-
721
Coal mine conveyor monitoring video enhancement algorithm based on DP-YOLOv7
Published 2025-04-01“…By introducing detail processing module (DPM) and low frequency enhancement filter (LEF) into PENet network, the detection effect in low light environment of coal mine is enhanced, and the coal dust and water vapor are denoised by domain adaptive algorithm. …”
Get full text
Article -
722
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…To address the problem of low success rate of spread code identification for low signal-to-noise ratio DSSS signals, this paper combines the Third-order Correlation Function (TCF) of <italic>m</italic>-sequences and its peak characteristics to identify the pseudo-code period of DSSS signals as prior information through power spectrum secondary processing on the premise of denoising preprocessing. …”
Get full text
Article -
723
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…The Cumulative Sum (CUSUM) method, based on calculating the cumulative values within a time series, is commonly used for change detection due to its early detection of small drifts, simplicity, low computational cost, and robustness to noise. …”
Get full text
Article -
724
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…To develop algorithms for detecting, estimating parameters, and direction finding of periodic pulse signals in the presence of low signal-to-noise ratios and the absence of a priori information about the parameters of a periodic pulse signal.Materials and methods. …”
Get full text
Article -
725
Detection of DRFM Deception Jamming Based on Diagonal Integral Bispectrum
Published 2025-06-01“…The proposed method demonstrates excellent performance under low-SNR conditions. Simulations and experimental results show that the correct detection rate reaches 92% at a jamming-to-signal ratio (JSR) and SNR of 0 dB, validating the effectiveness of the algorithm.…”
Get full text
Article -
726
Cell Outage Detection and Compensation in Two-Tier Heterogeneous Networks
Published 2014-01-01“…A K-nearest neighbor (KNN) classification algorithm is employed to detect the cell outage automatically. …”
Get full text
Article -
727
Improved MViTv2-T model for insulator defect detection
Published 2025-01-01“…The new model utilizes the sore penalty mechanism (SPM) cluster non-maximum suppression (NMS) algorithm instead of the batched non-maximum suppression (NMS) algorithm from the original model. …”
Get full text
Article -
728
Detecting phishing gangs via taint analysis on the Ethereum blockchain
Published 2023-01-01“…Based on this, we propose a heuristics algorithm for phishing gang detection. And we also summarize gang patterns and reveal money laundering in phishing activities. …”
Get full text
Article -
729
Analysis on Solar Panel Crack Detection Using Optimization Techniques
Published 2017-04-01Get full text
Article -
730
Research on formant estimation algorithm for high order optimal LPC root value screening
Published 2022-06-01“…Objectives: The existing linear prediction (LP) formant estimation algorithms are difficult to locate formant precisely because of the pseudo root interference and interaction between poles.Because of the low order fitting formant of LP prediction,the accuracy of formant extraction is fundamentally limited.It is difficult to remove false roots and spectrum aliasing caused by pole interaction in the formant extraction of high-order LP.In order to solve the problem of large error of LP formant detection,a formant estimation algorithm based on high-order LP coefficient root value screening was proposed. …”
Get full text
Article -
731
Implementation of YOLOv7 Model for Human Detection in Difficult Conditions
Published 2025-04-01“…The rapid development of artificial intelligence technology in recent decades has led to the development of highly efficient object detection algorithms, including human detection under difficult conditions. …”
Get full text
Article -
732
Wearable damaged clothing fabric image recognition system based on image restoration algorithm
Published 2024-12-01“…In view of this, the research has innovatively integrated GAN, CNN, field Programmable gate array (FPGA), multi-stage image recovery algorithm based on graph neural network, for high frequency and low frequency fusion, and combined it with wearable devices to develop a new wearable fabric recovery and recognition system. …”
Get full text
Article -
733
High-accuracy parameter estimation algorithm for spread spectrum signal in LEO satellite communication
Published 2025-06-01“…The low earth orbit (LEO) satellite has advantages of the low launch cost, the short transmission delay, the small link loss and the high data rate. …”
Get full text
Article -
734
Extinction Coefficient Inversion Algorithm with New Boundary Value Estimation for Horizontal Scanning Lidar
Published 2025-05-01“…The method is based on maximizing the lidar detection distance and determines the boundary value using a new estimation algorithm with the averaging of multiple fitted results in the low SNR region to reduce the impact of noise. …”
Get full text
Article -
735
Enhancing Road Safety: Detection of Animals on Highways During Night
Published 2025-01-01“…Conventional monitoring systems are rendered useless due to poor visibility and inadequate lighting, emphasizing the necessity for a sophisticated detecting system. Using YOLOv5, a cutting- edge object detection algorithm, this study presents a way to identify animals on highways at night and reduce collisions. …”
Get full text
Article -
736
Crack Detection on Road Surfaces Based on Improved YOLOv8
Published 2024-01-01“…Road defect detection is vital for road maintenance but remains challenging due to the complexity of backgrounds, low resolution, and crack similarity. …”
Get full text
Article -
737
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01“…In this paper, we propose a low complexity unsupervised machine learning approach for the detection of constant and periodic jamming attacks, using the Isolation Forest algorithm. …”
Get full text
Article -
738
Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
Published 2024-11-01“…To automate the search for clones, the BinDiff algorithm is added in the first stage to accurately select clone candidates. …”
Get full text
Article -
739
DVCW-YOLO for Printed Circuit Board Surface Defect Detection
Published 2024-12-01“…This adjustment addresses issues related to low generalization and poor detection performance for small objects or complex backgrounds, while also mitigating the impact of low-quality or extreme samples on model accuracy. …”
Get full text
Article -
740
Automatic Detect Incorrect Lifting Posture with the Pose Estimation Model
Published 2025-02-01“…We used the OpenPose algorithm to detect and extract key body points to calculate relevant biomechanical features. …”
Get full text
Article