-
541
Medical Diagnostic Systems Using Artificial Intelligence (AI) Algorithms: Principles and Perspectives
Published 2020-01-01Get full text
Article -
542
Verification of color characteristics of document images captured in uncontrolled conditions
Published 2024-08-01Get full text
Article -
543
A cooperative jamming mode adjustment method based on Multi-Agent reinforcement learning
Published 2025-11-01Get full text
Article -
544
Can machine-learning algorithms improve upon classical palaeoenvironmental reconstruction models?
Published 2024-10-01Get full text
Article -
545
MIMO Detection for High Order QAM by Canonical Dual Approach
Published 2015-01-01Get full text
Article -
546
Detection of Dashboard in Fuzzy Image by Correction Force Snake Model
Published 2018-04-01“…In order to solve the problem that the accuracy of the dashboard detection in fuzzy images is not high,an improved Snake model based on the correction force is proposed. …”
Get full text
Article -
547
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…Cognitive Wireless Sensor Network (CWSN) is a new paradigm which integrates cognitive features in traditional Wireless Sensor Networks (WSNs) to mitigate important problems such as spectrum occupancy. Security in Cognitive Wireless Sensor Networks is an important problem because these kinds of networks manage critical applications and data. …”
Get full text
Article -
548
A Method for Detecting Tomato Maturity Based on Deep Learning
Published 2024-11-01“…Therefore, in this study, an improved YOLOv8 algorithm is proposed to address the problem of tomato fruit ripeness detection in complex scenarios, which is difficult to carry out accurately. …”
Get full text
Article -
549
Bankline extraction in remote sensing images using principal curves
Published 2016-11-01“…In the learning process, the polygonal line (PL) algorithm and the error back propagation (BP) algorithm were combined. …”
Get full text
Article -
550
An anomaly detection scheme for data stream in cold chain logistics.
Published 2025-01-01“…But, because of the high cost and technical problem, the anomaly detection performance is poor, and the anomaly can not be detected in time, which affects the quality of goods. …”
Get full text
Article -
551
Study on the Lightweighting Strategy of Target Detection Model with Deep Learning
Published 2022-01-01“…Aiming at the high miss detection and false detection rate of traditional SSD (single shot multibox detector) target detection algorithm in target detection, this paper proposes a lightweight detection algorithm for deep learning target detection model in order to improve the detection accuracy. …”
Get full text
Article -
552
BLSTM based night-time wildfire detection from video.
Published 2022-01-01“…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
Get full text
Article -
553
Aviation Rivet Classification and Anomaly Detection Based on Deep Learning
Published 2023-01-01“…And a method of aviation rivet classification and anomaly detection based on deep learning algorithm was proposed. …”
Get full text
Article -
554
Cross-Modal Fake News Detection Method Based on Multi-Level Fusion Without Evidence
Published 2025-07-01Get full text
Article -
555
Spammer group detection based on cascading and clustering of core figures
Published 2025-07-01“…Abstract The problem of collaborative spamming in e-commerce is gradually increasing, and traditional spammer group detection algorithms usually seem cumbersome and time-consuming when dealing with massive user review data. …”
Get full text
Article -
556
On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code
Published 2020-06-01“…It is assumed that taking into account the distances between function calls will reveal shell code execution using system and / or library function calls. An algorithm and a system for detecting abnormal code execution are proposed. …”
Get full text
Article -
557
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…The problem of spread code identification is transferred into a peak detection classification problem. …”
Get full text
Article -
558
Machine Learning- and Deep Learning-Based Multi-Model System for Hate Speech Detection on Facebook
Published 2025-06-01“…This study seeks to minimize this problem by developing an Arabic script-based tool for automatically detecting hate speech in Roman Urdu, an informal script used most commonly for South Asian digital communications. …”
Get full text
Article -
559
A similarity-based multi-objective test optimization technique using search algorithm
Published 2024-12-01“…Hence, it is required to optimize the test suite by finding a diverse subset of test cases having high code coverage, fault-detection rate, and minimal execution time. Objective:: To solve the regression test optimization problem, the researchers have proposed various approaches including greedy algorithms, search-based algorithms, and clustering algorithms. …”
Get full text
Article -
560
Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction
Published 2020-07-01“…Aiming at the problem that in the current electromagnetic environment,the modulation method is complicated,the frequency-consuming equipment increases,the spectrum is congested,and the electromagnetic environment interference increases,the algorithm of OFDM signal detection and subcarrier identification in the background of non-cooperative communication were deeply studied.Using the different distribution states of OFDM signals and single carrier signals in the time domain,a joint characteristic parameter was proposed to solve the existence problem of OFDM in the received signal.For the phase shift and frequency offset problems caused by the channel transmission to the signal,by using the periodic stability the blind parameter estimation was performed to obtain the signal prior information.On the basis of the obtained signal prior information,a multi-level classification and recognition method for non-cooperative OFDM signal sub-carrier signals was proposed.Therefore,a model based on non-cooperative communication system OFDM signal detection and subcarrier modulation identification was designed,and finally modulation identification of unknown signals was completed.Simulation experiments show that in non-cooperative communication systems,OFDM signals and single-carrier signals can be accurately identified,and ideal modulation recognition effects can be achieved on empty subcarriers,QPSK,and 16QAM in the receiver OFDM signal subcarriers,overcoming the channel transmission band The problems of phase shift and frequency offset have improved the accuracy of modulation mode identification.…”
Get full text
Article