-
1461
Improved YOLO for long range detection of small drones
Published 2025-04-01“…Abstract The timely and accurate detection of unidentified drones is crucial for public safety. …”
Get full text
Article -
1462
GE-YOLO for Weed Detection in Rice Paddy Fields
Published 2025-03-01“…It introduces the Neck network with the Gold-YOLO feature aggregation and distribution network to enhance the network’s ability to fuse multi-scale features and detect weeds of different sizes. …”
Get full text
Article -
1463
Recurrent Neural Network Optimized by Grasshopper for Accurate Audio Data-Based Diagnosis of Parkinson's Disease
Published 2025-06-01“… Proposed here is a speech-based diagnostic framework for detecting Parkinson's disease that utilizes a Long Short-Term Memory neural network and the Grasshopper Optimization Algorithm. …”
Get full text
Article -
1464
Lithium Battery Thermal Runaway Warning Method Based on Multi-Feature Fusion
Published 2025-03-01“…[Conclusion] The early warning algorithm is able to accurately identify lithium batteries with abnormal temperature rise rates, and can promptly and precisely detect the timing and location of the opening of the safety valve in the lithium battery. …”
Get full text
Article -
1465
Enhancing radiomics robustness using bayesian penalized likelihood PET reconstruction: application to Phantom and non-small cell lung cancer patient studies
Published 2025-07-01“…Abstract Purpose This study aims to enhance the diagnostic and prognostic capabilities of PET imaging through improved robustness of radiomics features, utilizing the Bayesian penalized likelihood (BPL) reconstruction algorithm. …”
Get full text
Article -
1466
Integration of Machine Learning and Wavelet Algorithms for Processing Probing Signals: An Example of Oil Wells
Published 2025-01-01“…A key innovation of this study is the development of an algorithm that processes low-amplitude high-frequency signals, which are often difficult to detect with conventional methods. …”
Get full text
Article -
1467
A New Method for Weak Fault Feature Extraction Based on Improved MED
Published 2018-01-01“…Because of the characteristics of weak signal and strong noise, the low-speed vibration signal fault feature extraction has been a hot spot and difficult problem in the field of equipment fault diagnosis. …”
Get full text
Article -
1468
Graph-Based Radiomics Feature Extraction From 2D Retina Images
Published 2025-01-01“…Based on predicted bifurcation points and blood vessel segments, we use the Graph-Based Radiomics Feature Extraction Algorithm (Graph-BRFExtract) to extract the adjacency matrix. …”
Get full text
Article -
1469
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
1470
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
1471
Investigate the Use of Deep Learning in IoT Attack Detection
Published 2025-06-01“…This study contributes a comprehensive comparative analysis of deep learning models for IoT security, focusing on the effectiveness of weighted features in improving detection accuracy. The results provide valuable information for the advancement of real-time IoT attack detection systems.…”
Get full text
Article -
1472
Change Detection Network Based on Transformer and Transfer Learning
Published 2025-01-01“…Currently, deep learning based change detection algorithms have achieved excellent detection results through the meticulous design of feature extraction and change judgment modules. …”
Get full text
Article -
1473
Evaluation of different spectral indices for wheat lodging assessment using machine learning algorithms
Published 2025-07-01“…This study presented a systematic approach for detecting the wheat lodging occurred during the end of March and April 2023 in the Ludhiana district of Punjab (India) from multi-temporal Sentinel-2 data using the machine learning algorithms. …”
Get full text
Article -
1474
Detecting Textual Propaganda Using Machine Learning Techniques
Published 2021-03-01Get full text
Article -
1475
Exploration of geo-spatial data and machine learning algorithms for robust wildfire occurrence prediction
Published 2025-03-01“…The goal of this study is to explore the potential of predicting wildfire occurrences using various available environmental parameters - meteorological, geo-spatial, and anthropogenic - and machine learning (ML) algorithms. We developed a unified pipeline for data acquisition and subsequent ML-based algorithm development. …”
Get full text
Article -
1476
A Novel Method for Community Detection in Bipartite Networks
Published 2025-05-01“…Over the past years, community detection has drawn a lot of attention. Numerous methods for community detection have been put forth. …”
Get full text
Article -
1477
Detecting Unbalanced Network Traffic Intrusions With Deep Learning
Published 2024-01-01“…Furthermore, the Random Forest Regressor is used to ascertain the importance of features for enhancing detection accuracy and interpretability. …”
Get full text
Article -
1478
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
Get full text
Article -
1479
Improved RT-DETR Framework for Railway Obstacle Detection
Published 2025-01-01“…However, existing algorithms face challenges related to insufficient multiscale object detection, high model redundancy, and poor real-time performance. …”
Get full text
Article -
1480
Research on Improved YOLOv7 for Traffic Obstacle Detection
Published 2024-12-01“…Object detection and recognition algorithms are widely used in applications such as real-time monitoring and autonomous driving. …”
Get full text
Article