-
1061
-
1062
An Evolutionary Deep Reinforcement Learning-Based Framework for Efficient Anomaly Detection in Smart Power Distribution Grids
Published 2025-05-01“…By significantly reducing false positives and ensuring rapid anomaly detection with low computational overhead, the proposed DRL-NSABC framework enables efficient real-world deployment in smart power distribution systems without major infrastructure upgrades and promotes cost-effective, resilient power grid operations.…”
Get full text
Article -
1063
A Resting ECG Screening Protocol Improved with Artificial Intelligence for the Early Detection of Cardiovascular Risk in Athletes
Published 2025-02-01“…Among the athletes, 94.54% were classified as low risk and 5.46% as moderate risk with AI because of borderline abnormalities like QTc prolongation or mild T-wave inversions. …”
Get full text
Article -
1064
-
1065
An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition
Published 2019-05-01“…The detection device is used at the detection location of the grids to measure the received signal strength, which is from the detection points to the target access point, the grid center point is used as the location of the candidate target access point, the parameters in the path loss model are calculated by using the signal strength differences between the detection points, and then the distances between the detection points and the target access point are calculated by using the signal strength values from the detection points to the target access point. …”
Get full text
Article -
1066
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article -
1067
DeepGenMon: A Novel Framework for Monkeypox Classification Integrating Lightweight Attention-Based Deep Learning and a Genetic Algorithm
Published 2025-01-01“…This suggested framework leverages an attention-based convolutional neural network (CNN) and a genetic algorithm (GA) to enhance detection accuracy while optimizing the hyperparameters of the proposed model. …”
Get full text
Article -
1068
Fault detection in electrical power systems using attention-GRU-based fault classifier (AGFC-Net)
Published 2025-07-01“…Experimental results show that AGFC-Net attains a fault detection accuracy of 99.52%, better than conventional machine learning and deep learning algorithms. …”
Get full text
Article -
1069
Universal Method for Detecting Violations in the Integrity of a Digital Image Based on Analysis of Blocks of its Matrix
Published 2023-11-01“…At the same time, the algorithmic implementation of the method made it possible to increase the efficiency of detecting violations of image integrity by reducing type I errors by 2% compared to the best analogue; type II errors remained at the same level. …”
Get full text
Article -
1070
Synergistic detection of E. coli using ultrathin film of functionalized graphene with impedance spectroscopy and machine learning
Published 2025-04-01“…Machine learning (ML) algorithms applied to raw impedance data improved detection precision and reliability, enabling automated and accurate analysis. …”
Get full text
Article -
1071
Multi-Signal Induction Motor Broken Rotor Bar Detection Based on Merged Convolutional Neural Network
Published 2025-02-01“…This method combines advanced signal processing techniques and deep learning algorithms to provide a practical solution for motor broken rotor bar detection.…”
Get full text
Article -
1072
Facial emotion based smartphone addiction detection and prevention using deep learning and video based learning
Published 2025-05-01“…Additionally, face emotion detection algorithms tuned with MnasNet-Teaching Learning Based Optimization (TLBO) and Convolution Neural Networks (CNN)-Cuckoo Search Optimization (CSO) are employed for accurate emotion recognition. …”
Get full text
Article -
1073
Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks
Published 2024-11-01“…We evaluated the performance of multiple FL-enabled anomaly-detection algorithms, including Convolutional Autoencoder Federated Learning (CAE-FL), Isolation Forest Federated Learning (IF-FL), One-Class Support Vector Machine Federated Learning (OCSVM-FL), Local Outlier Factor Federated Learning (LOF-FL), and K-Means Federated Learning (K-Means-FL). …”
Get full text
Article -
1074
YOLOv10n-Based Defect Detection in Power Insulators: Attention Enhancement and Feature Fusion Optimization
Published 2025-01-01“…In modern power systems, insulators, as key components of transmission lines, are crucial for defect detection for the safe operation of power grids. Aiming at the problems of low efficiency of traditional manual detection, the vulnerability of traditional image processing methods to environmental interference, and the insufficient ability of existing deep learning models to detect small target defects under complex backgrounds, this paper proposes an improved target detection model based on YOLOv10n, which is the first time to integrate the spatial channel attention mechanism (SEAttention) with the up-sampling expansion operation (Patch Expanding) in the Neck part of the model. …”
Get full text
Article -
1075
Method and Optimization of Key Parameters of Soil Organic Matter Detection Based on Pyrolysis Coupled with Artificial Olfaction
Published 2025-07-01“…The use of an electronic nose to detect SOM contents has the advantages of rapidity, accuracy, and low pollution to the environment. …”
Get full text
Article -
1076
Advancing coal fire detection model for large-scale areas based on RS indices and machine learning
Published 2025-06-01“…In addition, there is limited research focused specifically on detecting coal fires over large areas. In this paper, thermal anomaly indices (TAIs), derived from short-wave infrared and near-infrared data, were selected for coal fire detection due to their relatively low sensitivity to solar radiation. …”
Get full text
Article -
1077
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
Get full text
Article -
1078
Innovations in animal health: artificial intelligence-enhanced hematocrit analysis for rapid anemia detection in small ruminants
Published 2024-11-01“…Using artificial intelligence-powered machine learning algorithms, an advanced, easy-to-use sensor was developed for rapidly alerting farmers as to low red blood cell count of their animals in this way to enable timely medical intervention. …”
Get full text
Article -
1079
High-resolution 2D-DoA sequential algorithm of azimuth and elevation estimation in automotive distributed system of coherent MIMO radars
Published 2024-05-01“…One of the main tasks of radiolocation involves the problem of increasing spatial resolution of the targets in the case of limited aperture of the radar antenna array and short length of time samples (snapshots). Algorithms must be developed to provide high angular resolution and low computational complexity. …”
Get full text
Article -
1080
Non-line-of-sight Visible Light Positioning System based on Deep Learning
Published 2024-12-01“…This system utilizes reflected light for VLP, overcoming the challenge of LOS obstruction and enhancing the robustness of the VLP system. Considering the low signal-to-noise ratio of the reflected light, the accuracy and adaptability of conventional image detection methods for extracting Light Emitting Diode (LED) spots are limited, resulting in reduced positioning accuracy for NLOS VLP. …”
Get full text
Article