-
341
A Refined and Efficient CNN Algorithm for Remote Sensing Object Detection
Published 2024-11-01“…Deep learning-based object-detection algorithms have proven effective in remote sensing image studies. …”
Get full text
Article -
342
University Media Content Detection and Classification Based on Information Fusion Algorithm
Published 2022-01-01“…This essay mainly introduces the technology of university media content detection and classification based on information fusion algorithm and focuses on the application of university multimedia content detection, analysis, and understanding, to explore the image discrimination auxiliary attribute feature learning and content association prediction and classification. …”
Get full text
Article -
343
A Defect Detection Algorithm for Optoelectronic Detectors Utilizing GLV-YOLO
Published 2025-02-01“…To meet the demands of real-time and accurate defect detection, this paper introduces an optimization algorithm based on the GLV-YOLO model tailored for photodetector defect detection in manufacturing settings. …”
Get full text
Article -
344
CAA-RF: An Anomaly Detection Algorithm for Computing Power Blockchain Networks
Published 2025-05-01Get full text
Article -
345
LANA-YOLO: Road defect detection algorithm optimized for embedded solutions
Published 2025-03-01Get full text
Article -
346
Insulator Defect Detection Algorithm Based on Improved YOLOv11n
Published 2025-02-01Get full text
Article -
347
PA-YOLO-Based Multifault Defect Detection Algorithm for PV Panels
Published 2024-01-01“…However, the rapid growth of PV power deployment also brings important challenges to the maintenance of PV panels, and in order to solve this problem, this paper proposes an innovative algorithm based on PA-YOLO. First, we propose to use PA-YOLO’s asymptotic feature pyramid network (AFPN) instead of YOLOv7’s backbone network to support direct interactions of nonadjacent layers and avoid large semantic gaps between nonadjacent layers. …”
Get full text
Article -
348
Road Event Detection and Classification Algorithm Using Vibration and Acceleration Data
Published 2025-02-01“…In this work, we propose a Random Forest-based event classification algorithm designed to handle the unique patterns of vibration and acceleration data in road event detection for an urban traffic scenario. …”
Get full text
Article -
349
An Object Detection Algorithm for Orchard Vehicles Based on AGO-PointPillars
Published 2025-07-01“…Then, Efficient Channel Attention (ECA) and Efficient Up-Convolution Block (EUCB) are introduced based on the PointPillars, which can enhance the ability of feature extraction for orchard objects. Finally, we establish an orchard object detection dataset and validate the proposed algorithm. …”
Get full text
Article -
350
DS-YOLOv7: Dense Small Object Detection Algorithm for UAV
Published 2024-01-01“…In this paper, we propose an improved YOLOv7 UAV dense small object detection algorithm (DS-YOLOv7) to improve the UAV detection performance of dense small objects. …”
Get full text
Article -
351
Static Analysis-based Detection of Android Malware using Machine Learning Algorithms
Published 2025-09-01“…The rapid growth of Android applications has led to increased security threats, making malware detection a critical concern in cybersecurity. This research proposes a static analysis-based technique that employs machine learning for Android malware detection. …”
Get full text
Article -
352
Social Network Community Detection by Combining Self-Organizing Maps and Genetic Algorithms
Published 2021-01-01“…To this end, many research works in the literature offer users some tools that can help them take advantage of this mine of information. Community detection is one of these tools and aims to detect a set of entities that share some features within a social network. …”
Get full text
Article -
353
Automated identification of sedimentary structures in core images using object detection algorithms.
Published 2025-01-01Get full text
Article -
354
Multilingual Sarcasm Detection for Enhancing Sentiment Analysis using Deep Learning Algorithms
Published 2024-12-01Get full text
Article -
355
-
356
A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
Published 2025-03-01“…In this paper, a new IDS is proposed to detect IoT-Botnet DDoS attacks. This IDS is a new three-phase system, the first phase is related to preprocessing on the dataset and the second phase includes a new hybrid method for feature selection using filter and wrapper methods based on the Grey Wolf (GW) algorithm and genetics called GW-GA. …”
Get full text
Article -
357
Research on lightweight tunnel cable fire recognition algorithm based on multi-scale features
Published 2025-07-01“…In this study, a lightweight YOLO-v5 tunnel cable fire recognition algorithm with multiscale features is proposed. By replacing the YOLO-v5 backbone network, Darknet53, with Mobilenetv3-small and integrating the SimAM attention mechanism, the lightweight and detection speed of the network was improved. …”
Get full text
Article -
358
Non-cooperative signal modulation recognition algorithm based on joint feature parameter extraction
Published 2020-07-01Get full text
Article -
359
Masked Convolutions Within Skip Connections for Video Anomaly Detection
Published 2025-05-01Get full text
Article -
360
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article