-
2461
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…The Cumulative Sum (CUSUM) method, based on calculating the cumulative values within a time series, is commonly used for change detection due to its early detection of small drifts, simplicity, low computational cost, and robustness to noise. …”
Get full text
Article -
2462
Substation Equipment Defect Detection Based on Improved YOLOv8
Published 2025-05-01“…This paper proposes an object detection algorithm for substation equipment defect detection based on improvements to the YOLOv8 model. …”
Get full text
Article -
2463
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…The present research utilized the Isolation Forest algorithm to detect outliers in high-dimensional data sets. …”
Get full text
Article -
2464
Automated Global Method to Detect Rapid and Future Urban Areas
Published 2025-05-01“…However, methods to detect rapid urbanization are currently absent. Additionally, methods that predict future urban areas often rely on deep learning algorithms, which can be computationally expensive and require a large data volume. …”
Get full text
Article -
2465
On the non-parametric changepoint detection of flow regimes in cyclone Amphan
Published 2023-04-01“…This article explores the possibility of using a non-parametric algorithm to identify different flow regimes using a one-month long time-series data of the near-surface parameters. …”
Get full text
Article -
2466
Cell Outage Detection and Compensation in Two-Tier Heterogeneous Networks
Published 2014-01-01“…A K-nearest neighbor (KNN) classification algorithm is employed to detect the cell outage automatically. …”
Get full text
Article -
2467
Defect detection in textiles using back propagation neural classifier
Published 2023-09-01“…This paper presents a classification method to detect defects such as holes and thick places in knitted fabric by applying artificial neural network algorithm. …”
Get full text
Article -
2468
Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems
Published 2024-01-01“…Existing research in intrusion detection is primarily focused on the transmission network and limited to detecting individual attacks. …”
Get full text
Article -
2469
Multilayer Concept Drift Detection Method Based on Model Explainability
Published 2024-01-01“…To address these issues, this paper presents a novel three-layer drift detection algorithm named Hierarchical Concept Drift Detection based on SHapley Additive exPlanations (HCDD-SHAP). …”
Get full text
Article -
2470
Detection of axonal synapses in 3D two-photon images.
Published 2017-01-01“…If tracing the axon fails, the accuracy of bouton detection is compromised. In this paper, we propose a new algorithm that does not require tracing the axon to detect axonal boutons in 3D two-photon images taken from the mouse cortex. …”
Get full text
Article -
2471
Improved MViTv2-T model for insulator defect detection
Published 2025-01-01“…The new model utilizes the sore penalty mechanism (SPM) cluster non-maximum suppression (NMS) algorithm instead of the batched non-maximum suppression (NMS) algorithm from the original model. …”
Get full text
Article -
2472
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01“…The present research utilized the Isolation Forest algorithm to detect outliers in high-dimensional data sets. …”
Get full text
Article -
2473
Automatic Detection and Classification of Aurora in THEMIS All‐Sky Images
Published 2024-12-01“…Abstract We report a novel machine‐learning algorithm for automatically detecting and classifying aurora in all–sky images (ASI) that is largely trained without requiring ground–truth labels. …”
Get full text
Article -
2474
SYSTEM FOR DETECTION AND IDENTIFICATION OF POTENTIALLY EXPLOSIVE OBJECTS IN OPEN AREA
Published 2022-06-01“…To achieve the goal, the following tasks were solved: a review and analysis of modern methods and systems for the detection and identification of potentially explosive military objects was carried out, the classification of identifiable explosive objects was determined, system components were selected, a structural diagram and an algorithm of the software control tool were developed system of identification of potentially explosive objects in an open area, a software tool for detection and identification of potentially explosive objects in an open area was created. …”
Get full text
Article -
2475
Automatic Registration and Error Detection of Multiple Slices Using Landmarks
Published 2001-01-01“…The method uses a standard algorithm to optimize the prostate slice positions. …”
Get full text
Article -
2476
Polarization of road target detection under complex weather conditions
Published 2024-12-01“…In this paper, we propose a road target detection algorithm based on an end-to-end adaptive polarization coding method, named YOLO-Polarization of Road Target Detection (YOLO-PRTD). …”
Get full text
Article -
2477
Semisupervised Learning for Detecting Inverse Compton Emission in Galaxy Clusters
Published 2024-01-01“…We employ a conditional autoencoder (CAE), which is based on an autoencoder with latent representations trained to constrain the thermal parameters of the ICM. The algorithm is trained and tested using synthetic NuSTAR X-ray spectra with instrumental and astrophysical backgrounds included. …”
Get full text
Article -
2478
Implementation of YOLOv7 Model for Human Detection in Difficult Conditions
Published 2025-04-01“…The rapid development of artificial intelligence technology in recent decades has led to the development of highly efficient object detection algorithms, including human detection under difficult conditions. …”
Get full text
Article -
2479
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…It can hide the private information that the attack model tries to infer from the intermediate anonymity features, while maximally retaining the interactive behavior features contained in the original traffic for botnet detection. We design a privacy confrontation algorithm based on a mutual information calculation mechanism. …”
Get full text
Article -
2480
A Multi-Objective Bio-Inspired Optimization for Voice Disorders Detection: A Comparative Study
Published 2025-06-01“…This paper introduces a multi-objective bio-inspired, AI-based optimization approach for the automated detection of voice disorders. Different multi-objective evolutionary algorithms (the Non-dominated Sorting Genetic Algorithm (NSGA-II), Strength Pareto Evolutionary Algorithm (SPEA-II), and the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D)) have been compared to detect voice disorders by optimizing two conflicting objectives: error rate and the number of features. …”
Get full text
Article