-
1201
Bilevel Optimization for ISAC Systems with Proactive Eavesdropping Capabilities
Published 2025-07-01Get full text
Article -
1202
Adaptive Step RRT*-Based Method for Path Planning of Tea-Picking Robotic Arm
Published 2024-12-01“…The Adaptive Step RRT* (AS-RRT*) path planning algorithm for tea-picking robotic arms was proposed as a solution to the autonomy, safety, and efficiency problems inherent to tea-picking robots in tea plantations. …”
Get full text
Article -
1203
Research on Automotive Radar Mutual Interference Mitigation Method based on V2X Communication Assistance
Published 2025-02-01Get full text
Article -
1204
A Fault Diagnosis Method for Oil Well Electrical Power Diagrams Based on Multidimensional Clustering Performance Evaluation
Published 2025-03-01“…Additionally, we propose a new effectiveness evaluation method for the FCM clustering algorithm, integrating fuzzy membership degrees and the geometric structure of the dataset, overcoming the limitations of traditional clustering algorithms in terms of accuracy and the determination of the number of clusters. …”
Get full text
Article -
1205
Securing IoT devices with zero day intrusion detection system using binary snake optimization and attention based bidirectional gated recurrent classifier
Published 2024-11-01“…This manuscript presents a Binary Snake Optimizer with DL-Enabled Zero-Day Attack Detection and Classification (BSODL-ZDADC) method. …”
Get full text
Article -
1206
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detection method was proposed.Suspicious system call combinations clustering by social network analysis was converted to a single channel image.Convolution neural network was applied to classify Android application.The model trained was used to find the most suspicious system call combinations by convolution layer gradient weight classification activation mapping algorithm,thus mining and understanding malicious application behavior.The experimental results show that the method can correctly discover the behavior patterns of malicious applications on the basis of efficient detection.…”
Get full text
Article -
1207
Design and Development of a Public AI Referee Assistance System Based on Harmony OS Platform
Published 2025-03-01“…In this sense, one AI referee assistance system is a small-scale system developed under the guidance of computer vision theory and technology, using deep learning-based object detection algorithms and computer graphics-related knowledge. …”
Get full text
Article -
1208
Blind audio watermarking mechanism based on variational Bayesian learning
Published 2015-01-01“…In order to improve the performance of audio watermarking detection,a blind audio watermarking mechanism using the statistical characteristics based on MFCC features of audio frames was proposed.The spread spectrum watermarking was embedded in the DCT coefficients of audio frames.MFCC features extracted from watermarked audio frames as well as un-watermarked ones were trained to establish their Gaussian mixture models and to estimate the parameters by vatiational Bayesian learning method respectively.The watermarking was detected according to the maximum likelihood principle.The experimental results show that our method can lower the false detection rate compared with the method using EM algorithm when the audio signal was under noise and malicious attacks.Also,the experiments show that the proposed method achieves better performance in handling insufficient training data as well as getting rid of over-fitting problem.…”
Get full text
Article -
1209
Third Ventricle Width Measurements Based on YOLO and Localized Intensity Features
Published 2025-01-01“…Firstly, to solve the problem of third ventricle detection in the complex background of TCS images, the YOLO-TV improvement model is proposed to improve the detection accuracy. …”
Get full text
Article -
1210
LUNGINFORMER: A Multiclass of lung pneumonia diseases detection based on chest X-ray image using contrast enhancement and hybridization inceptionresnet and transformer
Published 2025-05-01“…This process is both time-consuming and expensive. To address the problem, many researchers have employed deep learning algorithms to develop an automated detection system for pneumonia. …”
Get full text
Article -
1211
Intelligent Data Processing Methods for the Atypical Values Correction of Stock Quotes
Published 2022-05-01“…The article analyzes Russian and foreign bibliography on the research problem. Consideration of machine learning methods for detecting and correcting outliers in time series is proposed. …”
Get full text
Article -
1212
Historical Blurry Video-Based Face Recognition
Published 2024-09-01“…Historical motion picture films often have poorer resolution than modern digital imagery, making face detection a more challenging task. To approach this problem, we first propose a trunk–branch concatenated multi-task cascaded convolutional neural network (TB-MTCNN), which efficiently extracts facial features from blurry historical films by combining the trunk with branch networks and employing various sizes of kernels to enrich the multi-scale receptive field. …”
Get full text
Article -
1213
Multi-Channel Fusion Decision-Making Online Detection Network for Surface Defects in Automotive Pipelines Based on Transfer Learning VGG16 Network
Published 2024-12-01“…Although approaches for the online surface detection of automotive pipelines exist, low defect area rates, small-sample and long-tailed data, and the difficulty of detection due to the variable morphology of defects are three major problems faced when using such methods. …”
Get full text
Article -
1214
Comparative performance of YOLOv8, YOLOv9, YOLOv10, YOLOv11 and Faster R-CNN models for detection of multiple weed species
Published 2024-12-01“…These results suggest that the YOLO series algorithms have the potential for real-time deployment for weed species detection more accurately and faster than Faster R-CNN in agricultural fields.…”
Get full text
Article -
1215
-
1216
Effective Facial Expression Recognition System Using Artificial Intelligence Technique
Published 2024-12-01“…The research is an effort to mitigate the problems pertaining with conventional methods, like overfitting and generalization fault in order design FER model which has potential for performing much more accurately. …”
Get full text
Article -
1217
Research on Active Anti-collision Method of Unmanned Mine Truck Based on Predicted Trajectory
Published 2022-10-01“…Existing mine truck unmanned driving systems operating in complex mining areas have many potential safety hazards, such as problems with the planning trajectory of the dispatching system, failure to update the mining area operation map in time, and the loss of trajectories data between the ground and on-board system. …”
Get full text
Article -
1218
Unmasking social bots: how confident are we?
Published 2025-03-01“…Despite the progress made in developing multiple sophisticated social bot detection algorithms and tools, bot detection remains a challenging, unsolved problem that is fraught with uncertainty due to the heterogeneity of bot behaviors, training data, and detection algorithms. …”
Get full text
Article -
1219
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
1220
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article