-
801
Combining Transfer Learning and Ensemble Algorithms for Improved Citrus Leaf Disease Classification
Published 2024-09-01“…These findings conclusively illustrate that deep learning model fusion networks combining transfer learning and integration algorithms can automatically extract image features, enhance the automation and accuracy of disease recognition, demonstrate the significant potential and application value in citrus leaf disease classification, and potentially drive the development of smart agriculture.…”
Get full text
Article -
802
Multi-Task Perception Algorithm for Rail Transit Scenarios Based on Triplet Attention
Published 2024-10-01“…Aiming at the challenges of insufficient object detection accuracy and low detection speeds, and the pursuit of an accuracy-speed balance in environmental perception within rail transit scenarios, this paper proposes a multi-task perception model that features simultaneous detection and segmentation. …”
Get full text
Article -
803
A lightweight personnel detection method for underground coal mines
Published 2025-04-01“…Commonly used detection algorithms have large parameter counts, high requirements on equipment arithmetic, and are not satisfactory for application in low illumination environments in coal mines. …”
Get full text
Article -
804
DGA malicious domain name identification based on XGBoost and particle swarm optimization algorithm
Published 2024-11-01Get full text
Article -
805
An Extrinsic Calibration Method for LiDAR and Camera Based on Feature Matching
Published 2024-02-01Get full text
Article -
806
One-Class Anomaly Detection for Industrial Applications: A Comparative Survey and Experimental Study
Published 2025-07-01Get full text
Article -
807
ASAD: A Meta Learning-Based Auto-Selective Approach and Tool for Anomaly Detection
Published 2025-01-01“…It is trained using 139 datasets built upon 60 base datasets from 11 diverse domains (finance, healthcare, network security) and 80 ML and DL models composed of 22 base anomaly detection algorithms. It uses meta-features and correlation functions to evaluate 300 features. …”
Get full text
Article -
808
Intelligent classification models for food products basis on morphological, colour and texture features
Published 2017-10-01“…The Correlation-based Feature Selection (CFS) algorithm and 2nd derivative pre-treatments of the Morphological, Colour and Texture features are used to train the models for classification and detection. …”
Get full text
Article -
809
Malware detection approach based on improved SOINN
Published 2019-12-01“…To deal with the problems of dynamic update of detection model and high computation costs in malware detection model based on batch learning,a novel malware detection approach is proposed by combing SOINN and supervised classifiers,to reduce computation costs and enable the detection model to update dynamically with the assistance of SOINN′s incremental learning characteristic.Firstly,the improved SOINN was given.According to the whole alignment algorithm,search the adjusted weights of neurons under all input sequences in the learning cycle and then calculate the average value of all adjusted weights as the final result,to avoid SOINN′s stability under different input sequences and representativeness of original data,therefore improve malware detection accuracy.Then a data preprocessing algorithm was proposed based on nonnegative matrix factor and Z-score normalization to transfer the malware behavior feature vector from high dimension and high order to low dimension and low order,to speed up and avoid overfitting and further improve detection accuracy.The results of experiments show that proposed approach supports dynamic updating of detection model and has a significantly higher accuracy of detecting unknown new samples and lower computation costs than tradition methods.…”
Get full text
Article -
810
Intrusion detection system based on machine learning using least square support vector machine
Published 2025-04-01“…Consequently, the accuracy of an ML model likely declines when irrelevant features are included from a vast dataset. In this paper, the exhaustive feature selection algorithm is employed to assess every possible combination of features in a dataset to evaluate its performance. …”
Get full text
Article -
811
Toward lightweight intrusion detection systems using the optimal and efficient feature pairs of the Bot-IoT 2018 dataset
Published 2021-10-01“…Next, 10 full-feature-based intrusion detection systems were developed by training the 10 machine learning algorithms with the 12 full features. …”
Get full text
Article -
812
Multi-Target Vehicle Tracking Algorithm Based on Improved DeepSORT
Published 2024-10-01Get full text
Article -
813
Image Matching Algorithm for Transmission Towers Based on CLAHE and Improved RANSAC
Published 2025-05-01“…To address the lack of robustness against illumination and blurring variations in aerial images of transmission towers, an improved image matching algorithm for aerial images is proposed. The proposed algorithm consists of two main components: an enhanced AKAZE algorithm and an improved three-stage feature matching strategy, which are used for feature point detection and feature matching, respectively. …”
Get full text
Article -
814
Automated Quality Control of Candle Jars via Anomaly Detection Using OCSVM and CNN-Based Feature Extraction
Published 2025-08-01“…Two anomaly detection strategies are explored: (1) a baseline model using convolutional neural networks (CNNs) as an end-to-end classifier and (2) a hybrid approach where features extracted by CNNs are fed into One-Class classification (OCC) algorithms, including One-Class SVM (OCSVM), One-Class Isolation Forest (OCIF), One-Class Local Outlier Factor (OCLOF), One-Class Elliptic Envelope (OCEE), One-Class Autoencoder (OCAutoencoder), and Support Vector Data Description (SVDD). …”
Get full text
Article -
815
Application of 4PCS and KD-ICP Alignment Methods Based on ISS Feature Points for Rail Wear Detection
Published 2025-03-01“…The experimental results show that when the number of ISS feature points extracted is 4496, the 4PCS coarse alignment algorithm based on ISS feature points is higher than the original 4PCS algorithm as well as the other algorithms in terms of alignment accuracy; the ICP fine alignment algorithm based on the kd-tree is less than the original ICP algorithm as well as the other algorithms in terms of the time consumed. …”
Get full text
Article -
816
A comparative study of convolutional neural networks and traditional feature extraction techniques for adulteration detection in ground beef
Published 2025-06-01“…In order to identify the most appropriate feature extraction algorithm and classify samples having various levels of adulteration, Local Binary Pattern (LBP), Gray Level Co-occurrence Matrixes (GLCM) and Gabor filter were compared. …”
Get full text
Article -
817
ARSOD-YOLO: Enhancing Small Target Detection for Remote Sensing Images
Published 2024-11-01“…The Adaptive Selective Feature Enhancement Module (AFEM) dynamically adjusts feature weights using GhostModule and sigmoid functions, thereby enhancing the accuracy of small target detection. …”
Get full text
Article -
818
Automated Tomato Leaf Disease Detection Using Image Processing: An SVM-Based Approach with GLCM and SIFT Features
Published 2024-01-01“…Therefore, we proposed an approach that employs robust feature extraction methods, including the gray level co-occurrence matrix (GLCM) and scale-invariant feature transform (SIFT), coupled with a support vector machine (SVM) for adequate classification. …”
Get full text
Article -
819
Diabetic Retinopathy Detection Using DL-Based Feature Extraction and a Hybrid Attention-Based Stacking Ensemble
Published 2025-01-01“…This paper addresses this challenge by utilizing advanced deep learning (DL) algorithms with established image processing techniques to enhance accuracy and efficiency in detection. …”
Get full text
Article -
820
AI-Based Ransomware Detection: A Comprehensive Review
Published 2024-01-01“…This study contributes significantly to the development of a systematic evaluation framework that evaluates each component of the AI-based detection model framework using specific criteria and methodologies and analyzes how various AI algorithms respond to different ransomware attacks, thereby providing insights for more effective and robust detection methods. …”
Get full text
Article