-
181
Tunnel Crack Segmentation Algorithm Based on Feature Enhancement
Published 2025-01-01“…To address these challenges, this paper proposes a tunnel crack detection method. Firstly, a novel Dynamic Feature Enhancement Network (DFEN) module is designed to extract preliminary features using a feature extractor and selectively enhance feature representations through a gating mechanism. …”
Get full text
Article -
182
Spectrum‐sensing algorithm based on graph feature fusion
Published 2024-12-01“…Therefore, a spectrum‐sensing algorithm based on graph feature fusion using a quadratic form derived from self‐loop weights and the graph Laplacian matrix is proposed in this study. …”
Get full text
Article -
183
-
184
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms
Published 2025-07-01“…Besides, the proposed MDMIoV-DLXAI model utilizes the reptile search algorithm (RSA) model for feature selection. Furthermore, the hybrid of bidirectional long short-term memory with a multi-head self-attention (BiLSTM-MHSA) model is employed for the malware classification process. …”
Get full text
Article -
185
Geometrically synchronous watermarking algorithm based on the corner feature
Published 2011-01-01“…Simple geometric attacks could destroy watermark or its position,causing the failure of most watermarking algorithm.A geometrically synchronous watermarking algorithm robust based on the corner feature was proposed.In this paper,the feature point was detected on the normalization of the image to resist geometric attack;the combination of Harris and MIC corner detected algorithm was utilized to extract steady corner based on analyzing the advantages and disadvantages of the two algorithm;the watermarking information was statistic embed in the shape of rings instead of changing the simply one pixel.Sufficient experiments demonstrate the robustness of this approach,especially in resisting geometry attack such as RST(rotation,scaling and translation).…”
Get full text
Article -
186
-
187
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments
Published 2025-07-01“…The Mayfly Optimization Algorithm (MOA) is then utilized for feature selection, effectively mitigating computational complexity. …”
Get full text
Article -
188
A Machine Learning Algorithm Using Texture Features for Nighttime Cloud Detection from FY-3D MERSI L1 Imagery
Published 2025-03-01“…This IR-alone algorithm advancement offers a reliable tool for nighttime cloud detection, significantly enhancing the quantitative applications of satellite imager observations.…”
Get full text
Article -
189
Binocular Vision-Based Target Detection Algorithm
Published 2025-01-01“…In the field of target detection, algorithms are challenged with multi-objective optimization problems in identifying detection targets, and it is also crucial to improve the recognition of small and insignificant targets. …”
Get full text
Article -
190
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…Therefore, a lightweight helmet detection algorithm PFW YOLO is proposed in this paper. …”
Get full text
Article -
191
Pupil Detection Algorithm Based on ViM
Published 2025-06-01“…This algorithm introduces weighted feature fusion, aiming to enable the model to adaptively learn the contribution of different feature patches to the pupil detection results; combines ViM with the MSA (multi-head self-attention) mechanism), aiming to integrate global features and improve the accuracy and robustness of pupil detection; and uses FFT (Fast Fourier Transform) to convert the time-domain vector outer product in MSA into a frequency–domain dot product, in order to reduce the computational complexity of the model and improve the detection efficiency of the model. …”
Get full text
Article -
192
Multi-Scale Feature Similarity and Object Detection for Small Printing Defects Detection
Published 2024-01-01“…To address this problem, a defect detection algorithm based on multi-scale feature similarity evaluation and small object defect detection is proposed. …”
Get full text
Article -
193
YOLO-EFM: Efficient traffic flow monitoring algorithm with enhanced multi-level information fusion
Published 2025-06-01“…Modern drones are capable of autonomously and efficiently collecting traffic images in complex environments to implement downstream detection tasks. However, existing object detection algorithms face challenges in recognizing blurred targets and detecting multi-scale objects. …”
Get full text
Article -
194
-
195
Feature extraction method based on point pair hierarchical clustering
Published 2020-07-01Subjects: “…feature detection method…”
Get full text
Article -
196
Scene Text Detection Based on Multi-scale Feature Extraction and Bidirectional Feature Fusion
Published 2024-08-01“…To address the above problems, a scene text detection algorithm based on multi-scale feature extraction and bidirectional feature fusion is proposed. …”
Get full text
Article -
197
Wind Turbine Blade Fault Detection Method Based on TROA-SVM
Published 2025-01-01“…This method integrates the Tyrannosaurus Optimization Algorithm (TROA) with a support vector machine (SVM), aiming to enhance the accuracy and reliability of fault detection. …”
Get full text
Article -
198
Research on YOLOv5 Oracle Recognition Algorithm Based on Multi-Module Fusion
Published 2025-01-01“…BiFPN-SDI enables more precise feature fusion and attention mechanisms, improving the detection of small targets. …”
Get full text
Article -
199
Detection of phishing portals through machine learning algorithms
Published 2024-10-01“…Objective Analysis and practical implementation of the phishing portal detection functionality through machine learning algorithms. …”
Get full text
Article -
200
Improved faster R-CNN for steel surface defect detection in industrial quality control
Published 2025-08-01Subjects: “…Defect detection…”
Get full text
Article