-
2621
Enhancing Road Safety: Detection of Animals on Highways During Night
Published 2025-01-01“…Conventional monitoring systems are rendered useless due to poor visibility and inadequate lighting, emphasizing the necessity for a sophisticated detecting system. Using YOLOv5, a cutting- edge object detection algorithm, this study presents a way to identify animals on highways at night and reduce collisions. …”
Get full text
Article -
2622
Long-Range Wide Area Network Intrusion Detection at the Edge
Published 2024-12-01“…This paper proposes the implementation of machine learning algorithms, specifically the K-Nearest Neighbours (KNN) algorithm, within an Intrusion Detection System (IDS) for LoRaWAN networks. …”
Get full text
Article -
2623
DVCW-YOLO for Printed Circuit Board Surface Defect Detection
Published 2024-12-01“…To address these challenges, this paper proposes a novel PCB surface defect detection algorithm, named DVCW-YOLO. First, all standard convolutions in the backbone and neck networks of YOLOv8n are replaced with lightweight DWConv convolutions. …”
Get full text
Article -
2624
Automatic Detect Incorrect Lifting Posture with the Pose Estimation Model
Published 2025-02-01“…We used the OpenPose algorithm to detect and extract key body points to calculate relevant biomechanical features. …”
Get full text
Article -
2625
Building Surface Defect Detection Based on Improved YOLOv8
Published 2025-05-01“…To address these issues, an improved version of the You Only Look Once (YOLOv8) algorithm is proposed for building surface defect detection. …”
Get full text
Article -
2626
Enabling Model-Based Design for Real-Time Spike Detection
Published 2025-01-01“…MBD offers distinct advantages by streamlining the design workflow, from modelling to implementation, thus facilitating the development of intricate systems. A spike detection algorithm has been implemented on a commercially available system based on a Field-Programmable Gate Array (FPGA) that combines neural probe electronics with configurable integrated circuit. …”
Get full text
Article -
2627
Prediction of the Quality of Anxi Tieguanyin Based on Hyperspectral Detection Technology
Published 2024-12-01“…The use of hyperspectral imaging combined with multiple algorithms can be used to achieve the fast and non-destructive prediction of free amino acid and tea polyphenol contents in Tieguanyin tea.…”
Get full text
Article -
2628
Detection method for dangerous behaviors of underground coal mine personnel
Published 2025-05-01“…These modifications aimed to improve the accuracy and speed of human keypoint detection in underground surveillance images. On this basis, a personnel behavior recognition algorithm was designed to classify underground behaviors into nine categories. …”
Get full text
Article -
2629
Design of an Intelligent Pear Bagging End-Effector Based on Yolov8 and SGBM Algorithm
Published 2024-01-01“…We describe an intelligent bagging end-effector for pears, which employs the Yolov8 algorithm for fruitlets detection and the Semi-Global Block Matching (SGBM) algorithm to acquire three-dimensional spatial information of the targets. …”
Get full text
Article -
2630
Underwater Visual Multi-Target Tracking Algorithm Integrating Re-parameterization and Attention Mechanism
Published 2025-04-01“…This algorithm effectively enhanced the network’s multi-scale feature extraction capability and improved the detection accuracy of the model by integrating a structurally re-parameterized multi-scale feature extraction convolutional structure(DBB-RFAConv) and the AMSCE-attention mechanism. …”
Get full text
Article -
2631
Fault Information Processing of Power Dispatching Communication System Combining MMSE Algorithm and LMS
Published 2024-01-01“…Finally, the study establishes a novel fault information processing model for the power dispatching communication system by combining the least mean square error detection algorithm and the least mean square filtering algorithm. …”
Get full text
Article -
2632
Using Anomaly Detection to Search for Technosignatures in Breakthrough Listen Observations
Published 2025-01-01“…We implement a machine learning algorithm to search for extraterrestrial technosignatures in radio observations of several hundred nearby stars, obtained with the Parkes and Green Bank Telescopes by the Breakthrough Listen collaboration. …”
Get full text
Article -
2633
GEM-CRAP: a fusion architecture for focal seizure detection
Published 2025-04-01“…However, their performance was less effective in detecting brief, localized seizures. These seizure-like patterns can be masked by fixed brain rhythms. …”
Get full text
Article -
2634
Extinction Coefficient Inversion Algorithm with New Boundary Value Estimation for Horizontal Scanning Lidar
Published 2025-05-01“…The method is based on maximizing the lidar detection distance and determines the boundary value using a new estimation algorithm with the averaging of multiple fitted results in the low SNR region to reduce the impact of noise. …”
Get full text
Article -
2635
TATPat based explainable EEG model for neonatal seizure detection
Published 2024-11-01“…The primary objective of this research is to detect neonatal seizures and explain these seizures using the new version of Directed Lobish. …”
Get full text
Article -
2636
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01“…A VLSI implementation of AES algorithm against both differential power attack and differential fault attack was proposed. …”
Get full text
Article -
2637
Two-Stage Deep Learning Framework for Individual Tree Crown Detection and Delineation in Mixed-Wood Forests Using High-Resolution Light Detection and Ranging Data
Published 2025-04-01“…Accurate detection and delineation of individual tree crowns (ITCs) are essential for sustainable forest management and ecosystem monitoring, providing key biophysical attributes at the individual tree level. …”
Get full text
Article -
2638
Accounting and Financial Management Cost Accounting Integrating Rough Set Knowledge Recognition Algorithm
Published 2022-01-01“…At present, rough set theory has been well applied in artificial intelligence, knowledge discovery, pattern recognition, fault detection, and so on. According to the discovery model of classification knowledge, the attribute reduction of decision table, classification rule reduction, and classification algorithm under the condition of missing attribute are discussed. …”
Get full text
Article -
2639
DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm
Published 2024-11-01“…To enhance the detection capability for DGA malicious domains, a method for malicious domain identification based on XGBoost and particle swarm optimization (PSO) algorithms was proposed. …”
Get full text
Article -
2640
Research on 3D Path Optimization for an Inspection Micro-Robot in Oil-Immersed Transformers Based on a Hybrid Algorithm
Published 2025-04-01“…Simulation results demonstrate that the hybrid algorithm achieves a 52.6% reduction in path length compared to the unoptimized A* algorithm, with the A*-ACO combination exhibiting exceptional stability. …”
Get full text
Article