-
561
Intelligent Troubleshooting of Vertical Bandsaws, Leveraging Ensemble Learning on Low-Level Data
Published 2024-01-01Get full text
Article -
562
Mixed Gas Detection and Temperature Compensation Based on Photoacoustic Spectroscopy
Published 2024-01-01“…In response to address issues such as difficulties in judging data for classification and recognizing gas components with low accuracy, a KNN-SVM algorithm has been proposed. …”
Get full text
Article -
563
Noncoherent multiple symbol detection of CPFSK based on decision-feedback
Published 2016-04-01“…There is a great deal of issues in the traditional symbol detection algorithm such as high computational com-plexity and large engineering implementation difficulty. …”
Get full text
Article -
564
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
565
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
566
Moving Target Detection and Active Tracking with a Multicamera Network
Published 2014-01-01“…The proposed framework consists of low-cost static and PTZ cameras, target detection and tracking algorithms, and a low-cost PTZ camera feedback control algorithm based on target information. …”
Get full text
Article -
567
Improved Crack Detection and Recognition Based on Convolutional Neural Network
Published 2019-01-01“…There are three obvious limitations existing in the present machine learning methods: low recognition rate, low accuracy, and long time. …”
Get full text
Article -
568
The Line Pressure Detection for Autonomous Vehicles Based on Deep Learning
Published 2022-01-01“…However, these algorithms also have shortcomings such as low detection accuracy or relying on specific scenarios. …”
Get full text
Article -
569
An optimization-inspired intrusion detection model for software-defined networking
Published 2025-01-01“…Currently, more and more intrusion detection systems based on machine learning and deep learning are being applied to SDN, but most have drawbacks such as complex models and low detection accuracy. …”
Get full text
Article -
570
BLSTM based night-time wildfire detection from video.
Published 2022-01-01“…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
Get full text
Article -
571
Simulation of Ground Visibility Based on Atmospheric Boundary Layer Data Using K-Nearest Neighbors and Ensemble Model Algorithms
Published 2024-11-01“…This study introduces a machine learning approach for simulating visibility, utilizing the K-Nearest Neighbors algorithm and an ensemble model, which incorporate data from atmospheric boundary layer detection and conventional ground meteorological observations as simulation inputs. …”
Get full text
Article -
572
A lightweight personnel detection method for underground coal mines
Published 2025-04-01“…Commonly used detection algorithms have large parameter counts, high requirements on equipment arithmetic, and are not satisfactory for application in low illumination environments in coal mines. …”
Get full text
Article -
573
A novel transformer-based approach for cardiovascular disease detection
Published 2025-04-01Get full text
Article -
574
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…A nonparametric CUSUM algorithm, suitable for low resource networks like CWSN, has been used in this work. …”
Get full text
Article -
575
Leather Defect Detection Based on Improved YOLOv8 Model
Published 2024-12-01“…Addressing the low accuracy and slow detection speed experienced by algorithms based on deep learning for a leather defect detection task, a lightweight and improved leather defect detection algorithm, dubbed YOLOv8-AGE, has been proposed based on YOLOv8n. …”
Get full text
Article -
576
Coal mine conveyor monitoring video enhancement algorithm based on DP-YOLOv7
Published 2025-04-01“…By introducing detail processing module (DPM) and low frequency enhancement filter (LEF) into PENet network, the detection effect in low light environment of coal mine is enhanced, and the coal dust and water vapor are denoised by domain adaptive algorithm. …”
Get full text
Article -
577
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…To address the problem of low success rate of spread code identification for low signal-to-noise ratio DSSS signals, this paper combines the Third-order Correlation Function (TCF) of <italic>m</italic>-sequences and its peak characteristics to identify the pseudo-code period of DSSS signals as prior information through power spectrum secondary processing on the premise of denoising preprocessing. …”
Get full text
Article -
578
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01“…Abstract Aiming at the low rate and strong concealment of low‐rate Denial of Service (LDoS) attacks, the calculation of traffic Hurst index is combined with traffic classification, and a machine learning LDoS attack detection method based on search sorting is proposed. …”
Get full text
Article -
579
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…The Cumulative Sum (CUSUM) method, based on calculating the cumulative values within a time series, is commonly used for change detection due to its early detection of small drifts, simplicity, low computational cost, and robustness to noise. …”
Get full text
Article -
580
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…To develop algorithms for detecting, estimating parameters, and direction finding of periodic pulse signals in the presence of low signal-to-noise ratios and the absence of a priori information about the parameters of a periodic pulse signal.Materials and methods. …”
Get full text
Article