-
3061
Transformer attention fusion for fine grained medical image classification
Published 2025-07-01“…It extracts features at three different resolutions (12 × 12, 24 × 24, 48 × 48), allowing it to detect subtle local features and global elements. …”
Get full text
Article -
3062
Construction of a predictive model for cognitive impairment among older adults in Northwest China
Published 2025-07-01“…We used random forest algorithms to select important features from potential predictors. …”
Get full text
Article -
3063
Transfer learning for securing electric vehicle charging infrastructure from cyber-physical attacks
Published 2025-03-01“…Existing EV charging station security systems are unable to identify many known and undiscovered threats since they primarily rely on feature selection and categorization accuracy. It is common for these systems to be constructed using conventional machine learning algorithms. …”
Get full text
Article -
3064
Perception-Based H.264/AVC Video Coding for Resource-Constrained and Low-Bit-Rate Applications
Published 2025-07-01“…To this end, macroblocks (MBs) containing human faces are detected using the Viola–Jones algorithm, which leverages AdaBoost for feature selection and a cascade of classifiers for fast and accurate detection. …”
Get full text
Article -
3065
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01“…The proposed system employs publicly available datasets such as CIC-IDS 2017, CIC-IDS 2018, CIC-Bell DNS 2021, and NSL-KDD to present a robust detection framework. IRKO selects features, reducing the feature dimensions and hence isolating the most relevant attributes. …”
Get full text
Article -
3066
A Network Traffic Anomaly Classification Model Based on Self-Attention Mechanism and Convolutional Gated Recurrent Unit
Published 2025-01-01“…However, traditional methods struggle to effectively identify minority-class traffic under conditions of data imbalance, which affects detection accuracy. To address this issue, this paper proposes a Custom Synthetic Minority Over-Sampling Technique (Custom SMOTE) algorithm, which precisely handles minority-class samples while significantly reducing memory consumption. …”
Get full text
Article -
3067
Multi-information fusion welding defect identification combining neighborhood rough set and optimized SVM
Published 2025-05-01“…A multi-information fusion welding defect recognition method is proposed by combining NRS with optimized SVM to address the “big data” generated during the multi-sensor information fusion welding process. A fast reduction algorithm based on NRS was constructed using feature importance as inspiration information, and the DOA was used to select the key parameters of SVM. …”
Get full text
Article -
3068
Multimodal deep learning for art behavior analysis and personalized teaching path generation
Published 2025-08-01“…The research constructs a Multimodal Feature Fusion Network (MFFN) and an Evolutionary Path Generation Algorithm (EPG), utilizing Kinect sensors, digital tablets, and other devices to collect multi-modal data including visual, tactile, behavioral, and environmental information, establishing a large-scale art learning dataset. …”
Get full text
Article -
3069
A hybrid CFD and machine learning study of energy performance of photovoltaic systems with a porous collector: Model development and validation
Published 2025-05-01“…A systematic preprocessing pipeline was developed to enhance model performance, including outlier detection and feature normalization. Hyperparameter optimization process in this study uses the Water Cycle Algorithm (WCA), a metaheuristic method inspired by natural processes. …”
Get full text
Article -
3070
-
3071
Enhanced Blind Separation of Rail Defect Signals with Time–Frequency Separation Neural Network and Smoothed Pseudo Wigner–Ville Distribution
Published 2025-03-01“…Simulation and experiments showed that compared with traditional algorithms like independent component analysis, shallow neural networks, and time–frequency blind source separation, the proposed algorithm can provide better separation performance and higher stability in rail crack detection.…”
Get full text
Article -
3072
-
3073
Passive forensic based on spatio-temporal localization of video object removal tampering
Published 2020-07-01“…To address the problem of identification of authenticity and integrity of video content and the location of video tampering area,a deep learning detection algorithm based on video noise flow was proposed.Firstly,based on SRM (spatial rich model) and C3D (3D convolution) neural network,a feature extractor,a frame discriminator and a RPN (region proposal network) based spatial locator were constructed.Secondly,the feature extractor was combined with the frame discriminator and the spatial locator respectively,and then two neural networks were built.Finally,two kinds of deep learning models were trained by the enhanced data,which were used to locate the tampered area in temporal domain and spatial domain respectively.The test results show that the accuracy of temporal-domain location is increased to 98.5%,and the average intersection over union of spatial localization and tamper area labeling is 49%,which can effectively locate the tamper area in temporal domain and spatial domain.…”
Get full text
Article -
3074
FragMangro: A cross-domain zero-shot model for monitoring fragmented mangrove ecosystems
Published 2025-05-01“…FragMangro integrates parallel multi-scale convolution for progressive dimensional upscaling, improving spectral feature extraction. Additionally, it employs a dynamic learning rate and iterative control algorithm, which adaptively adjusts learning rates and training epochs based on loss monitoring to prevent suboptimal convergence. …”
Get full text
Article -
3075
Validation of Taylor’s Frozen Hypothesis for DAS-Based Flow
Published 2025-06-01“…It proposes a dispersion feature enhancement algorithm based on cross-correlation, which combines a rotatable elliptical template with normalized cross-correlation coefficients to suppress interference from non-target directions. …”
Get full text
Article -
3076
Empirical Evaluation and Analysis of YOLO Models in Smart Transportation
Published 2024-11-01“…You Only Look Once (YOLO) and its variants have emerged as the most popular real-time object detection algorithms. They have been widely used in real-time smart transportation applications due to their low-latency detection and high accuracy. …”
Get full text
Article -
3077
Extraction of typical oyster pile columns in the Maowei Sea, Beibu Gulf, based on unmanned aerial vehicle laser point cloud orthophotos
Published 2025-03-01“…It utilizes multi-spectral image data from unmanned aerial vehicles (UAVs), light detection and ranging (LiDAR) point cloud technology, and deep learning algorithms to extract representative oyster pile columns in Maowei Sea within Beibu Gulf. …”
Get full text
Article -
3078
Infrared Thermography-Based Insulator Fault Classification via Unsupervised Clustering and Semi-Supervised Learning
Published 2024-01-01“…Then, in the supervised learning phase, a Gaussian kernel support vector machine (SVM) algorithm classifies various insulator defects using extracted features. …”
Get full text
Article -
3079
Enhancing personalized learning: AI-driven identification of learning styles and content modification strategies
Published 2024-01-01“…This research endeavors to devise an effective method for detecting a learner’s preferred learning style and subsequently adapting the learning content to align with that style, utilizing artificial intelligence AI techniques. …”
Get full text
Article -
3080
Automated Eddy Identification and Tracking in the Northwest Pacific Based on Conventional Altimeter and SWOT Data
Published 2025-05-01“…Future work should refine the PET algorithm for SWOT’s swath altimetry, addressing data gaps and unclosed contours. …”
Get full text
Article