-
1601
Financial phishing detection method based on sensitive characteristics of webpage
Published 2017-02-01“…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). Then, the method locates and cuts logo image of webpage, and utilizes PCA-SIFT algorithm to extract image features and match features with library of webpage logo which was established beforehand. …”
Get full text
Article -
1602
An Innovative Approach for Fake News Detection using Machine Learning
Published 2023-06-01“…The project uses an open-source online dataset of fake and real news to determine the credibility of news. Various text feature extraction techniques and classification algorithms are reviewed, with the Support Vector Machine (SVM) linear classification algorithm using TF-IDF feature extraction achieving the highest accuracy of 99.36%. …”
Get full text
Article -
1603
BLSTM based night-time wildfire detection from video.
Published 2022-01-01“…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
Get full text
Article -
1604
YOLO-WAD for Small-Defect Detection Boost in Photovoltaic Modules
Published 2025-03-01“…Subsequently, an additional detection layer is added to the neck, and C2f is replaced by C2f-EMA (CSP bottleneck with two convolutions–efficient multi-scale attention mechanism), which can redistribute feature weights and prioritize relevant features and spatial details across image channels to improve feature extraction. …”
Get full text
Article -
1605
An explainable EEG epilepsy detection model using friend pattern
Published 2025-05-01“…EEG signals have commonly been used to detect epilepsy. Therefore, the main objective of this research is to demonstrate the epilepsy detection capability of the presented new-generation relation-centric feature extraction function. …”
Get full text
Article -
1606
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
Get full text
Article -
1607
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1608
Siamese comparative transformer-based network for unsupervised landmark detection.
Published 2024-01-01“…Current landmark detection algorithms often train a sophisticated image pose encoder by reconstructing the source image to identify landmarks. …”
Get full text
Article -
1609
Detecting House of Spirit Attacks by Glibc Heap Information Extraction
Published 2024-02-01“…In addition,the House of Spirit heap attack is studied,established an attack model,and extracted its attack features. A detection algorithm for House of Spirit attack is designed based on the extracted attack features. …”
Get full text
Article -
1610
Object Detection using YOLOv8 : A Systematic Review
Published 2025-05-01“…This study evaluates the performance of YOLOv8 based on precision, recall, F1-score, and mean average precision (mAP) metrics, and compares its advantages and limitations with previous YOLO versions and other object detection algorithms. Improvements in the YOLOv8 architecture, including attention mechanisms, improved feature extraction, and hyperparameter optimization, enable significant improvements in accuracy and computational efficiency, especially for small objects and low-light conditions. …”
Get full text
Article -
1611
A Method of Abnormal Behavior Detection for Safety Site Surveillance
Published 2025-01-01“…For the complex background in the image, a multiframe differential superposition algorithm is proposed to denoise the target image; a feature extraction method is given to extract features for the target image, and then a more complete image with target features is obtained after filtering; a normal behavior model is established to extract the motion information of the target from a single frame of the image; an abnormal detection method is proposed to determine whether it belongs to abnormal behavior. …”
Get full text
Article -
1612
Detection of egg appreance based on Fasternet and YOLOv5 model
Published 2024-08-01“…The Bottleneck module in the C3 structure was replaced by the Fasternet Block module to reduce the parameters and improve the percision in the process of detection. The Soft-NMS, a non-maximum suppression was utilized to improve the detection of eggs with similar features. …”
Get full text
Article -
1613
Fitting Penalized Estimator for Sparse Covariance Matrix with Left-Censored Data by the EM Algorithm
Published 2025-01-01“…Estimating the sparse covariance matrix can effectively identify important features and patterns, and traditional estimation methods require complete data vectors on all subjects. …”
Get full text
Article -
1614
An Enhanced Human Evolutionary Optimization Algorithm for Global Optimization and Multi-Threshold Image Segmentation
Published 2025-05-01“…Thresholding image segmentation aims to divide an image into a number of regions with different feature attributes in order to facilitate the extraction of image features in the context of image detection and pattern recognition. …”
Get full text
Article -
1615
SEPDNet: simple and effective PCB surface defect detection method
Published 2025-03-01“…Abstract Replacing time-consuming and costly manual inspections on production lines with efficient and accurate defect detection algorithms for Printed Circuit Boards (PCBs) remains a significant challenge. …”
Get full text
Article -
1616
TATPat based explainable EEG model for neonatal seizure detection
Published 2024-11-01“…In this EFE model, there are four essential phases and these phases: (i) automaton and transformer-based feature extraction, (ii) feature selection deploying cumulative weight-based neighborhood component analysis (CWNCA), (iii) the Directed Lobish (DLob) and Causal Connectome Theory (CCT)-based explainable result generation and (iv) classification deploying t algorithm-based support vector machine (tSVM). …”
Get full text
Article -
1617
Uncertainty Quantification in Data Fusion Classifier for Ship-Wake Detection
Published 2024-12-01Get full text
Article -
1618
ARC-LIGHT: Algorithm for Robust Characterization of Lunar Surface Imaging for Ground Hazards and Trajectory
Published 2025-02-01“…Using these data streams, ARC-LIGHT will remove erroneous signals and recover a useful detection of the surface features to then be used by the spacecraft to correct its descent profile. …”
Get full text
Article -
1619
Deep Learning Innovations for Underwater Waste Detection: An In-Depth Analysis
Published 2025-01-01“…In this study, we present a novel deep learning framework for real-time underwater waste detection by evaluating state-of-the-art object detection algorithms on a manually annotated custom dataset comprising images across various water bodies to represent real-world turbidity, illumination, and occlusion. …”
Get full text
Article -
1620
Remote Sensing Change Detection by Pyramid Sequential Processing With Mamba
Published 2025-01-01“…Change detection (CD) in remote sensing imagery is crucial for monitoring environmental variations over time. …”
Get full text
Article