-
2861
Conveyor belt deviation identification algorithm based on anchor point positioning and cross-layer correction
Published 2025-08-01“…To address the problems of information loss and inaccurate extraction of conveyor belt edge lines in the traditional convolutional neural network (CNN) methods for conveyor belt edge line detection due to the difficulty in constructing long-distance dependency relationships between pixels, a conveyor belt deviation recognition algorithm based on the DETR (Detection Transformer) encoder-decoder network structure with anchor point positioning and cross-layer correction is proposed. …”
Get full text
Article -
2862
A Driver’s Calling Behavior Detection Method Based on Deep Learning
Published 2019-01-01“…This paper proposed a driver’s cell phone calling behavior detection algorithm based on deep learning. The algorithm comprises two steps. …”
Get full text
Article -
2863
Optimal resource allocation for two-stage connectionless access with collision detection
Published 2019-05-01“…Connectionless access allows massive machine type communication (mMTC) devices to transmit small packets without establishment of radio bearers,significantly reducing device power consumption and control signaling overhead.Two-stage connectionless access (TSCLA) improves throughput and resource efficiency by optimally allocating resources between scheduling request (SR) phase and data transmission phase,which can be used for bigger packets and high traffic load.Based on this,a comprehensive theoretical analysis of one kind of TSCLA with collision detection was conducted to investigate its performance limit and devise its optimal resource allocation scheme.In addition,to avoid the complexity of user number estimation,a dynamic resource allocation algorithm with feedback control was proposed.Numerical results are provided to validate the effectiveness of aforementioned theoretical results and show that comparing with the genie aided algorithm known exactly the number of users,the performance loss of the proposed algorithm is within 4%.These works together provide good references for appropriate resource dimensioning for mMTC related protocols.…”
Get full text
Article -
2864
Analysis of Asymmetric Piecewise Linear Stochastic Resonance Signal Processing Model Based on Genetic Algorithm
Published 2020-01-01“…Finally, the model is applied to bearing fault detection, and an adaptive genetic algorithm is used to optimize the parameters of the system. …”
Get full text
Article -
2865
Classification of chest radiographs into healthy/pneumonia using Harris-Hawks Algorithm optimized deep-features
Published 2025-06-01“…This PDL-tool performs the following tasks on the X-ray database; (i) detection of healthy/pneumonia, and (ii) detecting the viral/bacterial pneumonia. …”
Get full text
Article -
2866
Efficient Real-Time Tool Chatter Detection Through Bandpass Filtering
Published 2025-04-01“…To prevent tool chatter, a real-time chatter detection algorithm was developed using a low-cost accelerometer in combination with internal machine variables. …”
Get full text
Article -
2867
Dominant Symmetry Plane Detection for Point-Based 3D Models
Published 2020-01-01“…In this paper, a symmetry detection algorithm for three-dimensional point cloud model based on weighted principal component analysis (PCA) is proposed. …”
Get full text
Article -
2868
Early Identification of Skin Cancer Using Region Growing Technique and a Deep Learning Algorithm
Published 2024-09-01“…Therefore, this study aimed to assess the efficacy of the Region Growing + LSTM algorithm in improving detection accuracy compared to LSTM. …”
Get full text
Article -
2869
Unsupervised Fabric Defect Detection Based on Under-Complete Dictionary Reconstruction
Published 2025-02-01“…The proposed algorithm achieved an average correct detection rate of 83.29% on the AITEX dataset, demonstrating its effectiveness.…”
Get full text
Article -
2870
Automated Detection of Poor-Quality Scintigraphic Images Using Machine Learning
Published 2022-12-01“…Objective In the present study, we have used machine learning algorithm to accomplish the task of automated detection of poor-quality scintigraphic images. …”
Get full text
Article -
2871
Research on Intelligent Detection and Segmentation of Rock Joints Based on Deep Learning
Published 2024-01-01“…To address these concerns, this paper presents an intelligent recognition and segmentation algorithm based on Mask R-CNN (mask region-based convolutional neural network) for detecting joint targets on tunnel face images and automatically segmenting them, thereby improving detection efficiency and objectivity of the results. …”
Get full text
Article -
2872
Fault detection in beam structure using adaptive immune based approach
Published 2024-01-01“…Recently with the application of machine learning approaches and the soft computing, the damage can be detected easily. In this methodology, Clonal Section Algorithm (CSA) has been applied to find out the faults (crack locations and depth) in the structure initially. …”
Get full text
Article -
2873
Two Applications of Clustering Techniques to Twitter: Community Detection and Issue Extraction
Published 2013-01-01Get full text
Article -
2874
Optimization of train obstacle detection based on zone media controller unit
Published 2024-11-01“…First, an algorithm framework was progressively designed based on the YOLOv8 algorithm, consisting of track area segmentation and obstacle target detection. …”
Get full text
Article -
2875
Function encoding based approach for App clone detection in cloud environment
Published 2019-08-01“…An efficient function-based encoding scheme in the cloud environment for detecting the cloned Apps was designed,called Pentagon.Firstly,a basic block feature extraction method was proposed.Secondly,a monotonic encoding algorithm for the App function was designed,which encoded the function based on the control flow graph structure and basic block attributes.Finally,a three-party libraries filtering method was proposed by using an efficient clustering algorithm based on the function feature.Experiments verified the effectiveness of the proposed scheme.The average search time is close to 79 ms,and the clone detection accuracy achieves 97.6%.…”
Get full text
Article -
2876
Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network
Published 2015-11-01“…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
Get full text
Article -
2877
Covariance Blind Detection Method Based on Eigenvector in Cognitive Radio Network
Published 2015-11-01“…As the blind detection algorithm has the shortcoming that they need information about the channel and more than two cognitive users to detect the primary user,a new blind detection algorithm based on eigenvector using the difference of correlation between the primary user signal and noise signal covariance matrix was presented,and a closed expression was derived for the probability of false alarm and threshold.The proposed method overcomes the noise uncertainty problem only with two cognitive relays and performs well without information about the channel,primary user and noise.Numerical simulations show that the new detector performs better than other detectors.…”
Get full text
Article -
2878
Joint detection and direction finding using a switched antenna array
Published 2015-10-01“…Algorithms for signals joint detection and direction at frequency area in a wide frequency band with no overlap of spectra of adjacent channels obtained through switched circular antenna array are developed and researched. …”
Get full text
Article -
2879
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
Published 2006-01-01“…In order to solve the problem, an algorithm was proposed to reconstruct attack scenario using fuzzy clustering. …”
Get full text
Article -
2880
GSB: GNGS and SAG-BiGRU network for malware dynamic detection.
Published 2024-01-01“…For solving the problem, this study proposed the GNGS algorithm to construct a new balance dataset for the model algorithm to pay more attention to the feature learning of the minority attacks' malware to improve the detection rate of attacks' malware. …”
Get full text
Article