-
3241
Hyperbolic geometry enhanced feature filtering network for industrial anomaly detection
Published 2025-07-01“…The visual perception algorithms have become extensively utilized in surface defect detection, progressively replacing manual inspection methods. …”
Get full text
Article -
3242
Evaluating the Potential of SDGSAT-1 Glimmer Imagery for Urban Road Detection
Published 2025-01-01“…Watershed segmentation and optimal thresholding algorithms were applied to extract the road network data of these five cities. …”
Get full text
Article -
3243
Isfahan Artificial Intelligence Event 2023: Macular Pathology Detection Competition
Published 2024-01-01“…Researchers tested their algorithms and competed for the best classification results. …”
Get full text
Article -
3244
Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
Published 2015-03-01“…We propose to reinforce traditional tree-based clone detection algorithms by using additional information about variable slices. …”
Get full text
Article -
3245
Image-based maturity detection for selective cauliflower harvesting in field condition
Published 2025-08-01“…The present study developed a cauliflower curd maturity detection system for a selective cauliflower harvester. …”
Get full text
Article -
3246
An optimized ensemble model with advanced feature selection for network intrusion detection
Published 2024-11-01“…To address this challenge, our study presents the “Optimized Random Forest (Opt-Forest),” an innovative ensemble model that combines decision forest approaches with genetic algorithms (GAs) for enhanced intrusion detection. The genetic algorithms based decision forest construction offers notable benefits by traversing a wider exploration space and mitigating the risk of becoming stuck in local optima, resulting in the discovery of more accurate and compact decision trees. …”
Get full text
Article -
3247
NSDLib: A comprehensive python library for network source detection and evaluation
Published 2024-12-01“…It is easy to integrate and offers a range of algorithms for source detection, including evaluating node importance, identifying outbreaks, and reconstructing propagation graphs. …”
Get full text
Article -
3248
NOVEL METHODS FOR AUTOANTIBODY DETECTION IN LABORATORY DIAGNOSTICS OF AUTOIMMUNE RHEUMATIC DISEASES
Published 2014-08-01“…Autoantibodies are well-established biomarkers of autoimmune rheumatic diseases. Their detection in the routine clinical laboratory provides key information for early and differential diagnosis, prognosis, and monitoring of disease-activity. …”
Get full text
Article -
3249
Policy conflict detection in software defined network by using deep learning
Published 2017-11-01“…In OpenFlow-based SDN(software defined network),applications can be deployed through dispatching the flow polices to the switches by the application orchestrator or controller.Policy conflict between multiple applications will affect the actual forwarding behavior and the security of the SDN.With the expansion of network scale of SDN and the increasement of application number,the number of flow entries will increase explosively.In this case,traditional algorithms of conflict detection will consume huge system resources in computing.An intelligent conflict detection approach based on deep learning was proposed which proved to be efficient in flow entries’ conflict detection.The experimental results show that the AUC (area under the curve) of the first level deep learning model can reach 97.04%,and the AUC of the second level model can reach 99.97%.Meanwhile,the time of conflict detection and the scale of the flow table have a linear growth relationship.…”
Get full text
Article -
3250
Optimizing Convolution Operations for YOLOv4-based Object Detection on GPU
Published 2024-01-01“…Real-time object detection is crucial for autonomous vehicles, and YOLO (You Only Look Once) algorithms have demonstrated their effectiveness for this purpose. …”
Get full text
Article -
3251
Moving Vehicles Detection and Tracking on Highways and Transportation System for Smart Cities
Published 2022-03-01“…Various machine learning and artificial intelligence based techniques are evolving with numerous advancement in this domain. These algorithms are efficient and very less time consuming. …”
Get full text
Article -
3252
The Effects of Motion on Distributed Detection in Mobile Ad Hoc Sensor Networks
Published 2012-03-01“…These results allow rapid characterization of the time-dependence of distributed detection algorithms that are executed in mobile sensor networks.…”
Get full text
Article -
3253
Method for Vocal Fold Paralysis Detection Based on Perceptual and Acoustic Assessment
Published 2024-12-01Get full text
Article -
3254
Emergent Technologies in Human Detection for Disaster Response: A Critical Review
Published 2024-09-01“…These methods are specifically designed to detect human presence in disaster scenarios by leveraging principles from electromagnetic, acoustic, AI-based algorithms, gas sensors, and optical detection. …”
Get full text
Article -
3255
Dual-modal edible oil impurity dataset for weak feature detection
Published 2024-12-01“…To prove the usability of the dataset, four object detection algorithms are applied and compared.…”
Get full text
Article -
3256
Enhancing cyber threat detection with an improved artificial neural network model
Published 2025-03-01“…Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for cybersecurity. …”
Get full text
Article -
3257
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01“…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
Get full text
Article -
3258
Detecting and Explaining Postpartum Depression in Real-Time with Generative Artificial Intelligence
Published 2025-12-01“…Consequently, the rapid detection of PPD and their associated risk factors is critical for in-time assessment and intervention through specialized prevention procedures. …”
Get full text
Article -
3259
Embedded Vision System for Thermal Face Detection Using Deep Learning
Published 2025-05-01“…Face detection technology is essential for surveillance and security projects; however, algorithms designed to detect faces in color images often struggle in poor lighting conditions. …”
Get full text
Article -
3260
Research on the Computed Tomography Pebble Flow Detecting System for HTR-PM
Published 2017-01-01“…Algorithms to automatically locate the three-dimensional coordinates of tracer pebbles and to rebuild the trajectory of each tracer pebble were presented and verified. …”
Get full text
Article