-
341
Study on Lightweight Bridge Crack Detection Algorithm Based on YOLO11
Published 2025-05-01“…In this study, a lightweight bridge crack detection algorithm, YOLO11-Bridge Detection (YOLO11-BD), is proposed based on the optimization of the YOLO11 model. …”
Get full text
Article -
342
A Defect Detection Algorithm for Optoelectronic Detectors Utilizing GLV-YOLO
Published 2025-02-01“…To meet the demands of real-time and accurate defect detection, this paper introduces an optimization algorithm based on the GLV-YOLO model tailored for photodetector defect detection in manufacturing settings. …”
Get full text
Article -
343
DS-YOLOv7: Dense Small Object Detection Algorithm for UAV
Published 2024-01-01“…In this paper, we propose an improved YOLOv7 UAV dense small object detection algorithm (DS-YOLOv7) to improve the UAV detection performance of dense small objects. …”
Get full text
Article -
344
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
Get full text
Article -
345
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
Get full text
Article -
346
Modified Whale Optimization Algorithm for Multiclass Skin Cancer Classification
Published 2025-03-01“…To address these challenges, this paper proposes an innovative deep learning-based framework that integrates an ensemble of two pre-trained convolutional neural networks (CNNs), SqueezeNet and InceptionResNet-V2, combined with an improved Whale Optimization Algorithm (WOA) for feature selection. The deep features extracted from both models are fused to create a comprehensive feature set, which is then optimized using the proposed enhanced WOA that employs a quadratic decay function for dynamic parameter tuning and an advanced mutation mechanism to prevent premature convergence. …”
Get full text
Article -
347
A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Published 2025-03-01“…In this paper, a new IDS is proposed to detect IoT-Botnet DDoS attacks. This IDS is a new three-phase system, the first phase is related to preprocessing on the dataset and the second phase includes a new hybrid method for feature selection using filter and wrapper methods based on the Grey Wolf (GW) algorithm and genetics called GW-GA. …”
Get full text
Article -
348
Detection algorithm of electronic disguised voice based on convolutional neural network
Published 2018-02-01“…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
Get full text
Article -
349
Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction
Published 2020-07-01Get full text
Article -
350
A Tunnel Surface Diseases Detection Algorithm Based on YOLOv4
Published 2021-01-01“…Experimental results show that the detection speed can reach 55fps by using this algorithm and NVIDIA GeForce 2080Ti. …”
Get full text
Article -
351
Semantic rule-based sentiment detection algorithm for Russian publicism sentences
Published 2023-12-01“…To fill the gap, the authors developed a novel publisism sentences oriented sentiment detection algorithm. The algorithm recursively applies appropriate rules to sentence parts represented as constituency trees. …”
Get full text
Article -
352
Improving lameness detection in cows: A machine learning algorithm application
Published 2024-12-01“…A Random Forest classifier, using input features selected by the Boruta algorithm, was used for the prediction task; effects of individual features were further assessed using partial dependence plots. …”
Get full text
Article -
353
FI-SURF algorithm for image copy-flip-move forgery detection
Published 2015-05-01“…FI-SURF (flip invariant SURF) algorithm was proposed,for the consideration of the copy-move forgery detec-tion of digital images.The arrangement of the SURF (speeded-up robust features) descriptor after image flip was studied.After extract the SURF interest points,rearrange the descriptors,the interest points can still be matched even under the condition of copy-flip-move.The experiment results show that FI-SURF not only reserved the advantage of SURF,but also can detect the copy-flip-move forgery,and can locate the duplicated region.…”
Get full text
Article -
354
Thin-layer detection using spectral inversion and a genetic algorithm
Published 2011-12-01Get full text
Article -
355
Improved Hypernymy Detection Algorithm Based on Heterogeneous Graph Neural Network
Published 2025-05-01“…To address the problem of overfitting in traditional graph attention networks, the calculation order of adjacency node aggregation is changed in the heterogeneous graph to capture dynamic attention features. In addition, a pipeline for hierarchical system construction is designed and implemented, combining the divide-and-conquer approach with loop detection algorithms. …”
Get full text
Article -
356
Stochastic algorithm for HDFS data theft detection based on MapReduce
Published 2018-10-01“…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
Get full text
Article -
357
A Closed-loop Detection Algorithm Based on Dynamic Time Warping
Published 2021-01-01“…In the research of closed-loop detection, algorithms based on single image matching are drawing great research interests. …”
Get full text
Article -
358
Lightweight remote sensing ship detection algorithm based on YOLOv5s
Published 2024-10-01“…ObjectiveThis paper proposes a lightweight remote sensing ship target detection algorithm LR-YOLO based on improved YOLOv5s to meet the lightweight and fast inference requirements of ship target detection tasks involving remote sensing images. …”
Get full text
Article -
359
Detection of Graduation Potential in Prospective Students using the Random Forest Algorithm
Published 2025-09-01“…Detecting students’ graduation potential is commonly performed by evaluating various academic and non-academic factors. …”
Get full text
Article -
360
Retracted: Image Target Detection Algorithm of Smart City Management Cases
Published 2020-01-01“…The algorithm a hog-target detection describes the features of the object’s surface edges in areas such as graphics and image processing; and calculates the distribution of characteristics in the direction of inclination of the particular part of the image. …”
Get full text
Article