-
881
Fatigue Detection Algorithm for Nuclear Power Plant Operators Based on Random Forest and Back Propagation Neural Networks
Published 2025-02-01“…First, the random forest algorithm is used to classify the feature data according to different scenarios. …”
Get full text
Article -
882
Enhancement of Breast Cancer Classification Using Bat Feature Selection with Recurrent Deep Learning
Published 2024-01-01“…The bat algorithm assists in selecting the best relevant feature when integrated with recurrent deep learning models, which improves breast cancer classification by leveraging training datasets. …”
Get full text
Article -
883
-
884
-
885
Accurate localization of indoor high similarity scenes using visual slam combined with loop closure detection algorithm.
Published 2024-01-01“…To address this issue, this paper proposes an improved visual SLAM loop closure detection algorithm that integrates deep learning techniques. …”
Get full text
Article -
886
Unsupervised Binary Classifier-Based Object Detection Algorithm with Integrated Background Subtraction Suitable for Use with Aerial Imagery
Published 2025-08-01“…This research presents the development of a novel object detection algorithm designed to identify humans in natural outdoor environments using minimal computational resources. …”
Get full text
Article -
887
-
888
A Fault Detection Method for Multi-Sensor Data of Spring Circuit Breakers Based on the RF-Adaboost Algorithm
Published 2025-07-01“…This paper proposes a multi-sensor data fusion fault detection method based on the RF-Adaboost algorithm for spring-operated circuit breakers. …”
Get full text
Article -
889
EAD-YOLOv10: Lightweight Steel Surface Defect Detection Algorithm Research Based on YOLOv10 Improvement
Published 2025-01-01“…The experimental results show that the improved EAD-YOLOv10 network model achieves an average precision of 94.2% for detecting six types of defects in the NEU-DET dataset, which is an improvement of 7.6% over the baseline model, with a 9.75% reduction in model size and a 12.5% decrease in computational load, outperforming other mainstream object detection algorithms and meeting the requirements for SD detection in industrial production. …”
Get full text
Article -
890
-
891
YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes
Published 2025-06-01“…The algorithm further leverages an improved multi-attention detection head, Dyhead_v3, to refine the representation of small-target features. …”
Get full text
Article -
892
An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm
Published 2025-05-01“…Visually impaired persons (VIPs) can utilize the OD approach for detecting problems and recognizing services to offer secure and informative navigation. …”
Get full text
Article -
893
YOLO-IRS: Infrared Ship Detection Algorithm Based on Self-Attention Mechanism and KAN in Complex Marine Background
Published 2024-12-01“…Compared to mainstream detection algorithms, YOLO-IRS achieves higher detection accuracy while requiring relatively fewer computational resources, verifying the superiority of the proposed algorithm and enhancing the detection performance of infrared ship targets.…”
Get full text
Article -
894
Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms
Published 2025-08-01“…Initially, the data normalization stage leverages linear scaling normalization (LSN) for converting input data into a beneficial format. Furthermore, the feature selection process uses the RIME optimization algorithm (ROA) model to select the most relevant features from the data. …”
Get full text
Article -
895
A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm
Published 2024-07-01“… Text encryption in video is a vital tool in many industries where protecting sensitive information is of highest concern. Algorithms and automated detection methods commonly struggle to locate hidden text in video frames. …”
Get full text
Article -
896
Detection and Pattern Recognition of Chemical Warfare Agents by MOS-Based MEMS Gas Sensor Array
Published 2025-04-01“…In summary, the proposed MOS-based MEMS sensor array driven by pattern recognition algorithms can be integrated into portable devices, showing great potential and practical applications in the rapid, in situ, and on-site detection and identification of CWAs.…”
Get full text
Article -
897
An airport apron ground service surveillance algorithm based on improved YOLO network
Published 2024-06-01“…The improved algorithm can efficiently extract the information features of small-sized objects, medium-sized objects, and moving objects in large scenes, and it achieves effective detection of activities of ground service in the apron area. …”
Get full text
Article -
898
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
899
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
900
Assessing the quality of whole slide images in cytology from nuclei features
Published 2025-04-01“…To address these challenges, this article introduces a straightforward, interpretable, and computationally efficient quality control module to ensure optimal algorithmic performance. Methods: The proposed quality control module ensures algorithmic performance by representing an algorithm by a reference whole slide image preparation protocol validated on it. …”
Get full text
Article