-
601
MODERN METHODS OF AUTOMATIC RECTANGLE OBJECTS DETECTION
Published 2019-06-01“…Low-level and high-level feature extraction methods and algorithms for the image formation of a rectangular object were considered. …”
Get full text
Article -
602
Automated anomaly detection of IPTV user experience
Published 2019-07-01“…The practice indicates that the algorithm with low calculation cost adapts to abnormal changes in the network and detect anomalies accurately and quickly, which reduces labor costs, improves operation efficiency and promotes intelligent operation.…”
Get full text
Article -
603
Lightweight blasthole image detection and positioning method
Published 2025-03-01“…To tackle the issues of large parameter size and low frames per second (FPS) in the blasthole image detection and localization algorithm network model, a lightweight Sc_C2f module is proposed to optimize the network structure. …”
Get full text
Article -
604
An experimental method for detecting objects in an aqueous environment
Published 2025-01-01“…To facilitate this process, the researchers developed a specialized algorithm designed to filter out pulse and fluctuation interference. …”
Get full text
Article -
605
CME Velocity Field Calculation Model Based on an Unsupervised Transformer Optical Flow Network
Published 2024-01-01“…The optical flow algorithm (OF) is one the main methods for calculating image velocity field and has many applications in space weather. …”
Get full text
Article -
606
Low-dimensional multiscale fast SAR image registration method
Published 2024-12-01“…First, the candidate points are detected in the modulus map of phase congruency (PC). …”
Get full text
Article -
607
Crowd anomaly estimation and detection: A review
Published 2024-09-01“…We present a comprehensive literature review on crowd anomaly detection using disruptive technologies such as radio frequency identification, wireless sensor networks, Wi-Fi, and Bluetooth low energy, employing device-free noninvasive algorithms based on received signal strength indicator variations to detect the speed and direction of a moving crowd to predict the onset of a stampede. …”
Get full text
Article -
608
An embedded intelligence engine for driver drowsiness detection
Published 2022-01-01“…This drowsiness of drivers can be detected using various methods, for example, algorithms based on behavioural gestures, physiological signals and vitals. …”
Get full text
Article -
609
Fracture Detection in Traumatic Pelvic CT Images
Published 2012-01-01“…Manual detection of bone fracture from computed tomography (CT) images is very challenging due to low resolution of the images and the complex pelvic structures. …”
Get full text
Article -
610
Robustness evaluation of commercial liveness detection platform
Published 2022-02-01“…Liveness detection technology has become an important application in daily life, and it is used in scenarios including mobile phone face unlock, face payment, and remote authentication.However, if attackers use fake video generation technology to generate realistic face-swapping videos to attack the living body detection system in the above scenarios, it will pose a huge threat to the security of these scenarios.Aiming at this problem, four state-of-the-art Deepfake technologies were used to generate a large number of face-changing pictures and videos as test samples, and use these samples to test the online API interfaces of commercial live detection platforms such as Baidu and Tencent.The test results show that the detection success rate of Deepfake images is generally very low by the major commercial live detection platforms currently used, and they are more sensitive to the quality of images, and the false detection rate of real images is also high.The main reason for the analysis may be that these platforms were mainly designed for traditional living detection attack methods such as printing photo attacks, screen remake attacks, and silicone mask attacks, and did not integrate advanced face-changing detection technology into their liveness detection.In the algorithm, these platforms cannot effectively deal with Deepfake attacks.Therefore, an integrated live detection method Integranet was proposed, which was obtained by integrating four detection algorithms for different image features.It could effectively detect traditional attack methods such as printed photos and screen remakes.It could also effectively detect against advanced Deepfake attacks.The detection effect of Integranet was verified on the test data set.The results show that the detection success rate of Deepfake images by proposed Integranet detection method is at least 35% higher than that of major commercial live detection platforms.…”
Get full text
Article -
611
Concealed Weapon Detection Using Thermal Cameras
Published 2025-02-01“…Key contributions include a lightweight algorithm optimized for low-end embedded devices, making it suitable for wearable and mobile applications, and the creation of a tailored thermal dataset for controlled concealment scenarios. …”
Get full text
Article -
612
Multiscale Convolutional Neural Networks for Hand Detection
Published 2017-01-01“…Developed from the region-based CNN (R-CNN) model, we propose a hand detection scheme based on candidate regions generated by a generic region proposal algorithm, followed by multiscale information fusion from the popular VGG16 model. …”
Get full text
Article -
613
IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception
Published 2023-05-01“…This implies that, to build better honeypots and enhance cyber deception capabilities, IoT honeypots need to generate realistic network traffic flows. To achieve this goal, we propose a novel deep learning based approach for generating traffic flows that mimic real network traffic due to user and IoT device interactions. …”
Get full text
Article -
614
Ensemble Method for Anomaly Detection On the Internet of Things
Published 2024-01-01“…Therefore, the attack detection method must be able to recognize the type of attack on a very large data traffic flow and unbalanced data. …”
Get full text
Article -
615
Complex Indoor Human Detection with You Only Look Once: An Improved Network Designed for Human Detection in Complex Indoor Scenes
Published 2024-11-01“…However, the complex indoor environment and background pose challenges to the detection task. The YOLOv8 algorithm is a cutting-edge technology in the field of object detection, but it is still affected by indoor low-light environments and large changes in human scale. …”
Get full text
Article -
616
A Flow-Speed Model for Motorways in England: Analysis Under Various Weather Conditions
Published 2025-01-01“…The proposed model was fitter on both four-lane and lane-by-lane conditions than the existing models, in terms of lower relative error and RMSE values and higher <i>R</i><sup>2</sup> values (minimum <i>R</i><sup>2</sup> = 0.79), which means the proposed model captured the speed–flow relationship better. In addition, the proposed model was used to fit traffic characteristics under different weather conditions and decided the threshold of the CM algorithms using the Gaussian function. …”
Get full text
Article -
617
MRP-YOLO: An Improved YOLOv8 Algorithm for Steel Surface Defects
Published 2024-12-01“…This study proposes a novel method for steel defect detection based on the YOLO v8 algorithm, which improves detection accuracy while maintaining low computational complexity. …”
Get full text
Article -
618
DETECTION OF SOMATIC MUTATIONS IN THE BRAF GENE BY PYROSEQUENCING
Published 2021-10-01“…The pyrogram signal values for samples without mutations ranged from 0 to 19.5 % for different mutations. An analysis algorithm was developed to confirm the presence and differentiation of mutations in the 600 codon at a low proportion of the mutant allele based on the signals ratio on the pyrogram. …”
Get full text
Article -
619
-
620
Accurate and efficient insulator maintenance: A DETR algorithm for drone imagery.
Published 2025-01-01“…To address these challenges and achieve a more accurate inspection system, this manuscript introduces an insulator defect detection algorithm tailored for the low-quality images collected by drone-based imaging systems. …”
Get full text
Article