-
361
Community detection algorithm of hybrid node analysis and edge analysis in complex networks
Published 2023-04-01“…The community detection of hybrid node analysis and edge analysis in complex networks (CDHNE), a novel community detection algorithm, was proposed aiming at the problem that both edge community detection and node-based community detection algorithms had corresponding shortcomings in the process of detecting communities, which affected the quality of complex network community detection.The relatively stable characteristics of the edge in the networks were firstly used by the algorithm to construct a more accurate community structure through edge community detection at the early stage of algorithm execution.Then, after the formation of the edge communities, the flexible characteristics of the node were used to accurately detect the boundary of edge communities, so as to more accurately detect the community structure in the complex networks.In the computer-generated network experiments, when the community structure of the network gradually became fuzzy, the number of overlapping nodes and the number of communities to which the overlapping nodes belonged kept increasing.Compared to traditional algorithms, the accuracy of community detection and overlapping nodes detection were improved by an average of 10% and 15%, respectively, by the CDHNE algorithm.In the real network experiments, the tightness of the community structure detected by the CDHNE algorithm was better.Especially when facing large-scale networks with more than 100 000 nodes, the detection task was completed by the CDHNE algorithm with high quality, and the EQ value reached 0.412 1.The experimental results show that the CDHNE algorithm has advantages in operational stability and handling large-scale networks.…”
Get full text
Article -
362
Anomaly detection algorithm based on Gaussian mixture variational auto encoder network
Published 2021-04-01“…Anomalous data, which deviates from a large number of normal data, has a negative impact and contains a risk on various systems.Anomaly detection can detect anomalies in the data and provide important support for the normal operation of various systems, which has important practical significance.An anomaly detection algorithm based on Gaussian mixture variational auto encoder network was proposed, in which a variational autoencoder was built to extract the features of the input data based on Gaussian mixture distribution, and using this variational autoencoder to construct a deep support vector network to compress the feature space and find the minimum hyper sphere to separate the normal data and the abnormal data.Anomalies can be detected by the score from the Euclidean distance from the feature of data to the center of the hypersphere.The proposed algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the corresponding average AUC are 0.954 and 0.937 respectively.The experimental results show that the proposed algorithm achieves preferable effects.…”
Get full text
Article -
363
A New Algorithm for Detecting X-Ray Shots in Cyg X-1
Published 2025-01-01“…Compared with previous techniques, our algorithm allows us to detect shots with lower amplitudes and shorter time separations. …”
Get full text
Article -
364
Steel Surface Defect Detection Algorithm Based on Improved YOLOv8 Modeling
Published 2025-08-01Get full text
Article -
365
Belt conveyor idler fault detection algorithm based on improved YOLOv5
Published 2025-01-01“…Experimental results demonstrate that the enhanced YOLOv5 algorithm achieves a 95.3% mAP on the self-constructed infrared image dataset, surpassing the original algorithm by 2.7%. …”
Get full text
Article -
366
Haar Cascade Classifier and Adaboost Algorithm for Face Detection with the Viola-Jones Method
Published 2025-03-01“…The conclusion of this study emphasizes the importance of combining methods in developing a more robust and efficient face detection system. The implications of this research can be applied to create more effective security and facial recognition applications and pave the way for further study in optimizing object detection algorithms. …”
Get full text
Article -
367
An AI-Based Horticultural Plant Fruit Visual Detection Algorithm for Apple Fruits
Published 2025-05-01“…The detection algorithm proposed in the study can be extended to the intelligent measurement of apple biological and physical characteristics, including for size measurement, shape analysis, and color analysis. …”
Get full text
Article -
368
Outlier detection algorithm based on fast density peak clustering outlier factor
Published 2022-10-01“…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
Get full text
Article -
369
Detecting subsurface diseases on airport road surface based on an improved SSD algorithm
Published 2025-01-01Get full text
Article -
370
A Review of YOLO Algorithm and Its Applications in Autonomous Driving Object Detection
Published 2025-01-01Subjects: Get full text
Article -
371
Decomposition-Based Multiobjective Evolutionary Algorithm for Community Detection in Dynamic Social Networks
Published 2014-01-01“…In this paper, we propose a decomposition-based multiobjective community detection algorithm to simultaneously optimize these two objectives to reveal community structure and its evolution in dynamic networks. …”
Get full text
Article -
372
Data-driven network intrusion detection using optimized machine learning algorithms
Published 2025-09-01“…This study presents a comprehensive evaluation of machine learning approaches for network intrusion detection, comparing the performance of Decision Trees (DT), Random Forest (RF), K-Nearest Neighbors (K-NN), Gradient Boosting (GB), and Logistic Regression (LR) algorithms. …”
Get full text
Article -
373
A Lightweight Detection Method for Meretrix Based on an Improved YOLOv8 Algorithm
Published 2025-06-01“…To address this issue, this paper proposes a lightweight detection method, YOLOv8-RFD, based on an improved YOLOv8 algorithm, tailored for clam sorting applications. …”
Get full text
Article -
374
FB-YOLOv8s: A fire detection algorithm based on YOLOv8s
Published 2025-01-01“…However, there exist some problems in traditional detection algorithms of fire, such as low accuracy, high miss rate, and low detection rate of small targets. …”
Get full text
Article -
375
Parameter Optimisation of Support Vector Machine using Genetic Algorithm for Cyberbullying Detection
Published 2025-01-01“…The results demonstrate an accuracy improvement, with the genetic algorithm achieving an accuracy of 86%. This highlights the effectiveness of genetic algorithms in optimizing SVM parameters for cyberbullying detection.…”
Get full text
Article -
376
Static Analysis-based Detection of Android Malware using Machine Learning Algorithms
Published 2025-09-01“…The rapid growth of Android applications has led to increased security threats, making malware detection a critical concern in cybersecurity. This research proposes a static analysis-based technique that employs machine learning for Android malware detection. …”
Get full text
Article -
377
Multisensor-Weighted Fusion Algorithm Based on Improved AHP for Aircraft Fire Detection
Published 2021-01-01“…Comparing the proposed algorithm to the grey fuzzy neural network fusion algorithm and fuzzy logic fusion algorithm in terms of the time consumption for fire detection and sending alarm and the accuracy of fire alarm perspectives, the experiments demonstrate that the proposed fire detection algorithm can detect the fire within 10s and reduce the false alarm rate to less than 0.5%, which verifies the superiority of the algorithm in promptness and accuracy. …”
Get full text
Article -
378
Outlier Detection of Photovoltaic Power Generation System Data Based on GMM-IF Algorithm
Published 2025-01-01Subjects: Get full text
Article -
379
A new RS steganalysis algorithm of detecting UnderMP3Cover
Published 2018-04-01Get full text
Article -
380
Impact of Right-Hand Polarized Signals in GNSS-R Water Detection Algorithms
Published 2025-01-01“…The water detection algorithm for the dual-polarized HydroGNSS mission was validated using spaceborne left-hand circular polarization (LHCP) data from the cyclone global navigation satellite system. …”
Get full text
Article