-
761
Research Progress on Non-destructive Detection Techniques for Potatoes Quality
Published 2024-11-01“…Aiming at the problems of traditional manual potato quality classification, such as high labor intensity, low efficiency, easy to cause secondary damage, and inability to judge internal quality, this article elaborated on the research progress of domestic and foreign hyperspectral detection technology, near-infrared spectroscopy detection technology, machine vision detection technology, and ultrasonic detection technology in the application of internal and external quality detection of potatoes. …”
Get full text
Article -
762
Detection of Wild Mushrooms Using Machine Learning and Computer Vision
Published 2025-06-01“…The proposed approach utilises unmanned aerial vehicles (UAVs) equipped with multispectral imaging and the YOLOv5 object detection algorithm. A custom dataset, the wild mushroom detection dataset (WOES), comprising 907 annotated aerial and ground images, was developed to support model training and evaluation. …”
Get full text
Article -
763
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
764
Improved YOLOv5: Efficient Object Detection for Fire Images
Published 2025-01-01“…After training and testing in fire detection instances, the default versions of the YOLO technique exhibit a significantly low level of accuracy. …”
Get full text
Article -
765
Broiler Behavior Detection and Tracking Method Based on Lightweight Transformer
Published 2025-03-01“…In an attempt to resolve the problems of the slow detection speed, low accuracy, and poor generalization ability of traditional detection models in the actual breeding environment, we propose a chicken behavior detection method called FCBD-DETR (Faster Chicken Behavior Detection Transformer). …”
Get full text
Article -
766
Investigation on Reconstruction for Frequency Domain Photoacoustic Imaging via TVAL3 Regularization Algorithm
Published 2018-01-01“…This paper aiming to propose the suitable scheme for image reconstruction, we focus on the model-based PAI system and make great efforts to reduce the impact of noise algorithmically. Three regularization algorithms, i.e., Least Square QR-factorization, Tikhonov, and Total Variation minimization by Augmented Lagrangian and alternating direction algorithms (TVAL3) are studied. …”
Get full text
Article -
767
Enhancing adaptive beamforming by enhanced MUSIC algorithm for urban environments in O-RAN architecture
Published 2025-06-01“…Abstract The advent of 5G and the progression toward 6G have driven significant advancements in wireless communication technologies, emphasizing higher data rates, ultra-reliable low-latency communications (URLLC), and enhanced network flexibility. …”
Get full text
Article -
768
Batch Cooling Crystallization of a Model System Using Direct Nucleation Control and High-Performance In Situ Microscopy
Published 2024-12-01“…Compared to other techniques, HPM enables the detection of small crystals in the range of 1 to 10 μm. …”
Get full text
Article -
769
Fault Information Processing of Power Dispatching Communication System Combining MMSE Algorithm and LMS
Published 2024-01-01“…Aiming at the defects of the existing power dispatching communication system, such as difficult to locate the fault information, low efficiency and poor accuracy, the research first introduces the minimum mean square error detection algorithm, and improves this algorithm. …”
Get full text
Article -
770
Application of a Channel Estimation Algorithm to Spectrum Sensing in a Cognitive Radio Context
Published 2014-01-01“…We theoretically show the convergence of the algorithm, and we derive its analytical detection and false alarm probabilities. …”
Get full text
Article -
771
Diagnostic algorithms in patients with chronic coronary syndromes — what does clinical practice show?
Published 2023-09-01“…The results obtained showed the effectiveness of novel diagnostic strategies in increasing the detection rate of obstructive CAD. However, clinical outcomes of any diagnostic algorithm are few and require further study, as well as their cost-effectiveness.…”
Get full text
Article -
772
Building Surface Defect Detection Based on Improved YOLOv8
Published 2025-05-01“…To address these issues, an improved version of the You Only Look Once (YOLOv8) algorithm is proposed for building surface defect detection. …”
Get full text
Article -
773
Enabling Model-Based Design for Real-Time Spike Detection
Published 2025-01-01“…MBD offers distinct advantages by streamlining the design workflow, from modelling to implementation, thus facilitating the development of intricate systems. A spike detection algorithm has been implemented on a commercially available system based on a Field-Programmable Gate Array (FPGA) that combines neural probe electronics with configurable integrated circuit. …”
Get full text
Article -
774
TATPat based explainable EEG model for neonatal seizure detection
Published 2024-11-01“…The primary objective of this research is to detect neonatal seizures and explain these seizures using the new version of Directed Lobish. …”
Get full text
Article -
775
Algorithm for Acoustic Wavefield in Space-Wavenumber Domain of Vertically Heterogeneous Media Using NUFFT
Published 2025-02-01“…Through a sensitivity analysis, it is shown that the denser the mesh node partitioning, the higher the medium velocity, and the lower the point source frequency, the higher the accuracy of the algorithm. An algorithm efficiency analysis shows that this method has extremely low memory usage and high computational efficiency and can quickly solve large-scale models even on personal computers. …”
Get full text
Article -
776
A Coevolutionary Algorithm Based on Constraints Decomposition for Constrained Multi-objective Optimization Problems
Published 2025-05-01“…The framework can take the advantage of the low complexity of single-constraint problems to help algorithm search the complete feasible regions. …”
Get full text
Article -
777
Investigation of AI Algorithms for Photometric Online Analysis in a Draft Tube Baffle Crystallizer
Published 2024-11-01“…The rapid advancement of AI algorithms presents new opportunities for sensing technologies based on image recognition, such as real-time crystallization monitoring. …”
Get full text
Article -
778
Preset Conditional Generative Adversarial Network for Massive MIMO Detection
Published 2023-01-01“…The detection performance of NR-PC-GAN is far superior to the other algorithms in low-SNR scenarios.…”
Get full text
Article -
779
Direct Pixel-Level Tightly Coupled Navigation Design With Dual-Pattern LED Markers for Spacecraft Proximity Operation
Published 2025-01-01“…This study proposes an advanced integrated navigation algorithm based on a monocular camera for cooperative proximity missions of spacecraft in a low Earth orbit (LEO) environment. …”
Get full text
Article -
780
Advanced IoT-integrated parking systems with automated license plate recognition and payment management
Published 2025-01-01“…Testing under real-world conditions showed 95% accuracy in daylight, 90% in low light, and 93% for plates at 45-degree angles. …”
Get full text
Article