-
801
Detection method of LDoS attacks based on combination of ANN & KPCA
Published 2018-05-01“…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
Get full text
Article -
802
FCMI-YOLO: An efficient deep learning-based algorithm for real-time fire detection on edge devices.
Published 2025-01-01“…To address this issue, this paper proposes FCMI-YOLO, a real-time fire detection algorithm optimized for edge devices. Firstly, the FasterNext module is proposed to reduce computational cost and enhance detection precision through lightweight design. …”
Get full text
Article -
803
An Adaptive Threshold-Based Pixel Point Tracking Algorithm Using Reference Features Leveraging the Multi-State Constrained Kalman Filter Feature Point Triangulation Technique for D...
Published 2025-04-01“…Although feature points can be extracted and tracked using traditional techniques followed by the MSCKF feature point triangulation algorithm, the number of feature points in the image is often insufficient to capture the depth of the entire environment. …”
Get full text
Article -
804
-
805
Intelligent intrusion detection system based on crowd search optimization for attack classification in network security
Published 2025-07-01“…In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. In the proposed work, we have used a random forest technique to perform feature selection (FS) to improve the effectiveness and efficiency of intrusion detection. …”
Get full text
Article -
806
Defect Detection in the DR Images of Aluminum and Magnesium Alloy Castings Based on the Improved YOLOv8 Algorithm
Published 2025-07-01“…Existing algorithms can miss detecting small target defects owing to the complex background structure and noise in the DR images of aluminum and magnesium alloy castings. …”
Get full text
Article -
807
A novel approach to intrusion detection system using hybrid flower pollination and cheetah optimization algorithm
Published 2025-04-01“…A novel hybrid IDS model integrating the Flower Pollination Algorithm (FPA), Cheetah Optimization Algorithm (COA), and Artificial Neural Networks (ANN) is proposed to enhance detection accuracy, reduce false positives, and optimize feature selection, anomaly detection, and rule adaptation. …”
Get full text
Article -
808
Improved Aerial Surface Floating Object Detection and Classification Recognition Algorithm Based on YOLOv8n
Published 2025-03-01“…The water surface environment is highly complex, and floating objects in aerial images often occupy a minimal proportion, leading to significantly reduced feature representation. These challenges pose substantial difficulties for current research on the detection and classification of water surface floating objects. …”
Get full text
Article -
809
A Lightweight Citrus Ripeness Detection Algorithm Based on Visual Saliency Priors and Improved RT-DETR
Published 2025-05-01“…To address this, we constructed a citrus ripeness detection dataset under complex orchard conditions, proposed a lightweight algorithm based on visual saliency priors and the RT-DETR model, and named it LightSal-RTDETR. …”
Get full text
Article -
810
ContourTL-Net: Contour-Based Transfer Learning Algorithm for Early-Stage Brain Tumor Detection
Published 2024-01-01Get full text
Article -
811
GCS-YOLO: A Lightweight Detection Algorithm for Grape Leaf Diseases Based on Improved YOLOv8
Published 2025-04-01“…The CBAM attention mechanism is added to the model to improve the extraction of subtle features of lesions in complex environments. Cross-scale shared convolution parameters and separated batch normalization techniques are used to optimize the detection head, achieving a lightweight design and improving the detection efficiency of the algorithm. …”
Get full text
Article -
812
A Hybrid Artificial Neural Network and Particle Swarm Optimization algorithm for Detecting COVID-19 Patients
Published 2021-12-01“…Based on the comparison, this paper grouped the top seven ML models such as Neural Networks, Logistic Regression, Nave Bayes Classifier, Multilayer Perceptron, Support Vector Machine, BF Tree, Bayesian Networks algorithms and measured feature importance, and other, to justify the differences between classification models. …”
Get full text
Article -
813
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
Published 2025-03-01“…This technology effectively safeguards against various cyber threats, including Man-in-the-Middle attacks at the network layer and Distributed Denial of Service (DDoS) attacks at the transport layer of IoT networks. To improve detection and adapt to emerging attack methods, the M-LDAE system employs deep learning algorithms such as RNNs, GNNs, and TCNs. …”
Get full text
Article -
814
Privacy protection risk identification mechanism based on automated feature combination
Published 2024-11-01“…In practice, the anomaly detection (AD) algorithm usually faced technical challenges such as difficulty in optimizing feature combinations, difficulty in improving classifier accuracy, and low model application efficiency. …”
Get full text
Article -
815
Optimizing Cancer Detection: Swarm Algorithms Combined with Deep Learning in Colon and Lung Cancer using Biomedical Images
Published 2025-03-01“…Eventually, the whale optimization algorithm (WOA) is used to optimally choose the hyperparameters of the CNN‐BiGRU model. …”
Get full text
Article -
816
A Fine-Grained Aircraft Target Recognition Algorithm for Remote Sensing Images Based on YOLOV8
Published 2025-01-01“…This article addresses the issues of missed and false detections in existing aircraft target fine-grained recognition algorithms for remote sensing images by proposing an improved algorithm based on YOLOv8, called FD-YOLOv8 (Focus Detail-YOLOv8). …”
Get full text
Article -
817
Multimodal anomaly detection in complex environments using video and audio fusion
Published 2025-05-01“…Abstract Due to complex environmental conditions and varying noise levels, traditional models are limited in their effectiveness for detecting anomalies in video sequences. Aiming at the challenges of accuracy, robustness, and real-time processing requirements in the field of image and video processing, this study proposes an anomaly detection and recognition algorithm for video image data based on deep learning. …”
Get full text
Article -
818
An enhanced YOLOv8 model for accurate detection of solid floating waste
Published 2025-07-01“…The new model optimizes the feature fusion strategy in the neck, constructing a refined “160-80-40-20” multiscale detection frame work. …”
Get full text
Article -
819
Optimized deep residual networks for early detection of myocardial infarction from ECG signals
Published 2025-05-01“…Later, the signal feature, transform feature, medical feature and statistical feature are extracted by the feature extraction phase followed by data augmentation that consists of permutation, random generation and re-sampling processes and finally, detection is accomplished by the SSS-DRN. …”
Get full text
Article -
820
Automated detection of spreading depolarizations in electrocorticography
Published 2025-03-01“…This model was applied to continuous electrocorticography data by generating a time series of SD probability [P SD (t)], and threshold P SD (t) values to trigger SD predictions were determined empirically. The developed algorithm was then tested on a novel dataset of 10 patients, resulting in 1,252 true positive detections (/1,953; 64% sensitivity) and 323 false positives (6.5/day). …”
Get full text
Article