-
41
Re-Parameterization After Pruning: Lightweight Algorithm Based on UAV Remote Sensing Target Detection
Published 2024-12-01“…Lightweight object detection algorithms play a paramount role in unmanned aerial vehicles (UAVs) remote sensing. …”
Get full text
Article -
42
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
43
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
44
YOLO-SRW: An Enhanced YOLO Algorithm for Detecting Prohibited Items in X-Ray Security Images
Published 2025-01-01“…To address the challenges of false positives and false negatives in prohibited item detection within X-ray security images, caused by complex backgrounds, poor image quality, and varying scales, this paper proposes an improved algorithm based on YOLOv8, named YOLO-SRW, to improve the accuracy of detecting prohibited items. …”
Get full text
Article -
45
-
46
Performance Evaluation of a Novel Sequence-Based Directional Detection Strategy for Protection of Active Distribution Networks
Published 2025-01-01“…An SEL-411L relay is used to program the detection algorithm. This hardware-in-the-loop (HIL) setup is used to verify the performance of the method and the results are compared with existing directional methods…”
Get full text
Article -
47
Optimization of Sorghum Spike Recognition Algorithm and Yield Estimation
Published 2025-06-01“…In the natural field environment, the high planting density of sorghum and severe occlusion among spikes substantially increases the difficulty of sorghum spike recognition, resulting in frequent false positives and false negatives. The target detection model suitable for this environment requires high computational power, and it is difficult to realize real-time detection of sorghum spikes on mobile devices. …”
Get full text
Article -
48
PdYOLO: A Lightweight Algorithm for Detecting Peach Fruits Against a Peach Tree Background
Published 2024-01-01“…First, the CIOU regression loss function in YOLOv8s is replaced with the WIoUv2 regression loss function, effectively alleviating the negative impact of uneven distribution of positive and negative samples during model training through a more balanced gradient gain distribution strategy, which significantly improves detection accuracy. …”
Get full text
Article -
49
ContourTL-Net: Contour-Based Transfer Learning Algorithm for Early-Stage Brain Tumor Detection
Published 2024-01-01Get full text
Article -
50
A Novel Dataset and Detection Method for Unmanned Aerial Vehicles Using an Improved YOLOv9 Algorithm
Published 2024-11-01“…Furthermore, we propose an anti-interference UAV detection method based on YOLOv9-C in which the dot distance is used as an evaluation index to assign positive and negative samples. …”
Get full text
Article -
51
Detection of vehicles and analysis of traffic volume by real-time video-graphic technique using python algorithm
Published 2025-08-01“…YOLO performs object detection more effectively due to preprocessing functions, including negative image filtering and image rotation augmentation with enhanced classifier reliability. …”
Get full text
Article -
52
Accuracy of Smartphone-Mediated Snore Detection in a Simulated Real-World Setting: Algorithm Development and Validation
Published 2025-03-01“…This study evaluated the accuracy of the SleepWatch snore detection algorithm in a simulated real-world setting. …”
Get full text
Article -
53
A comparative analysis of imaging-based algorithms for detecting focal cortical dysplasia type II in children
Published 2025-08-01“…Their performance was assessed using adult and pediatric healthy controls templates, with validation against both predictive radiological ROIs (PRR) and post-resection cavities (PRC). The junction algorithm achieved the highest median dice score (0.028, IQR 0.038, p < 0.01 when compared with other algorithms) and detected relevant clusters even in MRI-negative cases. …”
Get full text
Article -
54
EGRN-YOLO: An Enhanced Multi-View Remote Sensing Detection Algorithm for Onshore Wind Turbines Based on YOLOv7
Published 2025-01-01“…However, the challenges posed by complex backgrounds, significant variations in the scale of wind turbine targets, and arbitrary orientations in unmanned aerial vehicle (UAV) remote sensing images have significantly increased the difficulty of real-time wind turbine detection. To address these challenges, this paper introduces an enhanced multi-view onshore wind turbine remote sensing detection algorithm for UAVs based on YOLOv7, termed EGRN-YOLO. …”
Get full text
Article -
55
Lightweight malicious domain name detection model based on separable convolution
Published 2020-12-01“…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
Get full text
Article -
56
Weak and Occluded Vehicle Detection in Complex Infrared Environment Based on Improved YOLOv4
Published 2021-01-01“…Meanwhile, added the hard negative example mining block to the YOLOv4 model, which could depress the disturbance of complex background thus further decrease the false detecting rate. …”
Get full text
Article -
57
Conformal Segmentation in Industrial Surface Defect Detection with Statistical Guarantees
Published 2025-07-01Get full text
Article -
58
Multi-keyword partial matching algorithm based on text fragments
Published 2010-01-01“…A novel multi-keyword partial matching algorithm was also de- signed and realized which could detect the fraction of keywords in data block without re-flow or re-file. …”
Get full text
Article -
59
Detecting Anomalies in CPU Behavior Using Clustering Algorithms from the Scikit-Learn Library in Python Programming Language
Published 2024-03-01“…This article examines the problem of detecting anomalies in central processing unit (CPU) operation using time series clustering algorithms. …”
Get full text
Article -
60
Effectiveness of physician-based diagnosis versus diagnostic artificial intelligence algorithms in detecting communicable febrile diseases in Mexico
Published 2025-06-01“…Objective To evaluate the diagnostic effectiveness of various algorithms in detecting communicable diseases of epidemiological interest in febrile patients at Hospital General Regional No. 1, Cd. …”
Get full text
Article