-
1101
Full Vector Inversion of Magnetic Microscopy Images Using Euler Deconvolution as Prior Information
Published 2024-07-01“…The algorithm follows a three‐step process: (a) employ image processing techniques to identify and isolate data windows for each magnetic source; (b) use Euler Deconvolution to estimate the position of each source; (c) solve a linear inverse problem to estimate the dipole moment of each source. …”
Get full text
Article -
1102
Advanced retinal disease detection from OCT images using a hybrid squeeze and excitation enhanced model.
Published 2025-01-01“…<h4>Background</h4>Retinal problems are critical because they can cause severe vision loss if not treated. …”
Get full text
Article -
1103
Federated Learning-Based Credit Card Fraud Detection: A Comparative Analysis of Advanced Machine Learning Models
Published 2025-01-01“…Challenges for credit card fraud monitoring include highly imbalanced datasets and the need for advanced models to detect fraud patterns. This paper introduced federated learning and discussed a few federated learning algorithms applied to the problem—these methods include Federated Graph Attention Network with Dilated Convolution Neural Network (FedGAT-DCNN), FedAvg with Convolutional Neural Network (CNN), and Federated Averaging with Distance-based Weighted Aggregation (FedAvg-DWA) with Random Forest (RF). …”
Get full text
Article -
1104
A Proposed Therapeutic Algorithm Based on Multiple Case Analysis Regarding the Repair Options of Iatrogenic Biliary Lesions Following Open and Laparoscopic Surgery
Published 2016-10-01“…Introduction: the problem of the iatrogenic lesions of the main biliary pathways is far from being completely clarified and still represents a serious surgical situation, during both open and laparoscopic surgeries. …”
Get full text
Article -
1105
Innovative IoT-enabled mask detection system: A hybrid deep learning approach for public health applications
Published 2025-06-01“…The proposed framework integrates ResNet50 and MobileNetV2 architectures, optimized using the Adaptive Flame-Sailfish Optimization (AFSO) algorithm. This hybrid approach enhances detection accuracy and computational efficiency, making it suitable for real-time deployment. …”
Get full text
Article -
1106
Let’s Go Bananas: Beyond Bounding Box Representations for Fisheye Camera-Based Object Detection in Autonomous Driving
Published 2025-06-01“…Object detection is a mature problem in autonomous driving, with pedestrian detection being one of the first commercially deployed algorithms. …”
Get full text
Article -
1107
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
Published 2025-02-01“…We need scalable, privacy-preserving, and resource-efficient IoT intrusion detection algorithms to solve this essential problem. …”
Get full text
Article -
1108
-
1109
Detour-Straddle 3D-like path planning of unmanned mining truck in open pit mines based on optimized ant colony algorithm
Published 2025-06-01“…In order to solve the problem of low driving efficiency and poor path quality caused by excessive detour during path planning, a “3D-like” path planning method based on optimized ant colony algorithm was proposed, and its effectiveness was verified by simulation and experiment. …”
Get full text
Article -
1110
Comparative study on Functional Machine learning and Statistical Methods in Disease detection and Weed Removal for Enhanced Agricultural Yield
Published 2023-01-01“…The technology has developed to rectify the problems using some machine learning algorithms like Random Forest algorithms, Decision trees, Naïve Bayes, KNN, K-Means clustering, Support vector machines. …”
Get full text
Article -
1111
Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset
Published 2021-10-01“…Next, 10 full-feature-based intrusion detection systems were developed by training the 10 machine learning algorithms with the 12 full features. …”
Get full text
Article -
1112
A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT
Published 2021-12-01“…Recently, the idea of applying the software-defined networking paradigm to industrial Internet of things is proposed by many scholars since this paradigm has the advantages of flexible deployment of intelligent algorithms and global coordination capabilities. These advantages prompt us to propose a multi-factor integration-based semi-supervised learning address resolution protocol detection method deployed in software-defined networking, called MIS, to specially solve the problems of limited labeled training data and incomplete features extraction in the traditional address resolution protocol detection methods. …”
Get full text
Article -
1113
For Precision Animal Husbandry: Precise Detection of Specific Body Parts of Sika Deer Based on Improved YOLO11
Published 2025-06-01“…However, the traditional management methods have problems such as low efficiency, easy triggering of strong stress responses, and damage to animal welfare. …”
Get full text
Article -
1114
Lightweight CNN model for automatic detection and depth estimation of subsurface voids using GPR B-scan data
Published 2025-06-01“…Therefore, automated approaches using machine learning algorithms for identifying subsurface anomalies have recently emerged, providing promising pathways for real-time cavity detection. …”
Get full text
Article -
1115
Moving Vehicle Detection and Tracking Based on Optical Flow Method and Immune Particle Filter under Complex Transportation Environments
Published 2020-01-01“…To solve this problem, this paper proposes a kind of moving vehicle detection and tracking based on the optical flow method and immune particle filter algorithm. …”
Get full text
Article -
1116
ClipQ: Clipping Optimization for the Post-Training Quantization of Convolutional Neural Network
Published 2025-04-01“…In addition, the particle swarm algorithm is applied in weight clipping to adjust the search step size and direction adaptively. …”
Get full text
Article -
1117
YOLOv7-DWS: tea bud recognition and detection network in multi-density environment via improved YOLOv7
Published 2025-01-01“…The problem of simultaneous detection and classification of one-bud-one-leaf and one-bud-two-leaves of tea was solved. …”
Get full text
Article -
1118
Adaptive Threshold Algorithm for Outlier Elimination in 3D Topography Data of Metal Additive Manufactured Surfaces Obtained from Focus Variation Microscopy
Published 2024-10-01“…In order to eliminate this problem, we introduce a new algorithm based on dual convolving a vertical Sobel operator with cross sections of an image stack parallel to the scanning direction of the so-called depth scan. …”
Get full text
Article -
1119
Outlier Traffic Flow Detection and Pattern Analysis Under Unplanned Disruptions: A Low-Rank Robust Decomposition Model
Published 2025-01-01“…Outlier traffic flow detection under unplanned disruptions is vital for operational safety and management. …”
Get full text
Article -
1120
Fault detection and isolation of floating wind turbine pitch system based on Kalman filter and multi-attention 1DCNN
Published 2024-12-01“…In this paper, the fault detection and isolate problem is investigated for the pitch system of floating wind turbine. …”
Get full text
Article