-
1381
Detection of communities with Naming Game-based methods.
Published 2017-01-01“…We show that the separate addition of each social feature in the Naming Game results in gradual improvements with respect to community detection. …”
Get full text
Article -
1382
Systematic Review: Malware Detection and Classification in Cybersecurity
Published 2025-07-01“…These studies cover a variety of detection techniques, including machine learning, deep learning and hybrid models, with a focus on feature extraction, malware behavior analysis and the application of advanced algorithms to improve detection accuracy. …”
Get full text
Article -
1383
Ensemble Method for Anomaly Detection On the Internet of Things
Published 2024-01-01“…High data dimensions and unbalanced data are one of the challenges in detecting attacks. To overcome the large data dimensions, Chi-square was chosen as a feature selection technique. …”
Get full text
Article -
1384
Dynamic Collaborative Optimization Method for Real-Time Multi-Object Tracking
Published 2025-05-01“…To tackle these issues, this paper proposes a multi-modal fusion tracking framework that realizes high-precision tracking in complex scenarios by collaboratively optimizing feature enhancement and motion prediction. Firstly, a multi-scale feature adaptive enhancement (MS-FAE) module is designed, integrating multi-level features and introducing a small object adaptive attention mechanism to enhance the representation ability for small objects. …”
Get full text
Article -
1385
An advanced method for surface damage detection of concrete structures in low-light environments based on image enhancement and object detection networks
Published 2024-12-01“…Abstract Surface damage detection in concrete structures is critical for maintaining structural integrity, yet current object detection algorithms often struggle in low-light environments. …”
Get full text
Article -
1386
Detecting anomalies in graph networks on digital markets.
Published 2024-01-01“…It compares different graph algorithms to extract feature sets for anomaly detection models. …”
Get full text
Article -
1387
Optimizing Deep Learning Algorithms for Effective Chicken Tracking through Image Processing
Published 2024-08-01“…The complexity of these environments demands robust and adaptive algorithmic approaches for the accurate detection and tracking of birds over time, ensuring reliable data analysis. …”
Get full text
Article -
1388
MRP-YOLO: An Improved YOLOv8 Algorithm for Steel Surface Defects
Published 2024-12-01“…The existing detection algorithms are unable to achieve a suitable balance between detection accuracy and inference speed. …”
Get full text
Article -
1389
Evaluation of Human Action Based on Feature-Weighted Dynamic Time Warping
Published 2024-11-01“…Firstly, we collected human skeletal key-point data based on a depth camera and processed these data with gap filling and filtering; then, the effective data segments were segmented from the whole action dataset, angle and distance features were extracted, and the feature matrix was obtained; then, we used the Euclidean Barycenter Dynamic Time Warping–Barycenter Averaging algorithm to produce action templates; finally, we proposed a Feature-Weighted Dynamic Time Warping algorithm to calculate the similarity between the detected action and the template action and established an action achievement score mechanism to evaluate the rehabilitation action. …”
Get full text
Article -
1390
Development of data driven models to accurately estimate density of fatty acid ethyl esters
Published 2025-08-01“…The reliability of the dataset, consisting of 1307 experimental datapoints gathered from the literature, was ensured through the application of a Monte Carlo outlier detection algorithm, which validated its suitability for model training and validation. …”
Get full text
Article -
1391
Crop classification with deep convolutional neural network based on crop feature
Published 2022-12-01“…Then the algorithm was implemented using these feature channels in the test area and the overall accuracy was upgraded to 86% and the kappa coefficient to 0.82 compared to which indicated a significant improvement in the results compared to the previous case.Conclusion:The deep convolutional neural network is very sensitive to the type of input channels for detecting agricultural crops and selecting the channels with suitable tempo-spectral characteristics for different types of crops, has a great impact on the accuracy of network training and can reduce the loss of training network and increase its efficiency in the classification of various crops.…”
Get full text
Article -
1392
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
1393
Security situational awareness of power information networks based on machine learning algorithms
Published 2023-12-01“…To properly predict the security posture of these networks, we provide a method based on machine learning algorithms to detect the security condition of power information networks. …”
Get full text
Article -
1394
Predicting diabetes using supervised machine learning algorithms on E-health records
Published 2025-03-01“…Methods: This study investigates the early detection and management of diabetes by applying machine learning techniques to electronic health records. …”
Get full text
Article -
1395
An automatic classification of breast cancer using fuzzy scoring based ResNet CNN model
Published 2025-07-01“…Further, this research concentrates on improving computation time based on the detection process. So, this research introduces a hybrid DL model for improving prediction performance andreducing time consumption compared to the machine learning (ML)model.Describing a pre-processing method utilizing statistical co-relational evaluation to improve the classifier’s accuracy.The features are then extracted from the Region of Interest (ROI) images using the wrapping technique and a fast discrete wavelet transform (FDWT). …”
Get full text
Article -
1396
Prognostic, oncogenic roles, and pharmacogenomic features of AMD1 in hepatocellular carcinoma
Published 2024-12-01Get full text
Article -
1397
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01“…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
Get full text
Article -
1398
Identification of hypertension gene expression biomarkers based on the DeepGCFS algorithm.
Published 2025-01-01“…The algorithm then uses hybrid clustering methods for gene module detection. …”
Get full text
Article -
1399
An experimental method for detecting objects in an aqueous environment
Published 2025-01-01“…To facilitate this process, the researchers developed a specialized algorithm designed to filter out pulse and fluctuation interference. …”
Get full text
Article -
1400
Unsupervised detection of semantic correlations in big data
Published 2025-05-01“…Abstract In real-world data, information is stored in extremely large feature vectors. These variables are typically correlated due to complex interactions involving many features simultaneously. …”
Get full text
Article