-
541
An Improved Binary Spider Wasp Optimization Algorithm for Intrusion Detection for Industrial Internet of Things
Published 2025-01-01“…The results demonstrate the superior classification accuracy, precision, recall, and F1-measure of IBSWO compared to established Metaheuristic (MH) algorithms and machine learning techniques. Furthermore, the incorporation of flat crossover and transfer functions presents promising advancements in feature selection methodologies for IIoT IDS, offering implications for enhancing network security, and effectively detecting and mitigating evolving cyber threats.…”
Get full text
Article -
542
DC-YOLO: an improved field plant detection algorithm based on YOLOv7-tiny
Published 2024-11-01Get full text
Article -
543
Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine
Published 2022-01-01“…In the first level, the firefly algorithm (FFA) and the CfsSubsetEval feature section method have been applied to optimize the subset of features, while in the second level, the support vector machine classifier has been used to build the training model for the detection of credit card fraud cases. …”
Get full text
Article -
544
AReal-time Detection Method of Vehicle Target Based on Improved YOLOv5s Algorithm
Published 2024-02-01“…To improve the detection rate of small target vehicles,an optimization of the YOLOv5s algorithm network structure was established,which added a small target detection layer and spliced the shallow feature map with the deep feature map in the detection. …”
Get full text
Article -
545
Photovoltaic panel defect detection algorithm based on infrared imaging and improved YOLOv8
Published 2025-04-01“…To address the challenges of high missed detection rates, complex backgrounds, unclear defect features, and uneven difficulty levels in target detection during the industrial process of photovoltaic panel defect detection, this article proposes an infrared detection method based on computer vision, with enhancements built upon the YOLOv8 model. …”
Get full text
Article -
546
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01“…To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
Get full text
Article -
547
An Explainable LSTM-Based Intrusion Detection System Optimized by Firefly Algorithm for IoT Networks
Published 2025-04-01“…Specifically, we employ a hybrid approach using statistical methods and a metaheuristic algorithm for feature selection to identify the most relevant features and limit the overall feature set while building an LSTM-based model for intrusion detection. …”
Get full text
Article -
548
DLE-YOLO: An efficient object detection algorithm with dual-branch lightweight excitation network
Published 2025-03-01“…As a computer vision task, object detection algorithms can be applied to various real-world scenarios. …”
Get full text
Article -
549
GESC-YOLO: Improved Lightweight Printed Circuit Board Defect Detection Based Algorithm
Published 2025-05-01“…Finally, the coordinate attention is introduced into the neck network to decompose the channel attention and aggregate the features, which can effectively retain the spatial information and thus improve the detection and localization accuracy of tiny defects (defect area less than 1% of total image area) in PCB defect images. …”
Get full text
Article -
550
A Novel YOLOv10-Based Algorithm for Accurate Steel Surface Defect Detection
Published 2025-01-01Get full text
Article -
551
Defect Detection Algorithm for Electrical Substation Equipment Based on Improved YOLOv10n
Published 2025-01-01“…Addressing the shortcomings of current algorithms in small target detection, complex background processing, and the balance between real-time and accuracy, this paper proposes several key improvements to the YOLOv10n framework to address these limitations. …”
Get full text
Article -
552
Complex Texture Contour Feature Extraction of Cracks in Timber Structures of Ancient Architecture Based on YOLO Algorithm
Published 2022-01-01“…In order to find a better algorithm, this paper mainly adopts three models including YOLO v3, YOLO v4s-mish, and YOLO v5s to detect cracks in the timber structures of ancient architecture, and compares and analyzes the advantages and disadvantages of the three models. …”
Get full text
Article -
553
Mobile-YOLO: A Lightweight Object Detection Algorithm for Four Categories of Aquatic Organisms
Published 2025-07-01Get full text
Article -
554
Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment
Published 2024-11-01“…Additionally, the method utilizes the Chameleon Optimization Algorithm (COA)-based feature selection (FS) approach to identify the optimal feature set. …”
Get full text
Article -
555
ResNet18 facial feature extraction algorithm improved based on hybrid domain attention mechanism.
Published 2025-01-01“…To solve these problems, based on the improvement of adaptive boosting to improve the accuracy of face detection, the study proposes a residual network 18-layer face feature extraction algorithm based on hybrid domain attention mechanism algorithm. …”
Get full text
Article -
556
Integrating Machine Learning Algorithms: A Hybrid Model for Lung Cancer Outcome Improvement
Published 2025-04-01Get full text
Article -
557
Improved M-ORB based direct-loop closure detection algorithm for visual SLAM
Published 2021-12-01“…Most kinds of direct methods do not extract image feature points in the front end of SLAM system, resulting in that they cannot use loop closure detection with bag-of-words models to eliminate the cumulative error of the system.To resolve this problem, an improved mature-oriented fast and rotated BRIEF (M-ORB) based direct-loop closure detection algorithm for visual SLAM was proposed, which designed an improved M-ORB, generated the bag of words model required for loop closure detection, and then used the term frequency-inverse document frequency (TF-IDF) algorithm to adaptively assign weights to the visual words in each sub-node of the dictionary tree.Finally, an accurate representation of the scene information was obtained.In the end, the proposed algorithm and conducted comparative experiments were verified though two public data sets TUM and KITTI.The experimental results show that the algorithm proposed in this paper can effectively detect the loop closure, and has better real-time and robustness performance without reducing the accuracy.…”
Get full text
Article -
558
Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System
Published 2024-11-01Get full text
Article -
559
ALGORITHM OF UNMANNED AERIAL VEHICLES ACOUSTIC SIGNALS DETECTION BASED ON ANALYSIS OF FRACTAL DIMENSION
Published 2018-08-01“…The proposed algorithm can be used in passive acoustic detection systems.…”
Get full text
Article -
560
UAVAI-YOLO: dense small target detection algorithm based on UAV aerial images
Published 2024-06-01Get full text
Article