-
3061
Advanced predictive disease modeling in biomedical IoT using the temporal adaptive neural evolutionary algorithm
Published 2025-07-01“…The research article addresses this gap by introducing the Temporal Adaptive Neural Evolutionary Algorithm (TANEA), a novel approach designed to enhance the predictive capabilities in biomedical IoT systems. …”
Get full text
Article -
3062
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm
Published 2021-10-01“…Furthermore, to prove the efficacy of the application of our proposed algorithm in real-life, the algorithms are used to train a Feedforward neural network for epilepsy detection, of which our proposed algorithm outperforms the others.…”
Get full text
Article -
3063
Identification and evaluation of the effective criteria for detection of congestion in a smart city
Published 2022-03-01“…In the simulation of urban mobility (SUMO) simulator, a transport network is created and parameters of vehicles facing congestion are taken to extract the key parameter by using the k‐means clustering technique and mathematical mean algorithm. This parameter is utilized in analytical hierarchy process to detect the highest priorities parameter and based on that the congestion is detected in particular lane. …”
Get full text
Article -
3064
Overheating Defect Detection of Composite Insulator Based on Mask R-CNN
Published 2021-01-01“…The results show that the algorithm proposed in this paper has a high detection accuracy of 100% for the infrared images of composite insulators with serious and urgent defects, but has false detection occurrence for the infrared images without overheating defects or with general defects. …”
Get full text
Article -
3065
Ice Thickness Detection of Transmission Lines Based on Cross-Guide-UNet
Published 2025-04-01“…The thickness detection error is constrained within 7.2%. These results confirm that the proposed algorithm can provide a control basis for the high-precision operation of de-icing robots.…”
Get full text
Article -
3066
Detection of Hijaiyah Letters Handwritten in Early Childhood Using Yolov8
Published 2025-07-01“…This study investigates the effectiveness of the YOLOv8 (You Only Look Once version 8) algorithm in detecting handwritten Hijaiyah letters among early childhood learners. …”
Get full text
Article -
3067
REPrise: de novo interspersed repeat detection using inexact seeding
Published 2025-04-01“…However, existing tools do not yet have sufficient repeat detection performance. Results In this study, we developed REPrise, a de novo interspersed repeat detection software program based on a seed-and-extension method. …”
Get full text
Article -
3068
Fast and Accurate Detection of Forty Types of Fruits and Vegetables: Dataset and Method
Published 2025-04-01“…Additionally, we propose a novel framework for fruit and vegetable detection—FVRT-DETR. Based on the Transformer architecture, this framework features an end-to-end real-time detection algorithm. …”
Get full text
Article -
3069
Insurance claims estimation and fraud detection with optimized deep learning techniques
Published 2025-07-01“…To this extent, it explores the deep learning models like VGG 16 & 19, ResNet 50, and a custom 12 & 15-layer Convolutional Neural Network for accurate estimation of insurance claims and detection of fraud. The proposed work enhanced with Enhanced Hippopotamus Optimization Algorithm (EHOA) combined with a custom 12-layer CNN to optimize the hyperparameters and enhance the performance of the model. …”
Get full text
Article -
3070
Multiple Mobile Target Detection and Tracking in Small Active Sonar Array
Published 2025-06-01“…To this end, we present an algorithm for detecting and tracking mobile underwater targets that utilizes reflections from active acoustic emission of broadband signals received by a rigid hydrophone array. …”
Get full text
Article -
3071
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks
Published 2025-04-01“…Taking DoTC as pheromone, an ant colony algorithm is proposed to adaptively adjust the network detection period. …”
Get full text
Article -
3072
Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment
Published 2025-01-01“…In this context, a new model called Spiking Residual ShuffleNet (SR-ShuffleNet) is introduced for intrusion detection (ID) in an IoT environment. The Multi-objective Fractional Artificial Bee Colony (MFABC) algorithm is used for routing. …”
Get full text
Article -
3073
System Architecture for Real-Time Face Detection on Analog Video Camera
Published 2015-05-01“…The proposed architecture is based on AdaBoost learning algorithm with Haar-like features and it aims to apply face detection to a low-cost FPGA that can be applied to a legacy analog video camera as a target platform. …”
Get full text
Article -
3074
Visual Positioning Detection of EMU Brake Pad Based on Deep Learning
Published 2024-12-01“…To address the issue of indistinct image features in real-world scenarios, based on the Faster R-CNN (region conventional neural network) algorithm, an edge detection branch is introduced, and a target edge loss function is added to the loss function, integrating edge information from an auxiliary network. …”
Get full text
Article -
3075
Hybrid attention transformer integrated YOLOV8 for fruit ripeness detection
Published 2025-07-01“…To solve these problems, this paper proposes an innovative fruit recognition model, HAT-YOLOV8, aiming to combine the advantages of Hybrid Attention Transformer (HAT) and YOLOV8 deep learning algorithm. This model improves the ability to capture complex dependencies by integrating the Shuffle Attention (SA) module while maintaining low computational complexity. …”
Get full text
Article -
3076
Automatic cutting and suturing control system based on improved FP16 visual recognition algorithm
Published 2025-07-01“…The DarkPose image key point localization algorithm and the Yolov5 image detection algorithm are utilized to accurately determine the positions of surgical instruments, suture needles, and target points. …”
Get full text
Article -
3077
A fully distributed deployment algorithm for underwater strong -barrier coverage using mobile sensors
Published 2019-04-01“…Sensor barrier coverage has been recognized as an appropriate coverage model for intrusion detection, and many achievements have been obtained in two-dimensional terrestrial wireless sensor networks. …”
Get full text
Article -
3078
A Review: The Application of Path Optimization Algorithms in Building Mechanical, Electrical, and Plumbing Pipe Design
Published 2025-06-01“…This review systematically integrates recent advancements in path optimization algorithms for the automated layout of mechanical, electrical, and plumbing (MEP) systems within complex building environments. …”
Get full text
Article -
3079
Crack Detection Method of Sleeper Based on Cascade Convolutional Neural Network
Published 2022-01-01“…This work presents a new method for sleeper crack identification based on cascade convolutional neural network (CNN) to address the problem of low efficiency and poor accuracy in the traditional detection method of sleeper crack identification. The proposed algorithm mainly includes improved You Only Look Once version 3 (YOLOv3) and the crack recognition network, where the crack recognition network includes two modules, the crack encoder-decoder network (CEDNet) and the crack residual refinement network (CRRNet). …”
Get full text
Article -
3080
SR-DETR: Target Detection in Maritime Rescue from UAV Imagery
Published 2025-06-01“…This study proposes an enhanced SR-DETR algorithm aimed at improving the detection of individuals who have fallen overboard. …”
Get full text
Article