-
61
Machine Learning Algorithms Performance Evaluation for Intrusion Detection
Published 2021-01-01“…In this paper authors introduces Intrusion detection system (IDS) framework that is deployed over KDD Cup99 dataset by using machine learning algorithms as Support Vector Machine (SVM), Naïve Bayes and Random Forest for the purpose of improving the precision, accuracy and recall value to compute the best suited algorithm.…”
Get full text
Article -
62
-
63
A Cascaded Defect Detection Algorithm for Track Components
Published 2022-06-01Get full text
Article -
64
Low-complexity optimal MPSK detection for spatial modulation
Published 2015-08-01“…The low-complexity optimal SM detection algorithm for MQAM signal detection had been proposed,but no similar method was found for MPSK signal.The problem of low-complexity detection for MPSK signal was considered in SM systems.Utilizing 2-D vector quantization of ML demodulation and the property of MPSK constellation,a low-complexity optimal detection which is independent to modulation order was developed.Since the approach avoids the exhaustive searching on signal constellation space,the computational complexity can be significantly reduced.The proposed detection algorithm can provide the identical performance with ML-optimum detector and has lower computational complexity.Therefore,it has both theoretical and practical significance.The proposed algorithm is of great significance in the large antenna and green communication technology.…”
Get full text
Article -
65
Trajectory analysis using data mining techniques
Published 2025-04-01Subjects: “…Clustering algorithm, Congestion detection, GPS trajectory, Traffic flow, Trajectory clusterin…”
Get full text
Article -
66
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…The closed-set object detection algorithms they employ can only perform detections based on fixed categories, which leads to limited recognition scope and weak model generalization ability.Moreover, the tracking algorithms used are unstable and have low computational efficiency. …”
Get full text
Article -
67
Morphological Background-Subtraction Modeling for Analyzing Traffic Flow
Published 2025-05-01Get full text
Article -
68
Traffic Flow Detection Using Distributed Fiber Optic Acoustic Sensing
Published 2018-01-01“…This paper proposes a novel method for traffic flow detection using distributed optical fiber acoustic sensing (DAS). …”
Get full text
Article -
69
Method of detecting IRC Botnet based on the multi-features of traffic flow
Published 2013-10-01“…To resolve the problem of detecting IRC Botnet,a method based on traffic flow characteristics was proposed.The characteristics of Botnet channel traf?…”
Get full text
Article -
70
Cotton Disease Detection Using TensorFlow Machine Learning Technique
Published 2022-01-01“…In this paper, the CNN algorithm is used to create the prediction model by leveraging the TensorFlow’s Keras API. …”
Get full text
Article -
71
-
72
Research on the Computed Tomography Pebble Flow Detecting System for HTR-PM
Published 2017-01-01“…To investigate it more authentically, a computed tomography pebble flow detecting (CT-PFD) system has been constructed, in which a three-dimensional model is simulated according to the ratio of 1 : 5 with the core of HTR-PM. …”
Get full text
Article -
73
Lightweight detection algorithms for small targets on unmanned mining trucks
Published 2025-07-01“…Therefore, to address the issues of high parameter count, large model size, and low detection accuracy for small and occluded targets in open-pit mining scenarios, we propose the Lightweight Unmanned Mining Truck Detection Algorithm LWHP (Lightweight High-Precision). …”
Get full text
Article -
74
A High-Performance and Lightweight Maritime Target Detection Algorithm
Published 2025-03-01“…Hindered by many complex factors, the existing MSV target detection systems have low detection accuracy. These factors include target distance, potential occlusion from rain and fog, and limited computing power of edge devices. …”
Get full text
Article -
75
An Intrusion Detection Approach based on the Combination of Oversampling and Undersampling Algorithms
Published 2023-06-01Get full text
Article -
76
Posture detection of athletes in sports based on posture solving algorithms
Published 2024-12-01“…However, the current attitude solving algorithm has the limitation of low precision and low efficiency. …”
Get full text
Article -
77
Target Tracking Algorithm Based on Adaptive Scale Detection Learning
Published 2021-01-01“…In this paper, to better solve the problem of low tracking accuracy caused by the sudden change of target scale, we design and propose an adaptive scale mutation tracking algorithm using a deep learning network to detect the target first and then track it using the kernel correlation filtering method and verify the effectiveness of the model through experiments. …”
Get full text
Article -
78
Pig Detection Algorithm Based on Sliding Windows and PCA Convolution
Published 2019-01-01“…In order to solve the problems of low computational efficiency and low precision in pig detection algorithm based on sliding windows, this paper proposed a simple and efficient pig detection algorithm. …”
Get full text
Article -
79
Research on PCB defect detection algorithm based on LPCB-YOLO
Published 2025-01-01Get full text
Article -
80
Application of Hough transform in contact wire wear detection algorithm
Published 2022-07-01“…The contact wire wear will affect the current-receiving quality, and it needs to be monitored in real time. For the low accuracy and poor robustness of the current contact wire wear detection system, a contact wire wear detection algorithm based on Hough transform was presented. …”
Get full text
Article