-
3181
RE-YOLOv5: Enhancing Occluded Road Object Detection via Visual Receptive Field Improvements
Published 2025-04-01“…This study proposes an occluded object detection algorithm, RE-YOLOv5, based on receptive field enhancement to assist with the difficult identification of occluded objects in complex road environments. …”
Get full text
Article -
3182
Thermal damage detection of EAST internal component based on machine learning
Published 2025-01-01“…To address the challenge of identifying thermal damage to internal components of the first wall during the Experimental Advanced Superconducting Tokamak (EAST) discharges, we introduce the YOLOv8 model for hotspot detection on EAST and present the customized EAST- You Only Look Once (YOLO) algorithm, derived from an enhanced YOLOv8 framework. …”
Get full text
Article -
3183
Clustering of ECG Signals Based on Fuzzy Neural Network with Initial Weights Generated by Genetic Algorithm
Published 2024-02-01“…Early detection of heart diseases/abnormalities can prolong life and enhance the quality of living through appropriate treatment. …”
Get full text
Article -
3184
A novel framework for identifying fishing grounds from AIS data containing vessels of unknown types
Published 2025-05-01“…Firstly, the Speed-Direction-Based Stops and Moves of Trajectories (SDB-SMOT) algorithm is proposed. Based on this algorithm, a fishing behavior detection model is developed to identify fishing activity trajectories from AIS data that encompasses vessels of unknown types. …”
Get full text
Article -
3185
Comparative Analysis of MFO, GWO and GSO for Classification of Covid-19 Chest X-Ray Images
Published 2023-08-01“…This study examines a comparison analysis of k-nearest neighbors (KNN), Extreme Gradient Boosting (XGboost), and Support-Vector Machine (SVM) are some classification approaches for feature selection in this domain using The Moth-Flame Optimization algorithm (MFO), The Grey Wolf Optimizer algorithm (GWO), and The Glowworm Swarm Optimization algorithm (GSO). …”
Get full text
Article -
3186
Distribution of urinary neutrophil gelatinase-associated lipocalin and post-translationally modified fetuin-A in outpatients with acute kidney disease detected using a nationwide a...
Published 2025-07-01“…Conclusions: The high proportion of elevated uNGAL and its positive association with CKO risk provide biological evidence to support the AKIDS's data algorithm in detecting AKDOPT. Similarly, uPTM-FetA demonstrated comparable characteristics to uNGAL in reflecting kidney injury in the context of AKD.…”
Get full text
Article -
3187
BiFormer for Scene Graph Generation Based on VisionNet With Taylor Hiking Optimization Algorithm
Published 2025-01-01“…The nodes in the graph are signified as detected objects and the detected action is represented by edges. …”
Get full text
Article -
3188
Can Government Incentive and Penalty Mechanisms Effectively Mitigate Tacit Collusion in Platform Algorithmic Operations?
Published 2025-04-01“…Algorithmic collusion essentially constitutes a form of monopolistic agreement that utilizes algorithms as tools for signaling collusion, making it particularly challenging for both consumers and antitrust enforcement agencies to detect. …”
Get full text
Article -
3189
Diagnostic algorithm of patients’ with pathology of endocrine system examination which demand simultaneous operative treatment
Published 2016-01-01“…Diagnostic algorithm of examination of patients with pathology of endocrine system that will permit to detect combined surgical pathology is needed.…”
Get full text
Article -
3190
Design and Test of an Embedded Real-Time Compact Voltage Fingerprinting Algorithm for Enhanced Automotive Cybersecurity
Published 2025-01-01“…This algorithm detects cyber-attacks through statistical analysis of voltage samples from the protocol’s physical layer. …”
Get full text
Article -
3191
Impact of Machine Learning on Intrusion Detection Systems for the Protection of Critical Infrastructure
Published 2025-06-01“…This paper investigates the efficacy of various machine learning algorithms for anomaly detection within critical infrastructure, using the Secure Water Treatment (SWaT) dataset, a comprehensive collection of time-series data from a water treatment testbed, to experiment upon and analyze the findings. …”
Get full text
Article -
3192
Adaptive Multi-Radar Anti-Bias Track Association Algorithm Based on Reference Topology Features
Published 2025-05-01“…To address the track association problem in multi-radar systems, particularly the challenges posed by offset bias, this paper proposes an adaptive multi-radar anti-bias track association algorithm based on reference topological features (RETs) that achieves accurate association despite offset bias and radar missed detections. …”
Get full text
Article -
3193
Modern Approaches to Detect and Classify Comment Toxicity Using Neural Networks
Published 2020-03-01“…It is a non-trivial task even if the word “understand” here means only “to classify”. the rapid evolution of machine learning technologies has led to ubiquitous implementation of new algorithms. A lot of tasks, which for many years were considered almost impossible to solve, are now quite successfully solved using deep learning technologies. this article considers algorithms built using deep learning technologies and neural networks which can successfully solve the problem of detection and classification of toxic comments. …”
Get full text
Article -
3194
Breast Cancer Screening Using a Modified Inertial Projective Algorithms for Split Feasibility Problems
Published 2023-01-01“…To detect breast cancer in mammography screening practice, we modify the inertial relaxed CQ algorithm with Mann’s iteration for solving split feasibility problems in real Hilbert spaces to apply in an extreme learning machine as an optimizer. …”
Get full text
Article -
3195
Integrating Sentiment Analysis With Machine Learning for Cyberbullying Detection on Social Media
Published 2025-01-01“…This paper presents a unique framework that integrates sentiment analysis with machine learning algorithms to enhance the detection of cyberbullying on social media. …”
Get full text
Article -
3196
Target Detection Technology of Mechanical, Electrical, and Plumbing Components Based on CV
Published 2025-03-01“…The developed system uses deep learning algorithms for real-time data collection to enhance monitoring efficiency and accuracy, as well as advanced object detection algorithms to compare real-time construction images with BIMs. …”
Get full text
Article -
3197
A Survey of Dense Object Detection Methods Based on Deep Learning
Published 2024-01-01“…In recent years, thanks to the development and advancement of deep learning methods, object detection algorithms and frameworks have made significant breakthroughs, allowing many detection methods to be applied to real-world scenarios. …”
Get full text
Article -
3198
Image Based Detection of Coating Wear on Cutting Tools with Machine Learning
Published 2024-12-01“…Based on cutting experiments conducted with a TiN/AlTiN-coated cutting tool, an image dataset was generated and pre-processed using multiple algorithms, such as Canny edge detection and Hough line transforms. …”
Get full text
Article -
3199
ENHANCING CYBERSECURITY THROUGH MALWARE DETECTION BASED ON MACHINE LEARNING TECHNIQUE
Published 2025-07-01“…The algorithms are assessed in this study using an assembly command dataset and a static and dynamic analysis approach to improve the detection rate and stability. …”
Get full text
Article -
3200
Comparative study of IoT- and AI-based computing disease detection approaches
Published 2025-03-01“…However, no comprehensive survey has been conducted on integrated IoT- and computing-based systems that deploy deep learning for disease detection. This study evaluated different machine learning and deep learning algorithms and their hybrid and optimized algorithms for IoT-based disease detection, using the most recent papers on IoT-based disease detection systems that include computing approaches, such as cloud, edge, and fog. …”
Get full text
Article