-
1621
Deep encoder-decoder networks for belt longitudinal tear detection
Published 2025-05-01“…The input images are downscaled using a sorting algorithm to extract the information of pixels with high grayscale values as the input feature map for the neural network. …”
Get full text
Article -
1622
An optimal federated learning-based intrusion detection for IoT environment
Published 2025-03-01“…The Chimp optimization algorithm is used in the proposed work to select optimal features. …”
Get full text
Article -
1623
Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing
Published 2025-01-01“…We compare various KD algorithms to identify the technique that produces a smaller model with the modest accuracy drop. …”
Get full text
Article -
1624
YOLO-WAD for Small-Defect Detection Boost in Photovoltaic Modules
Published 2025-03-01“…Subsequently, an additional detection layer is added to the neck, and C2f is replaced by C2f-EMA (CSP bottleneck with two convolutions–efficient multi-scale attention mechanism), which can redistribute feature weights and prioritize relevant features and spatial details across image channels to improve feature extraction. …”
Get full text
Article -
1625
River floating object detection with transformer model in real time
Published 2025-03-01“…Building upon this foundation, we introduce the LR-DETR, a lightweight evolution of RT-DETR for river floating object detection. This model incorporates the High-level Screening-feature Path Aggregation Network (HS-PAN), which refines feature fusion through a novel bottom-up fusion path, significantly enhancing its expressive power. …”
Get full text
Article -
1626
Optimization of Random Forest Algorithm with Backward Elimination Method in Classification of Academic Stress Levels
Published 2025-06-01“…Data mining is often used to detect diseases, one of which is the Random Forest algorithm. …”
Get full text
Article -
1627
Enhancing Kidney Disease Diagnosis Using ACO-Based Feature Selection and Explainable AI Techniques
Published 2025-03-01“…However, the performance of previous automated approaches has often been hindered by suboptimal feature selection and algorithms’ “black-box” nature, which adversely affect their interpretability and clinical applicability. …”
Get full text
Article -
1628
Identification method for wheel/rail tread defects based on integrated partial convolutional network
Published 2024-09-01“…Given the difficulties associated with accurately detecting minor wheelset damages, an enhanced adaptive spatial feature fusion (E-ASFF) detection approach was introduced. …”
Get full text
Article -
1629
Novel topic detection method for microblog based on SVM filtration
Published 2013-09-01“…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
Get full text
Article -
1630
Machine Learning-Based Approach for HIV/AIDS Prediction: Feature Selection and Data Balancing Strategy
Published 2025-03-01“…HIV/AIDS remains a significant global health challenge, requiring accurate predictive models for early detection and improved clinical decision-making. However, developing an effective predictive model faces challenges such as data imbalance and the presence of irrelevant features, which can compromise model accuracy. …”
Get full text
Article -
1631
Apple leaf disease severity grading based on deep learning and the DRL-Watershed algorithm
Published 2025-08-01“…To address this issue, we propose a method for assessing the severity of apple leaf diseases based on a combination of improved HRNet and DRL-watershed algorithms. First, we selected HRNet_w32 as the backbone feature extraction network and incorporated a Normalization Attention Mechanism (NAM). …”
Get full text
Article -
1632
Design of Jitter Compensation Algorithm for Robot Vision Based on Optical Flow and Kalman Filter
Published 2014-01-01Get full text
Article -
1633
Fractals and Independent Component Analysis for Defect Detection in Bridge Decks
Published 2011-01-01“…Using Ground-Penetrating Radar (GPR) raw scans, this framework is composed of a feature extraction algorithm using fractals to detect defective regions and a deconvolution algorithm using banded-independent component analysis (ICA) to reduce overlapping between reflections and to estimate the radar waves travel time and depth of defects. …”
Get full text
Article -
1634
An Automated Feature-Based Image Registration Strategy for Tool Condition Monitoring in CNC Machine Applications
Published 2024-11-01“…In this study, an MV system is developed alongside an automated, feature-based image registration strategy to spatially align tool wear images, enabling a more consistent and accurate detection of tool edge position. …”
Get full text
Article -
1635
Early Detection of Parkinson's Disease: Ensemble Learning for Improved Diagnosis
Published 2025-01-01“…This paper proposed several machine learning algorithms such as Decision Tree, Random Forest, Logistic Regression and Support Vector Machine and design an ensemble of these models to detect and classify Parkinson's disease. …”
Get full text
Article -
1636
Fast Modelling Algorithm for Realistic Three-Dimensional Human Face for Film and Television Animation
Published 2021-01-01“…Aiming at the face photos of film and television animation, this paper proposes a new fast three-dimensional (3D) face modelling algorithm. First of all, based on the LBF algorithm, this paper proposes a multifeature selection idea to automatically detect multiple features of the face. …”
Get full text
Article -
1637
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1638
Adversarial training driven malicious code detection enhancement method
Published 2022-09-01“…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
Get full text
Article -
1639
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01“…A texture-fingerprint-based approach is proposed to extract or detect the feature from malware content. The texture fingerprint of a malware is the set of texture fingerprints for each uncompressed gray-scale image block. …”
Get full text
Article -
1640
ECG Paper Digitization and R Peaks Detection Using FFT
Published 2022-01-01“…One of the most essential tools for detecting heart problems is the electrocardiogram (ECG). …”
Get full text
Article