-
1821
LAVID: A Lightweight and Autonomous Smart Camera System for Urban Violence Detection and Geolocation
Published 2025-04-01“…Due to the advancement of artificial intelligence methods, many automatic video analysis tasks like violence detection have been studied from a research perspective, and are even beginning to be commercialized in industrial solutions. …”
Get full text
Article -
1822
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…For rules generation NSL-KDD Data Set is used which include, KDDTrain and KDDTest, 125973 and 22544 records respectively, each record consists of 41 features and one class attribute for specifying normal and abnormal connection (complete train and test data are used), In order to get rid of redundancy and inappropriate features Principal Component Analysis (PCA) is used for selecting (5) features. …”
Get full text
Article -
1823
Non-Contact Laser Ultrasound Detection of Internal Gas Defects in Lithium-Ion Batteries
Published 2025-03-01“…Through both time-domain and frequency-domain analysis of the ultrasonic features, the results demonstrate that the signal amplitude attenuation characteristics of ultrasound in media with acoustic impedance mismatches can be used for precise detection and quantitative characterization of gas defect regions within the battery. …”
Get full text
Article -
1824
Face Detection Method based on Lightweight Network and Weak Semantic Segmentation Attention Mechanism
Published 2022-01-01“…K-means++ algorithm is employed to perform clustering analysis on YOLOv4 model prior frames in this paper, and smaller size prior frames are set to capture small face information to solve the missing detection problem of small face targets in scenes. …”
Get full text
Article -
1825
Case report: Detection and treatment of a rare submucosal gland duct adenoma of the esophagus
Published 2025-01-01Get full text
Article -
1826
Incipient Fault Detection of Rolling Element Bearings Based on Deep EMD-PCA Algorithm
Published 2020-01-01“…Due to the relatively weak early fault characteristics of rolling bearings, the difficulty of early fault detection increases. For unsolving this problem, an incipient fault detection method based on deep empirical mode decomposition and principal component analysis (Deep EMD-PCA) is proposed. …”
Get full text
Article -
1827
Replica attack detection method for vehicular ad hoc networks with sequential trajectory segment
Published 2019-02-01“…In terms of semi-supervised support vector machine, we establish a detection model using spatio-temporal trajectories of different identities as input samples, which include features of both conspiracy and non-conspiracy attack scenarios. …”
Get full text
Article -
1828
Review of Modern Forest Fire Detection Techniques: Innovations in Image Processing and Deep Learning
Published 2024-09-01“…In this article, we conduct a comprehensive review of articles from 2013 to 2023, exploring how these technologies are applied in fire detection and extinguishing. We delve into modern techniques enabling real-time analysis of the visual data captured by cameras or satellites, facilitating the detection of smoke, flames, and other fire-related cues. …”
Get full text
Article -
1829
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
1830
Abnormal Power Fluctuation Detection of Wind Turbines Based on Subband Processing and Correlation Coefficient
Published 2024-04-01“…Wind turbine power signals are nonlinear and non-stationary signals, and their abnormal fluctuation Frequencies are uncertain, which makes it difficult to extract and detect abnormal power fluctuation features. This paper proposes a method for detecting abnormal power fluctuations of wind turbine based on subband processing and correlation coefficient. …”
Get full text
Article -
1831
Evaluating YOLO Models for Efficient Crack Detection in Concrete Structures Using Transfer Learning
Published 2024-12-01“…This work introduces a comprehensive analysis of various YOLO models for detecting cracks in concrete structures, aiming to assist in the selection of an optimal model for future detection and segmentation tasks. …”
Get full text
Article -
1832
Ensemble Computational Intelligent for Insomnia Sleep Stage Detection via the Sleep ECG Signal
Published 2022-01-01“…Insomnia is a common sleep disorder in which patients cannot sleep properly. Accurate detection of insomnia disorder is a crucial step for mental disease analysis in the early stages. …”
Get full text
Article -
1833
Harnessing multimodal approaches for depression detection using large language models and facial expressions
Published 2024-12-01“…This study underscores the potential of automated depression detection, showing text-only models as robust and effective while paving the way for multimodal analysis.…”
Get full text
Article -
1834
A Spatio-Temporal Attention Network With Multiframe Information for Infrared Small Target Detection
Published 2025-01-01“…Most algorithms focus solely on extracting features from the spatial domain. However, this approach often leads to suboptimal detection performance. …”
Get full text
Article -
1835
Explainable AI supported hybrid deep learnig method for layer 2 intrusion detection
Published 2025-06-01“…In the last part of the study, the effect of the features in the CL2-IDS dataset on the classification is interpreted with SHapley Additive exPlanations (SHAP), an Explainable Artificial Intelligence (XAI) method. …”
Get full text
Article -
1836
Advanced Deep Learning Models for Melanoma Diagnosis in Computer-Aided Skin Cancer Detection
Published 2025-01-01“…An image segmentation network based on deep learning is then used to extract lesion regions for detailed analysis and calculate the optimized classification features. …”
Get full text
Article -
1837
Dielectrophoresis-Enhanced Microfluidic Device with Membrane Filter for Efficient Microparticle Concentration and Optical Detection
Published 2025-01-01“…These results highlight the device’s potential for precise and efficient microparticle concentration and detection.…”
Get full text
Article -
1838
Expanding and Interpreting Financial Statement Fraud Detection Using Supply Chain Knowledge Graphs
Published 2025-02-01“…These relationships also aid in the assessment and detection of financial fraud. Recent studies employing graph neural networks (GNNs) have demonstrated enhanced detection capabilities by integrating corporate financial features with supply chain relationships, surpassing traditional methods that rely solely on financial features. …”
Get full text
Article -
1839
Streamlined Bearing Fault Detection Using Artificial Intelligence in Permanent Magnet Synchronous Motors
Published 2025-04-01“…However, bearing faults remain a critical issue, necessitating robust fault detection strategies. This paper proposes an edge–fog–cloud architecture for bearing fault detection with a specific focus on implementing an efficient and non-intrusive edge-based solution. …”
Get full text
Article -
1840
Federal Deep Learning Approach of Intrusion Detection System for In-Vehicle Communication Network Security
Published 2025-01-01“…This approach is commonly employed for spatial extraction of features, permitted the model to detect patterns that may indicate possible attacks. …”
Get full text
Article