-
141
Comparison of algorithms for the recognition of ChatGPT paraphrased texts
Published 2025-02-01“…Abstract The rapid development of artificial intelligence, especially AI assistants, is leading to new forms of plagiarism that are difficult to detect using existing methods. Paraphrasing tools make this problem even more complex and challenging especially in minor languages with inadequate resources and tools. …”
Get full text
Article -
142
Investigation of the Internal Structure of Hard-to-Reach Objects Using a Hybrid Algorithm on the Example of Walls
Published 2025-05-01“…The case of incomplete information in computed tomography often occurs in various applications, e.g., when examining large objects or when examining hard-to-reach objects. Algorithms dedicated to this type of problem can be used to detect anomalies (defects, cracks) in the walls, among other artifacts. …”
Get full text
Article -
143
-
144
FAST Algorithm for Accurate Corner Points Detection of Section Steel Based on Adaptive Threshold
Published 2025-05-01“…The on-line flatness detection of section steel based on machine vision is a key technical problem for quickly and accurately extracting key corner points from section steel images to enable accurate detection. …”
Get full text
Article -
145
DScanNet: Packaging Defect Detection Algorithm Based on Selective State Space Models
Published 2025-06-01“…However, existing target detection models often face the problems of difficulty in improving detection accuracy and high model complexity when dealing with small-scale targets in logistics packaging. …”
Get full text
Article -
146
Surface Defect Detection Algorithm for Wind Turbine Blades Based on HSCA-YOLOv7
Published 2023-08-01“…The blade is one of the key components of the wind turbine, which is vulnerable to the impact of natural environmental factors, resulting in gel coat falling off, cracks, corrosion, and other damage and thus affecting the efficiency of wind power generation and the safety of wind turbine operation. A defect detection algorithm for wind turbine blades based on HSCA-YOLOv7 is proposed to address the issues of inconsistent defect scale, inaccurate positioning, and low detection accuracy in wind turbine blade images by aerial photography. …”
Get full text
Article -
147
Adaptive random early detection algorithm based on network traffic level grade prediction
Published 2023-06-01“…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
Get full text
Article -
148
Improved M-ORB based direct-loop closure detection algorithm for visual SLAM
Published 2021-12-01“…Most kinds of direct methods do not extract image feature points in the front end of SLAM system, resulting in that they cannot use loop closure detection with bag-of-words models to eliminate the cumulative error of the system.To resolve this problem, an improved mature-oriented fast and rotated BRIEF (M-ORB) based direct-loop closure detection algorithm for visual SLAM was proposed, which designed an improved M-ORB, generated the bag of words model required for loop closure detection, and then used the term frequency-inverse document frequency (TF-IDF) algorithm to adaptively assign weights to the visual words in each sub-node of the dictionary tree.Finally, an accurate representation of the scene information was obtained.In the end, the proposed algorithm and conducted comparative experiments were verified though two public data sets TUM and KITTI.The experimental results show that the algorithm proposed in this paper can effectively detect the loop closure, and has better real-time and robustness performance without reducing the accuracy.…”
Get full text
Article -
149
Using Deep Learning algorithms to detect the success or failure of the Electroconvulsive Therapy (ECT) sessions
Published 2021-04-01“…In this study, we will be using Deep learning algorithms to detect the effectiveness of ECT sessions based on the EEG.…”
Get full text
Article -
150
Adaptive random early detection algorithm based on network traffic level grade prediction
Published 2023-06-01“…In view of the problem that the calculation of average queue length and maximum packet drop probability in random early detection algorithm and its variants reflect the changes of network traffic slowly, an adaptive random early detection algorithm based on network traffic level grade prediction was proposed.Based on the statistical characteristics of self-similar network traffic, the transition probability table of network traffic level grade was established, and a grade prediction method of self-similar network traffic level with low complexity and high accuracy was proposed.Furthermore, the prediction results were applied to calculate the average queue length in equal interval and adjust the maximum packet drop probability.Under the condition of fixed and variable bottleneck link capacity, it is found that regardless of the degree of self-similarity of network traffic, the proposed algorithm can improve the throughput and packet loss rate, especially when the Hurst parameter is large and the traffic is light.…”
Get full text
Article -
151
Weak Edge Detection Algorithm for Medical Images Based on Full Convolution Neural Network
Published 2021-06-01“…Aiming at the existing image weak edge detection algorithm,it is easy to ignore the selection of threshold in edge calculation,and there is no clustering analysis of the data,which leads to the problem that the detection effect is not good. …”
Get full text
Article -
152
UAVAI-YOLO: dense small target detection algorithm based on UAV aerial images
Published 2024-06-01Get full text
Article -
153
Research on Target Detection Algorithm for Solder Joint Defects Based on the Improved YOLOv8
Published 2025-01-01“…Aiming at the problem of low accuracy in solder joint defect detection caused by the complex background and difficult to extract defect features of circuit boards using through-hole technology (THT), an improved YOLOv8 solder joint defect target detection algorithm was proposed. …”
Get full text
Article -
154
AReal-time Detection Method of Vehicle Target Based on Improved YOLOv5s Algorithm
Published 2024-02-01“… Aiming at the high missed detection rate of small target vehicles and the heterogeneous redundant frames in video vehicle detection,a real-time vehicle detection algorithm based on improved YOLOv5s was proposed. …”
Get full text
Article -
155
Application of Improved Fault Detection and Robust Adaptive Algorithm in GNSS/INS Integrated Navigation
Published 2025-02-01“…In this paper, an improved fault detection algorithm is used to combine a robust algorithm with an adaptive algorithm to adapt to different gross errors in different scenarios. …”
Get full text
Article -
156
A Fast Algorithm of Generalized Radon-Fourier Transform for Weak Maneuvering Target Detection
Published 2016-01-01“…The BSSL learning-based particle swarm optimization (BPSO) has been proposed before to reduce the computational burden of GRFT and solve the BSSL problem simultaneously. However, the BPSO suffers from an apparent loss in detection performance compared with GRFT. …”
Get full text
Article -
157
A Small Object Detection Algorithm Integrated with ReFPN and Compound Attention Mechanism
Published 2022-04-01“…However, the small target in the image occupies fewer pixels, lower resolution, unobvious feature information, resulting in the effect that existing methods for small target detection is not ideal. To solve this problem, a feedback-based feature fusion network (ReFPN) for YOLOV4 algorithm was proposed.The original feature layer extracted from the backbone network is used twice to enhance the feature information of small targets and position regression performs more accurately. …”
Get full text
Article -
158
Incipient Fault Detection of Rolling Element Bearings Based on Deep EMD-PCA Algorithm
Published 2020-01-01Get full text
Article -
159
A Malware Detection Method Based on Genetic Algorithm Optimized CNN-SENet Network
Published 2024-01-01“…With the popularization of smart terminals and the gradual increase of power grid informatization and digitization, the protection of power monitoring systems from various cybersecurity threads is a current scientific problem that needs to be solved urgently. To this end, this paper proposes a malware detection method based on genetic algorithm optimization of the CNN-SENet network, which firstly introduces the SENet attention mechanism into the convolutional neural network to enhance the spatial feature extraction capability of the model; then, the application programming interface (API) sequences corresponding to different software behaviors are processed by segmentation and de-duplication, which in turn leads to the sequence feature extraction through the CNN-SENet model; finally, genetic algorithm is used to optimize the hyperparameters of CNN-SENet network to reduce the computational overhead of CNN and to achieve the recognition and classification of different malware at the output layer. …”
Get full text
Article -
160
Efficient detection technique in a MIMO system using the received signal compensation algorithm
Published 2025-07-01“…Abstract In this article, we address the problem of improving the performance of linear detection techniques to satisfy the growing demand for bandwidth for multiuser multimedia applications. …”
Get full text
Article