-
821
Classification of Flying Drones Using Millimeter-Wave Radar: Comparative Analysis of Algorithms Under Noisy Conditions
Published 2025-01-01“…This study evaluates different machine learning algorithms in detecting and identifying drones using radar data from a 60 GHz millimeter-wave sensor. …”
Get full text
Article -
822
-
823
Optimizing Tumor Detection in Brain MRI with One-Class SVM and Convolutional Neural Network-Based Feature Extraction
Published 2025-06-01“…Experimental results demonstrate that combining Convolutional Neural Network (CNN)-based feature extraction with OCSVM significantly improves anomaly detection performance compared with simpler handcrafted approaches. …”
Get full text
Article -
824
-
825
Resource-Efficient Traffic Classification Using Feature Selection for Message Queuing Telemetry Transport-Internet of Things Network-Based Security Attacks
Published 2025-04-01“…The aim is to reduce feature dimensionality while maintaining high detection accuracy. …”
Get full text
Article -
826
Binocular stereo vision-based relative positioning algorithm for drone swarm
Published 2025-01-01“…Abstract To address the challenges of high computational complexity and poor real-time performance in binocular vision-based Unmanned Aerial Vehicle (UAV) formation flight, this paper introduces a UAV localization algorithm based on a lightweight object detection model. …”
Get full text
Article -
827
Deep Learning Algorithm for Optimized Sensor Data Fusion in Fault Diagnosis and Tolerance
Published 2024-12-01Get full text
Article -
828
LD-Det: Lightweight Ship Target Detection Method in SAR Images via Dual Domain Feature Fusion
Published 2025-04-01“…However, large-scale deep learning algorithm training requires huge computing power support and large equipment to process, which is not suitable for real-time detection on edge platforms. …”
Get full text
Article -
829
Multiscale Sample Entropy-Based Feature Extraction with Gaussian Mixture Model for Detection and Classification of Blue Whale Vocalization
Published 2025-03-01“…Additionally, MSE is applied to the Gaussian mixture model (GMM) for blue whale call detection and classification. The performance of the proposed MSE-GMM algorithm is experimentally assessed and benchmarked against traditional methods, including principal component analysis (PCA), wavelet-based feature (WF) extraction, and dynamic mode decomposition (DMD), all combined with the GMM. …”
Get full text
Article -
830
Yolov4 High-Speed Train Wheelset Tread Defect Detection System Based on Multiscale Feature Fusion
Published 2022-01-01“…The Yolov4 detection algorithm does not sufficiently extract local semantic and location information. …”
Get full text
Article -
831
Utilizing Enhanced Particle Swarm Optimization for Feature Selection in Gender-Emotion Detection From English Speech Signals
Published 2024-01-01“…We extract pitch and acoustic-related statistical features from speech samples and develop separate models for gender prediction and emotion detection. …”
Get full text
Article -
832
An effectiveness of deep learning with fox optimizer-based feature selection model for securing cyberattack detection in IoT environments
Published 2025-08-01“…Furthermore, the FOFSDL-SCD model utilizes the Fox optimizer algorithm (FOA) method for the feature selection process to select the most significant features from the dataset. …”
Get full text
Article -
833
Android malware detection method based on deep neural network
Published 2020-10-01“…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
Get full text
Article -
834
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
835
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
836
A Multi-Objective Bio-Inspired Optimization for Voice Disorders Detection: A Comparative Study
Published 2025-06-01“…This paper introduces a multi-objective bio-inspired, AI-based optimization approach for the automated detection of voice disorders. Different multi-objective evolutionary algorithms (the Non-dominated Sorting Genetic Algorithm (NSGA-II), Strength Pareto Evolutionary Algorithm (SPEA-II), and the Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D)) have been compared to detect voice disorders by optimizing two conflicting objectives: error rate and the number of features. …”
Get full text
Article -
837
An airport apron ground service surveillance algorithm based on improved YOLO network
Published 2024-06-01“…The improved algorithm can efficiently extract the information features of small-sized objects, medium-sized objects, and moving objects in large scenes, and it achieves effective detection of activities of ground service in the apron area. …”
Get full text
Article -
838
-
839
YOLO-RDM: A high accuracy and efficient algorithm for magnetic tile surface defect detection with practical applications.
Published 2025-01-01“…To solve these problems, this study proposes a novel magnetic tile defect detection algorithm called YOLO-RDM. First, we apply DOConv to the neck network. …”
Get full text
Article -
840
LI-YOLOv8: Lightweight small target detection algorithm for remote sensing images that combines GSConv and PConv.
Published 2025-01-01“…We propose a lightweight small target detection algorithm for remote sensing images that combines GSConv and PConv, named LI-YOLOv8. …”
Get full text
Article