-
181
A color image encryption algorithm for expert detection system based on composite chaotic sequences
Published 2025-02-01Get full text
Article -
182
Features of the Application of the Detection Algorithm Based on the Background Subtraction Method in the Scanning Optoelectronic Surveillance System
Published 2022-10-01“…This algorithm is the basis of the developed image processing method applied to the problem of detecting moving objects by an optoelectronic thermal imaging surveillance system. …”
Get full text
Article -
183
Anchor-Free Object Detection Algorithm Based on Dual-Angle Multi-Scale Feature Fusion
Published 2024-08-01“… In response to the problem of insufficient feature extraction and insufficient detection accuracy in the anchor-free frame object detection algorithm CenterNet. …”
Get full text
Article -
184
YOLO-Helmet: A Novel Algorithm for Detecting Dense Small Safety Helmets in Construction Scenes
Published 2024-01-01“…Therefore, this paper proposes a novel algorithm called YOLO-Helmet. Firstly, in order to solve the problem of difficult detection due to the small area of the helmet in the image, a small size detection layer was extended to improve the detection sensitivity of the network to small size targets. …”
Get full text
Article -
185
Sec-CLOCs: Multimodal Back-End Fusion-Based Object Detection Algorithm in Snowy Scenes
Published 2024-11-01“…The CLOCs back-end fusion algorithm is then employed to merge the 2D and 3D detection outcomes, thereby enhancing overall object detection capabilities. …”
Get full text
Article -
186
TCE-YOLOv5: Lightweight Automatic Driving Object Detection Algorithm Based on YOLOv5
Published 2025-05-01“…Therefore, a lightweight object detection algorithm based on YOLOv5 is proposed to solve the problem of excessive network parameters in automatic driving scenarios. …”
Get full text
Article -
187
K-Gen PhishGuard: an Ensemble Approach for Phishing Detection with K-Means and Genetic Algorithm
Published 2025-06-01“… Phishing detection is considered a critical problem in cybersecurity, and utilising machine learning with an efficient feature selection method for precisely identifying malicious websites is deemed the most critical challenge. …”
Get full text
Article -
188
High resolution weld semantic defect detection algorithm based on integrated double U structure
Published 2025-05-01“…In this study, a high-resolution semantic segmentation algorithm based on a double U-shaped network was proposed to meet the requirements of pressure vessel weld defect detection, and accurate detection was realized through innovative three-stage processing flow. …”
Get full text
Article -
189
Investigation of an Efficient Multi-Class Cotton Leaf Disease Detection Algorithm That Leverages YOLOv11
Published 2025-07-01Get full text
Article -
190
Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms
Published 2025-03-01“…There is abundant literature on the application of such algorithms on conventional networks. However, because SDNs are relatively new, they lack such abundance both in terms of novel algorithms and effective datasets when it comes to DDoS attack detection. …”
Get full text
Article -
191
An Algorithm Based on Connectivity Properties for Finding Cycles and Paths on Kidney Exchange Compatibility Graphs
Published 2025-05-01“…In addition, an efficient algorithm is developed for detecting violated constraints and solving the problem. …”
Get full text
Article -
192
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
193
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
194
Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny
Published 2025-05-01“…This study proposes a small target detection algorithm for UAV aerial images using a ConvMixer detection head based on the improved YOLOv7-tiny to address the problems of missed detection and false detection caused by significant variations in target scale, densely distributed small-sized targets and complex backgrounds in UAV aerial images.MethodsFirst, the activation function LeakyReLU is replaced with SiLU to compensate for the limited nonlinear expression of LeakyReLU and to enhance convergence speed and model generalization during training. …”
Get full text
Article -
195
AS-Faster-RCNN: An Improved Object Detection Algorithm for Airport Scene Based on Faster R-CNN
Published 2025-01-01Get full text
Article -
196
Identification of Anomaly Detection in Power System State Estimation Based on Fuzzy C-Means Algorithm
Published 2023-01-01“…In order to estimate the power system accurately and identify anomaly detection in real time, an identification method of anomaly detection in power system state estimation based on Fuzzy C-means algorithm is proposed. …”
Get full text
Article -
197
Research on surface loss detection algorithm of wind turbine blade based on FRE-DETR network
Published 2025-04-01“…Wind turbine generators operate in harsh areas for a long time, resulting in frequent problems such as blade breakage, and traditional blade defect detection methods have low detection accuracy. …”
Get full text
Article -
198
High resolution remote sensing image object detection algorithm based on improved YOLOv8
Published 2025-01-01“…In view of problems such as objects are interfered by complex background, objects are small and densely distributed, objects are multi-scale and their directions are random in high resolution remote sensing image data, an object detection algorithm for high resolution remote sensing image based on improved YOLOv8 was proposed. …”
Get full text
Article -
199
Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm
Published 2022-12-01“…Meta-heuristic-based search methods are suitable for solving these problems. Therefore, the main contribution of this paper is to use the high ability of the cheetah optimization algorithm (CHOA) to optimally extract CNN hyper-parameters. …”
Get full text
Article -
200
Basketball robot object detection and distance measurement based on ROS and IBN-YOLOv5s algorithms.
Published 2024-01-01“…In the software layer of the object detection system, an algorithm that combines YOLOv5s and laser detection was used, and an appropriate instance batch normalization network module was introduced in the YOLOv5s algorithm to improve the model's generalization ability. …”
Get full text
Article