-
1021
Unsupervised SAR Image Change Detection Based on Curvelet Fusion and Local Patch Similarity Information Clustering
Published 2025-02-01“…Then the proposed local patch similarity information clustering algorithm is used to classify the image pixels to output the final change map. …”
Get full text
Article -
1022
Region and Sample Level Domain Adaptation for Unsupervised Infrared Target Detection in Aerial Remote Sensing Images
Published 2025-01-01“…In this article, we develop a new domain adaptation framework for infrared target detection at both the region level and sample level to tackle the problem of negative transfer. …”
Get full text
Article -
1023
Research on Underwater Small Target Detection Technology Based on Single-Stage USSTD-YOLOv8n
Published 2024-01-01“…Aiming at the problem of low visibility of underwater environment, which leads to the leakage of small target detection and low accuracy, this paper proposes an improved algorithm USSTD-YOLOv8n (Underwater small-size target detection YOLOv8n) based on YOLOv8n. …”
Get full text
Article -
1024
Low-Voltage Substation Area Topology Recognition Method Based on AKNN Anomaly Detection and ADPC Clustering
Published 2024-05-01“…The similarity of voltage series between users in the low-voltage substation area is measured using dynamic time warping (DTW), and the abnormal relationship between users and transformer is checked and corrected with the AKNN anomaly detection algorithm. After getting the right relationship, the ADPC algorithm is used to identify the phase for users in the substation area. …”
Get full text
Article -
1025
LGR-Net: A Lightweight Defect Detection Network Aimed at Elevator Guide Rail Pressure Plates
Published 2025-03-01“…In elevator systems, pressure plates secure guide rails and limit displacement, but defects compromise their performance under stress. Current detection algorithms face challenges in achieving high localization accuracy and computational efficiency when detecting small defects in guide rail pressure plates. …”
Get full text
Article -
1026
Deep learning and support vector machine-recursive feature elimination-based network intrusion detection model
Published 2025-07-01“…Moreover, both oversampling and under-sampling techniques were utilized to tackle the unbalance problem of data sample distribution. Three deep learning algorithms were used to build the base learner of the ensemble framework, and deep neural network was used to build the meta-learner, so as to improve the performance of DLRF model to detect network attacks. …”
Get full text
Article -
1027
SDMSEAF-YOLOv8: a framework to significantly improve the detection performance of unmanned aerial vehicle images
Published 2024-01-01“…The conventional non-maximum suppression algorithm is improved, so as to reduce the problem of missed detections under a densely occluded scene by setting the attenuation function to adjust the confidence of the treated box based on the overlap between it and the highest-scoring box. …”
Get full text
Article -
1028
Traffic Foreground Detection at Complex Urban Intersections Using a Novel Background Dictionary Learning Model
Published 2021-01-01“…In this study, a novel background subtraction algorithm based on sparse representation is proposed to detect the traffic foreground at complex intersections to obtain traffic parameters. …”
Get full text
Article -
1029
An abnormal traffic detection method for chain information management system network based on convolutional neural network
Published 2025-04-01“…Chain information management system is widely used, providing convenience for the operation and management of enterprises. However, the problem of abnormal network traffic becomes increasingly prominent currently. …”
Get full text
Article -
1030
Machine Learning-Based Attack Detection and Mitigation with Multi-Controller Placement Optimization over SDN Environment
Published 2025-03-01“…The study focuses on the design, implementation, and assessment of the optimal placement of multi-controllers using K-means++ and OPTICS in real topologies and an intrusion detection system (IDS) using the XGBoost classification algorithm to detect and mitigate attacks efficiently with accuracy, precision, and recall of 98.5%, 97.0%, and 97.0%, respectively. …”
Get full text
Article -
1031
A Coverage-Based Cooperative Detection Method for CDUAV: Insights from Prediction Error Pipeline Modeling
Published 2025-05-01“…Next, we analyze target acquisition scenarios during guidance handover and reformulate the collaborative detection problem as a field-of-view (FOV) coverage optimization task on a two-dimensional detection plane. …”
Get full text
Article -
1032
3D Pulse Image Detection and Pulse Pattern Recognition Based on Subtle Motion Magnification Technology
Published 2025-05-01“…To address the problem of large reconstruction errors in 3D pulse signals caused by excessively small out-of-plane displacement of the contact membrane in the existing traditional Chinese medicine fingertip tactile binocular vision detection technology, this study proposes a 3D pulse image detection method based on subtle motion magnification technology and explores its application in pulse pattern recognition. …”
Get full text
Article -
1033
Method of joint wavelet thresholding and F-NLM de-noising for high-resolution SAR ship detection
Published 2024-12-01“…Next, a YOLOv7 detection algorithm combined with a bi-directional feature pyramid network (Bi-FPN) is selected to effectively aggregate the multi-scale features and further improve the model's accuracy. …”
Get full text
Article -
1034
An Intelligent Crow Search Optimization and Bi-GRU for Forest Fire Detection System Using Internet of Things
Published 2024-12-01“…To address this problem, an IoT-based Artificial Intelligence (AI) technique for forest fire detection has been proposed. …”
Get full text
Article -
1035
Evaluating Deep Learning Architectures for Breast Tumor Classification and Ultrasound Image Detection Using Transfer Learning
Published 2025-04-01“…These insights are further anticipated to advance future algorithm development and broaden the potential of the research applicability across diverse fields.…”
Get full text
Article -
1036
Lightweight coal mine conveyor belt foreign object detection based on improved Yolov8n
Published 2025-03-01“…Abstract To resolve the drawbacks of slow speed, excessive parameters, and high computational demands associated with deep learning-based conveyor belt foreign object detection methods, a lightweight algorithm for detecting foreign objects on conveyors based on an improved Yolov8n model is proposed. …”
Get full text
Article -
1037
A novel method for optimizing epilepsy detection features through multi-domain feature fusion and selection
Published 2024-11-01“…To extract features strongly correlated with epileptic classification detection, an improved particle swarm optimization (PSO) algorithm and Pearson correlation analysis are combined. …”
Get full text
Article -
1038
Assessing the Effect of Water on Submerged and Floating Plastic Detection Using Remote Sensing and K-Means Clustering
Published 2024-11-01“…Marine and freshwater plastic pollution is a worldwide problem affecting ecosystems and human health. Although remote sensing has been used to map large floating plastic rafts, there are research gaps in detecting submerged plastic due to the limited amount of in situ data. …”
Get full text
Article -
1039
MSS-YOLO: Multi-Scale Edge-Enhanced Lightweight Network for Personnel Detection and Location in Coal Mines
Published 2025-03-01“…Finally, the lightweight Shared Convolutional Detection Head (SCDH) ensures real-time detection under limited computational resources. …”
Get full text
Article -
1040
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guarantee the security of wireless and distributed ICS, this article establishes an end-edge collaborative lightweight secure federated learning (LSFL) architecture and proposes an LSFL anomaly detection strategy. …”
Get full text
Article