-
2481
Machine Learning- and Deep Learning-Based Multi-Model System for Hate Speech Detection on Facebook
Published 2025-06-01“…The ML algorithms used in this study are LR, SVM, RF, NB, KNN, and GBM. …”
Get full text
Article -
2482
Cross-Modal Fake News Detection Method Based on Multi-Level Fusion Without Evidence
Published 2025-07-01Get full text
Article -
2483
-
2484
Novel topic detection method for microblog based on SVM filtration
Published 2013-09-01“…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
Get full text
Article -
2485
High-Precision Centroid Localization Algorithm for Star Sensor Under Strong Straylight Condition
Published 2025-03-01“…The results show that the proposed algorithm outperforms the TOP-HAT, MAX-BACKG (Max-Background Filtering), LCM (Local Contrast Measure), MPCM (Multiscale Patch-Based Contrast Measure), and CMLCM (Curvature-Based Multidirectional Local Contrast Method for Star Detection of Star Sensor) algorithms in terms of star point detection rate. …”
Get full text
Article -
2486
An Anomaly Detection Method for Multivariate Statistical Process Based on POT
Published 2025-07-01“…Considering the limitations of fixed thresholds and manual detection methods, which are difficult to adapt to the dynamic changes in time series data, this paper proposes an anomaly detection method based on peaks-over-threshold (POT) algorithm for multivariate statistical processes. …”
Get full text
Article -
2487
Out-of-hospital multimodal seizure detection: a pilot study
Published 2023-10-01“…A support vector machine based seizure detection algorithm was applied using both in-patient seizures and out-of-hospital electrographic seizures in one patient. …”
Get full text
Article -
2488
Research on lightweight tunnel cable fire recognition algorithm based on multi-scale features
Published 2025-07-01“…In this study, a lightweight YOLO-v5 tunnel cable fire recognition algorithm with multiscale features is proposed. By replacing the YOLO-v5 backbone network, Darknet53, with Mobilenetv3-small and integrating the SimAM attention mechanism, the lightweight and detection speed of the network was improved. …”
Get full text
Article -
2489
Matrix Camera, Composed Television System for the Detection of the Contact Wire
Published 2016-08-01“…A method for increasing the efficiency of the contact wire detection system by upgrading hardware and software elements of the system is presented. …”
Get full text
Article -
2490
A lightweight personnel detection method for underground coal mines
Published 2025-04-01“…Commonly used detection algorithms have large parameter counts, high requirements on equipment arithmetic, and are not satisfactory for application in low illumination environments in coal mines. …”
Get full text
Article -
2491
Detection, Reconstruction, and Repairing the Distortion in the Quran Pages Based on Watermarking
Published 2024-02-01“…The watermarking algorithm in this method is able to recover distortions in addition to detecting them.…”
Get full text
Article -
2492
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
2493
Research on system log anomaly detection based on deep learning
Published 2019-10-01“…The system log reflects the running status of the system and records the activity information of specific events in the system.Therefore,the rapid and accurate detection of the system abnormal log is important to the security and stability of the system.A log anomaly detection algorithm based on GRU neural network is proposed.Log parsing is implemented based on log key technology.Log anomaly detection is realized by using anomaly detection model of execution path and anomaly detection model of parameter value.The system has the advantages of less parameters and faster training.It improves the running speed while achieving higher detection accuracy,and is suitable for log analysis of large information systems.…”
Get full text
Article -
2494
Unsupervised Salient Object Detection by Aggregating Multi-Level Cues
Published 2018-01-01“…Extensive experimental results demonstrate that the proposed algorithm performs favorably against the state-of-art saliency detection methods in terms of different evaluation metrics on several benchmark datasets.…”
Get full text
Article -
2495
Detection and Classification of Single Machining Error of Non-circular Gear
Published 2017-01-01Get full text
Article -
2496
Research progress of abnormal user detection technology in social network
Published 2018-03-01“…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
Get full text
Article -
2497
An Innovative Approach for Fake News Detection using Machine Learning
Published 2023-06-01“…Various text feature extraction techniques and classification algorithms are reviewed, with the Support Vector Machine (SVM) linear classification algorithm using TF-IDF feature extraction achieving the highest accuracy of 99.36%. …”
Get full text
Article -
2498
MIMO Detection for High Order QAM by Canonical Dual Approach
Published 2015-01-01Get full text
Article -
2499
Anomaly detection of large scale network based on data streams
Published 2006-01-01“…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
Get full text
Article -
2500
Coal mine conveyor monitoring video enhancement algorithm based on DP-YOLOv7
Published 2025-04-01“…Aiming at the problems encountered by video surveillance during the operation of belt conveyor, such as insufficient light, moisture and large coal dust pollution, a new DP-YOLOv7 video detection algorithm for coal mine belt conveyor is proposed based on YOLOv7 target detection algorithm. …”
Get full text
Article