-
3621
Detection of Indoor Building Lighting Fixtures in Point Cloud Data using SDBSCAN
Published 2025-06-01“…It is expected that the developed algorithm can be used to detect and classify fixtures from any 3D point cloud data representing buildings.…”
Get full text
Article -
3622
Developing a Machine Vision System to Detect Weeds from Potato Plant
Published 2018-03-01Get full text
Article -
3623
YOLO-HVS: Infrared Small Target Detection Inspired by the Human Visual System
Published 2025-07-01“…To address challenges of background interference and limited multi-scale feature extraction in infrared small target detection, this paper proposes a YOLO-HVS detection algorithm inspired by the human visual system. …”
Get full text
Article -
3624
Detection of Critical Parts of River Crab Based on Lightweight YOLOv7-SPSD
Published 2024-11-01“…These additions help achieve an initial reduction in model size while preserving detection accuracy. Furthermore, we optimize the model by removing redundant parameters using the DepGraph pruning algorithm, which facilitates its application on edge devices. …”
Get full text
Article -
3625
A Deep Reinforcement Learning Framework for Detecting Fraudulent Bank Account Openings
Published 2024-12-01“…Our proposed model achieved the highest fraud detection accuracy with 97% using the DQN algorithm with the benchmark Kaggle dataset for bank account fraud detection. …”
Get full text
Article -
3626
Needle detection and localisation for robot‐assisted subretinal injection using deep learning
Published 2025-06-01“…The algorithm was evaluated by comparing the depth of the top and bottom edge of the predicted bounding box to the ground truth. …”
Get full text
Article -
3627
Detection of AI-Generated Texts: A Bi-LSTM and Attention-Based Approach
Published 2025-01-01“…This paper presents a novel algorithm that leverages cutting-edge machine-learning techniques to accurately and efficiently detect AI-generated texts. …”
Get full text
Article -
3628
An optimized multi-task contrastive learning framework for HIFU lesion detection and segmentation
Published 2025-08-01“…To address these challenges, this paper introduces an innovative framework called the Optimized Multi-Task Contrastive Learning Framework (OMCLF), which leverages self-supervised learning (SSL) and genetic algorithms (GA) to enhance HIFU lesion detection and segmentation. …”
Get full text
Article -
3629
Overcoming data scarcity in life-threatening arrhythmia detection through transfer learning
Published 2025-07-01“…One of the main challenges in building robust LTA detection algorithms is the limited availability of labeled LTA data. …”
Get full text
Article -
3630
Detection and Optimization of Photovoltaic Arrays’ Tilt Angles Using Remote Sensing Data
Published 2025-03-01“…This paper presents a novel method for optimizing the tilt angles of existing PV arrays by integrating Very High Resolution (VHR) satellite imagery and airborne Light Detection and Ranging (LiDAR) data. At first, semantic segmentation of VHR imagery using a deep learning model is performed in order to detect PV modules. …”
Get full text
Article -
3631
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Published 2018-01-01“…It performs better over long transmission distances for the detection of Sybil in dynamic VANETs’ system in terms of measurement precision, intrusion detection rate, and energy efficiency.…”
Get full text
Article -
3632
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
3633
A Fault Detection Framework for Rotating Machinery with a Spectrogram and Convolutional Autoencoder
Published 2025-07-01“…Finally, we construct the fault detection model by applying the one-class classification algorithm to the latent feature vectors of training signals. …”
Get full text
Article -
3634
Research on downhole drilling target detection based on improved Yolov8n
Published 2025-07-01“…To monitor the drilling process in real time and enhance the efficiency of target detection at underground coal mine drill sites, an improved algorithm based on Yolov8n has been proposed, which offers advantages compared with the traditional detection methods. …”
Get full text
Article -
3635
Tea Disease Detection Method Based on Improved YOLOv8 in Complex Background
Published 2025-07-01“…Experimental results show that the proposed YOLO-SSM algorithm has obvious advantages in accuracy and model complexity and can provide reliable theoretical support for efficient and accurate detection and identification of tea leaf diseases in natural scenes.…”
Get full text
Article -
3636
A Novel Metaheuristic-Based Methodology for Attack Detection in Wireless Communication Networks
Published 2025-05-01“…The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to detect anonymous traffic. Current methodologies for intrusion detection within 5G communication exhibit limitations in accuracy, efficiency, and adaptability to evolving network conditions. …”
Get full text
Article -
3637
Enhanced UAV Detection and Classification With Birds Using NLFM Pulse-Doppler Radar
Published 2025-01-01“…Detecting UAVs in clutter environments and classification with birds is a difficult and important problem. …”
Get full text
Article -
3638
A photovoltaic anomaly data identification method based on image feature detection
Published 2025-05-01“…To address this, this paper introduces an anomaly data identification algorithm based on image feature detection and dual-threshold processing. …”
Get full text
Article -
3639
Optimizing RetinaNet anchors using differential evolution for improved object detection
Published 2025-06-01“…Abstract Object detection is a fundamental task in computer vision. …”
Get full text
Article -
3640
Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection
Published 2024-12-01“…Evasion attacks (EA) attempt to evade detection by misclassifying input data during testing. …”
Get full text
Article