-
961
Enhancing Rare Class Performance in HOI Detection with Re-Splitting and a Fair Test Dataset
Published 2025-06-01“…To overcome this problem, a Re-Splitting algorithm has been developed. …”
Get full text
Article -
962
Detection of the Pin Defects of Power Transmission Lines Based on Improved TPH-MobileNetv3
Published 2023-01-01“…Given the small size of a pin and many similar components, the detection of such defects is not ideal, which is a technological problem in the identification and diagnosis of power defects. …”
Get full text
Article -
963
EER-DETR: An Improved Method for Detecting Defects on the Surface of Solar Panels Based on RT-DETR
Published 2025-05-01“…In response to the shortcomings of existing detection methods in identifying tiny defects and model efficiency, this study innovatively constructed the EER-DETR detection framework: firstly, a feature reconstruction module WDBB with a differentiable branch structure was introduced to significantly enhance the feature retention ability for fine cracks and other small targets; secondly, an adaptive feature pyramid network EHFPN was innovatively designed, which achieved efficient integration of multi-level features through a dynamic weight allocation mechanism, reducing the model complexity by 9.7% while maintaining detection accuracy, solving the industry problem of “precision—efficiency imbalance” in traditional feature pyramid networks; finally, an enhanced upsampling component was introduced to effectively address the problem of detail loss that occurs in traditional methods during image resolution enhancement. …”
Get full text
Article -
964
Quad-Tree-Based Driver Classification Using Deep Learning for Mild Cognitive Impairment Detection
Published 2025-01-01Get full text
Article -
965
Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering
Published 2025-07-01“…The application of traditional clustering algorithms in intrusion detection usually relies on a preset number of clusters. …”
Get full text
Article -
966
GAT-Enhanced YOLOv8_L with Dilated Encoder for Multi-Scale Space Object Detection
Published 2025-06-01“…The problem of inadequate object detection accuracy in complex remote sensing scenarios has been identified as a primary concern. …”
Get full text
Article -
967
Secure performance analysis and detection of pilot attack in massive multiple-input multiple-output system
Published 2018-05-01“…On account of the risk caused by active attack, a simple and effective detection algorithm is proposed. Uplink pilots with random phases are transmitted during the detection operation. …”
Get full text
Article -
968
Integration Research of Pantograph-Catenary Detection System for Intelligent Operation and Maintenance of Heavy-haul Locomotive
Published 2021-07-01“…Improving the on-line detection level of pantograph-catenary system and evaluating its service status has become a key problem to be solved in the construction of intelligent operation and maintenance of heavy-haul locomotive. …”
Get full text
Article -
969
Discrete Dynamic Modeling Analysis of Engineering Management and Quality Optimization Innovation Mode Based on Big Data Intelligent Algorithm
Published 2022-01-01“…The accurate data after big data analysis can be used for quality supervision and detection, which not only improves the project quality problems but also improves the management efficiency of the project.…”
Get full text
Article -
970
An Intrusion Detection Model Based on Feature Selection and Improved One-Dimensional Convolutional Neural Network
Published 2023-01-01“…The problem of intrusion detection has new solutions, thanks to the widespread use of machine learning in the field of network security, but it still has a few issues at this time. …”
Get full text
Article -
971
A Review on Current Technologies and Future Direction of Water Leakage Detection in Water Distribution Network
Published 2022-01-01“…The third question was about the trend in the algorithm. ML and threshold-based algorithms are dominating the field. …”
Get full text
Article -
972
-
973
A novel similarity-constrained feature selection method for epilepsy detection via EEG signals
Published 2025-07-01“…Finally, a heuristic search strategy-based algorithm is designed to select features for epileptic EEG signals. …”
Get full text
Article -
974
Edge-Guided Feature Pyramid Networks: An Edge-Guided Model for Enhanced Small Target Detection
Published 2024-12-01“…We conducted comparative experiments on multiple datasets using the proposed algorithm and existing advanced methods. The results show improvements in the IoU, nIoU, and F1 metrics, while also showcasing the lightweight nature of EG-FPNs, confirming that they are more suitable for drone detection in resource-constrained infrared scenarios.…”
Get full text
Article -
975
A visual SLAM loop closure detection method based on lightweight siamese capsule network
Published 2025-03-01“…Therefore, aiming at the problems of traditional methods, this paper proposes an algorithm based on the Siamese capsule neural network by using the deep learning method. …”
Get full text
Article -
976
Deep learning-based framework for Mycobacterium tuberculosis bacterial growth detection for antimicrobial susceptibility testing
Published 2025-01-01“…Automated Mycobacterial Growth Detection Algorithm (AMyGDA) is a software package that uses image processing techniques to read plates, but struggles with plates that exhibit low growth or images of low quality. …”
Get full text
Article -
977
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
978
A quality of system routing based on neighborhood interference detection and mitigation in wireless sensor network
Published 2020-10-01“…Aiming at solving these problems, this article proposes a quality of system routing method based on neighborhood interference detection and mitigation. …”
Get full text
Article -
979
-
980
A novel model for higher performance object detection with deep channel attention super resolution
Published 2025-04-01“…By using the data in the training of the You Only Look Once (YOLO) model of YOLOv5, it was ensured that the model successfully detected the object. In order to increase the object detection success and observe the results, popular Super Resolution (SR) algorithms and the Deep Channel Attention Super Resolution (DCASR) algorithm developed by us were integrated into the structure and the effect of SR algorithms on object detection was observed. …”
Get full text
Article