-
1161
Multiple-Input Multiple-Output Synthetic Aperture Radar Waveform and Filter Design in the Presence of Uncertain Interference Environment
Published 2024-11-01“…However, it is difficult to obtain accurate prior knowledge about uncertain intermittent sampling repeater jamming (ISRJ), leading to a severe decline in the detection performance of MIMO-SAR systems. Therefore, this article studies the robust joint design problem of MIMO radar transmit waveform and filter against uncertain ISRJ. …”
Get full text
Article -
1162
Advanced Support Vector Machine- (ASVM-) Based Detection for Distributed Denial of Service (DDoS) Attack on Software Defined Networking (SDN)
Published 2019-01-01“…The DDoS attack on SDN becomes an important problem, and varieties of methods had been applied for detection and mitigation purposes. …”
Get full text
Article -
1163
Detection of mixed infection from bacterial whole genome sequence data allows assessment of its role in Clostridium difficile transmission.
Published 2013-01-01“…However, undetected mixed infections-infection with ≥2 unrelated strains of the same species where only one is sequenced-potentially impairs exclusion of transmission with certainty, and may therefore limit the utility of this technique. We investigated the problem by developing a computationally efficient method for detecting mixed infection without the need for resource-intensive independent sequencing of multiple bacterial colonies. …”
Get full text
Article -
1164
GYS-RT-DETR: A Lightweight Citrus Disease Detection Model Based on Integrated Adaptive Pruning and Dynamic Knowledge Distillation
Published 2025-06-01“…Secondly, the model adopts two model optimization strategies: (1) The Group_taylor local pruning algorithm is used to reduce memory occupation and the number of computing parameters of the model. (2) The feature-logic knowledge distillation framework is proposed and adopted to solve the problem of information loss caused by the structural difference between teachers and students, and to ensure a good detection performance, while realizing the lightweight character of the model. …”
Get full text
Article -
1165
Hierarchical Event-Triggered Online Charging Management of Time-Varying Network of Electric Vehicles Based on Cooperative Game Theory
Published 2024-04-01“…To detect the loss of contact between the aggregators or uncertainties, a method based on the mean field game is developed through a distributed consensus algorithm. …”
Get full text
Article -
1166
In situ nondestructive identification of citrus fruit ripeness via hyperspectral imaging technology
Published 2025-06-01“…To solve this problem, this study utilized hyperspectral technology to collect data from 22 fruit trees in an orchard (in the range of 400–1000 nm) and explored the effectiveness of five regions of interest selection methods (x-axis, y-axis, four-quadrant, threshold segmentation, and raw) for the delineation of the citrus ripening stage. …”
Get full text
Article -
1167
Improved RRT-Based Obstacle-Avoidance Path Planning for Dual-Arm Robots in Complex Environments
Published 2025-07-01Get full text
Article -
1168
Abnormal behavior detection method of fish school under low dissolved oxygen stress based on image processing and compressed sensing
Published 2018-07-01“…In order to overcome the time-consuming and laborious problems of artificial observation, we proposed an automatic detection method of abnormal behavior of fish school under low dissolved oxygen stress based on image processing and compressed sensing algorithm. …”
Get full text
Article -
1169
Federated learning and GWO-enabled consumer-centric healthcare internet of things for pancreatic tumour
Published 2025-05-01“…This study aims to address this problem by introducing a unified framework that integrates the inherent capabilities of Federated Learning (FL) with the unique characteristics of the Grey Wolf Optimisation algorithm. …”
Get full text
Article -
1170
Hybrid Naïve Bayes Models for Scam Detection: Comparative Insights From Email and Financial Fraud
Published 2025-01-01“…This study revisits the Naïve Bayes algorithm—often underestimated in modern cybersecurity—as a core building block for effective scam detection. …”
Get full text
Article -
1171
An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios
Published 2025-02-01“…Therefore, integrity authentication of speech files is crucial, and there are two pivotal problems: (1) how to achieve fine-grained and highly accurate tampering detection and (2) how to perform high-quality tampering recovery under high tampering ratios. …”
Get full text
Article -
1172
Implementation Of Deep Learning Using Convolutional Neural Network Method In A Rupiah Banknote Detection System For Those With Low Vision
Published 2025-04-01“…The application of deep learning in various sectors continues to grow due to its ability to provide efficient and effective solutions to complex problems. One significant implementation is in object detection, such as identifying Indonesian rupiah banknotes. …”
Get full text
Article -
1173
An online 11 kv distribution system insulator defect detection approach with modified YOLOv11 and mobileNetV3
Published 2025-05-01“…The intricate background, limited image dataset and small-scale object makes the problem of detection more complex. Owing to the exponential advancement in deep learning, deep learning-based insulator defect detection is gradually attaining a foothold in the research domain. …”
Get full text
Article -
1174
Research and implementation of intelligent terminal lightweight face recognition system
Published 2015-11-01Get full text
Article -
1175
Enhancing the Performance of YOLOv9t Through a Knowledge Distillation Approach for Real-Time Detection of Bloomed Damask Roses in the Field
Published 2025-03-01“…Recent developments in deep learning algorithms, especially in convolutional models, have shown significant promise for object detection, highlighting strong possibilities for improving the efficiency of this process. …”
Get full text
Article -
1176
MODEL OF ORGANIZATION OF KIDNEY CANCER EARLY DIAGNOSIS
Published 2021-05-01“…The model included a population questionnaire to identify risk factors and algorithm of patient routing («roadmap») with suspected kidney cancer for in-depth examination and treatment. …”
Get full text
Article -
1177
X-Ray Layered Refocusing Imaging Based on Linear Scanning
Published 2020-01-01“…Meanwhile, the automatic marking matting algorithm is employed to remove the non-focused interference in the refocused images. …”
Get full text
Article -
1178
Virtual power plant to ensure reliable power supply and accident-free operation of process equipment of a mining enterprise
Published 2024-02-01“…To ensure real-time integrated control and coordination with various energy and technological objects, the algorithm for solving combinatorial optimization problems "fruit fly" or "fruit fly algorithm" (BAS) is proposed. …”
Get full text
Article -
1179
-
1180
An Innovative Small-Target Detection Approach Against Information Attenuation: Fusing Enhanced Programmable Gradient Information and a Novel Mamba Module
Published 2025-03-01“…Serious information loss often occurs when the input data undergoes the layer-by-layer feature extraction process through deep neural networks. In small-target detection tasks, this problem becomes more serious. …”
Get full text
Article