basu, Sanjay. Modeling Public Health and Healthcare Systems. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190667924.001.0001.
Pełny tekst źródłaTaillefer, Raymond, i Frans J. Th Wackers. Kinetics of Conventional and New Cardiac Radiotracers. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199392094.003.0004.
Pełny tekst źródłaCzęści książek na temat "Optimized detection model"
Abid, Nesrine, Kais Loukil, Walid Ayedi, Ahmed Chiheb Ammari i Mohamed Abid. "Optimized Parallel Model of Covariance Based Person Detection". W Image Analysis and Processing — ICIAP 2015, 287–98. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23234-8_27.
Pełny tekst źródłaSinhmar, Abhinav, Vinamra Malhotra, R. K. Yadav i Manoj Kumar. "Spam Detection Using Genetic Algorithm Optimized LSTM Model". W Computer Networks and Inventive Communication Technologies, 59–72. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_5.
Pełny tekst źródłaPark, ByoungGun, Ji Su Park i YounSoon Shin. "Optimized Vehicle Fire Detection Model Based on Deep Learning". W Advances in Computer Science and Ubiquitous Computing, 685–91. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1252-0_92.
Pełny tekst źródłaLiu, Lianye, Jinping Liu, Juanjuan Wu, Jiaming Zhou i Meiling Cai. "Novelty Detection-Based Automated Anomaly Identification via Optimized Deep Generative Model". W Big Data, 117–34. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9709-8_9.
Pełny tekst źródłaBodavarapu, Pavan Nageswar Reddy, P. V. V. S. Srinivas, Pragnyaban Mishra, Venkata Naresh Mandhala i Hye-jin Kim. "Optimized Deep Neural Model for Cancer Detection and Classification Over ResNet". W Smart Technologies in Data Science and Communication, 267–80. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1773-7_22.
Pełny tekst źródłaReddy, Mure Vamsi Kalyan, Prithvi K. Murjani, Sujatha Rajkumar, Thomas Chen i V. S. Ajay Chandrasekar. "Optimized CNN Model with Deep Convolutional GAN for Brain Tumor Detection". W Third Congress on Intelligent Systems, 409–25. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9225-4_31.
Pełny tekst źródłaAl-Mekhlafi, Zeyad Ghaleb, i Badiea Abdulkarem Mohammed. "Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection". W Communications in Computer and Information Science, 447–56. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8059-5_27.
Pełny tekst źródłaAbid, Nesrine, Tarek Ouni, Kais Loukil, A. Chiheb Ammari i Mohamed Abid. "Optimized Parallel Model of Human Detection Based on the Multi-Scale Covariance Descriptor". W Parallel Processing and Applied Mathematics, 423–33. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32149-3_40.
Pełny tekst źródłaMatei, Alexander, i Stefan Ulbrich. "Detection of Model Uncertainty in the Dynamic Linear-Elastic Model of Vibrations in a Truss". W Lecture Notes in Mechanical Engineering, 281–95. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77256-7_22.
Pełny tekst źródłaShead, T. M., I. K. Tezaur, W. L. Davis IV, M. L. Carlson, D. M. Dunlavy, E. J. Parish, P. J. Blonigan, J. Tencer, F. Rizzi i H. Kolla. "A Novel In Situ Machine Learning Framework for Intelligent Data Capture and Event Detection". W Lecture Notes in Energy, 53–87. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16248-0_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Optimized detection model"
Dongdong, Liu, Dou Hongtao, Han Bo i Niu Lei. "An optimized network intrusion detection model". W 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC). IEEE, 2022. http://dx.doi.org/10.1109/imcec55388.2022.10019952.
Pełny tekst źródłaMohapatra, Saumendra Kumar, Abhishek Das i Mihir Narayan Mohanty. "An Optimized Ensemble Model for COVID Detection". W 2022 International Conference on Machine Learning, Computer Systems and Security (MLCSS). IEEE, 2022. http://dx.doi.org/10.1109/mlcss57186.2022.00044.
Pełny tekst źródłaHatua, S., H. Bose i D. N. Ray. "Dynamic and Optimized Model for Stairs Detection". W 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA). IEEE, 2020. http://dx.doi.org/10.1109/ncetstea48365.2020.9119939.
Pełny tekst źródłaThomas, Jaison Shajan, Sania Ejaz, Zaheeruddin Ahmed i Sushma Hans. "Optimized Car Damaged Detection using CNN and Object Detection Model". W 2023 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). IEEE, 2023. http://dx.doi.org/10.1109/iccike58312.2023.10131804.
Pełny tekst źródłaTang, Kuan, Fei Yan i Wenbo Liu. "Pedestrian-Vehicle Detection Model Based on Optimized YOLOv3". W 2020 Chinese Automation Congress (CAC). IEEE, 2020. http://dx.doi.org/10.1109/cac51589.2020.9327192.
Pełny tekst źródłaShukla, Ganesh, Bhargav Desai, Parth Mehta i Sunil Karamchandani. "Holistic Siamese Model Optimized for Aged Face-Sketch Similarity Detection". W 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON). IEEE, 2020. http://dx.doi.org/10.1109/gucon48875.2020.9231260.
Pełny tekst źródłaThaseen, I. Sumaiya, i Ch Aswani Kumar. "Intrusion detection model using fusion of PCA and optimized SVM". W 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019692.
Pełny tekst źródłaWu, Zheng Yi. "Model-Based Leakage Hotspot Detection with Optimized Pressure Logger Placement". W World Environmental and Water Resources Congress 2015. Reston, VA: American Society of Civil Engineers, 2015. http://dx.doi.org/10.1061/9780784479162.074.
Pełny tekst źródłaPan, Wen-Tsao, i Sheng-Chu Su. "Construction of the optimized production performance detection model using data mining". W 2014 IEEE 9th Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2014. http://dx.doi.org/10.1109/iciea.2014.6931491.
Pełny tekst źródłaZhang, Yan, Hongmei Zhang, Xiangli Zhang i Dongsheng Qi. "Deep Learning Intrusion Detection Model Based on Optimized Imbalanced Network Data". W 2018 IEEE 18th International Conference on Communication Technology (ICCT). IEEE, 2018. http://dx.doi.org/10.1109/icct.2018.8600219.
Pełny tekst źródłaRaporty organizacyjne na temat "Optimized detection model"
Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, styczeń 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Pełny tekst źródłaAlders, George. L51630A In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics - Phase II. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), listopad 1991. http://dx.doi.org/10.55274/r0011370.
Pełny tekst źródłaAlchanatis, Victor, Stephen W. Searcy, Moshe Meron, W. Lee, G. Y. Li i A. Ben Porath. Prediction of Nitrogen Stress Using Reflectance Techniques. United States Department of Agriculture, listopad 2001. http://dx.doi.org/10.32747/2001.7580664.bard.
Pełny tekst źródłaFluhr, Robert, i Maor Bar-Peled. Novel Lectin Controls Wound-responses in Arabidopsis. United States Department of Agriculture, styczeń 2012. http://dx.doi.org/10.32747/2012.7697123.bard.
Pełny tekst źródłaMultiple Engine Faults Detection Using Variational Mode Decomposition and GA-K-means. SAE International, marzec 2022. http://dx.doi.org/10.4271/2022-01-0616.
Pełny tekst źródła