-
1281
Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
Published 2024-09-01“…The key element of the GenClass method is that it can generate classification rules programmatically and detect the hidden associations that exist between the problem features and the desired classes. …”
Get full text
Article -
1282
A Crowd Counting Framework Combining with Crowd Location
Published 2021-01-01“…In this paper, a new framework is proposed to resolve the problem. The proposed framework includes two parts. …”
Get full text
Article -
1283
Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion
Published 2025-06-01“…To solve this problem, this paper proposes a hybrid method that combines multimodal data-aware attacks with Light Gradient Boosting Machine (LightGBM) and Support Vector Regression (SVR) agent models. …”
Get full text
Article -
1284
YOLOv5 garbage classification method with GhostNet
Published 2024-01-01“…By adding an improved version of channel attention module to the network, the important channel features are strengthened and more deep-level feature information is obtained. …”
Get full text
Article -
1285
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
1286
Proteomic selection of immunodiagnostic antigens for Trypanosoma congolense.
Published 2014-06-01“…Animal African Trypanosomosis (AAT) presents a severe problem for agricultural development in sub-Saharan Africa. …”
Get full text
Article -
1287
Integration of Multivariate Beta-based Hidden Markov Models and Support Vector Machines with Medical Applications
Published 2022-05-01“…Moreover, in some applications, data may have various feature-length. We tackle this problem with Fisher Kernel. …”
Get full text
Article -
1288
Railway safety monitoring algorithm based on distributed optical fiber vibration sensor
Published 2020-09-01“…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
Get full text
Article -
1289
Transient Voltage Unit Protection Based on Fault Information Fusion
Published 2024-01-01“…Transient voltage high-frequency instantaneous amplitudes are obtained and integrated using the Variational Mode Decomposition Hilbert Transform (VMD-HT) to increase the stability of high-frequency fault signal detection. This algorithm solved the original problem of 42.2% cross-data, 41.6% false operations, and 8.9% refusal to operate. …”
Get full text
Article -
1290
Social Navigation in Warehouse Logistics Based on Artificial Intelligence and RGB-D
Published 2025-04-01“…Purpose: Ensuring both human safety and transportation efficiency simultaneously during the navigation of autonomous mobile robots (AMRs) in warehouse logistics is a challenging problem due to dynamic environments and diverse obstacles. …”
Get full text
Article -
1291
CONTROL RESEARCH AND AUTOMATION OF STOCHASTIC DEVIATIONS IN ORGANISATIONAL MANAGEMENT PRODUCTION PROCESS SYSTEMS
Published 2018-06-01“…A method is proposed for the automated realisation of deviation from identification processes based on the processing of unstructured messages, the automatic generation of characteristic control parameters and a comparison of registered values with normative ones. The problem of detecting the primary cause of deviations is considered on the basis of the algorithm for processing the cause-effect relationships and probabilistic values of the relationship between the different defined groups of deviations.Results. …”
Get full text
Article -
1292
Application of Split-frequency AVO Technology in the Evaluation of Middle-depth Thin Reservoirs in the Xihu Depression
Published 2025-05-01“…To address the complex thin layer simulation problem, this study uses the reflectivity method to conduct AVO forward simulations of thin reservoirs, and finds that the AVO response of the thin layer has an obvious “V” feature at the far offset owing to the tuning effect. …”
Get full text
Article -
1293
Corner Enhancement Module Based on Deformable Convolutional Networks and Parallel Ensemble Processing Methods for Distorted License Plate Recognition in Real Environments
Published 2025-06-01“…For this purpose, the proposed system incorporates vehicle and license plate detection based on YOLOv8 and integrates a Corner Enhancement Module (CEM) utilizing a Deformable Convolutional Network (DCN) into the model’s neck to ensure robust feature extraction against geometric transformations. …”
Get full text
Article -
1294
Robust screening of atrial fibrillation with distribution classification
Published 2025-07-01“…It achieves state-of-the-art performance and unprecedented robustness on the screening problem while only leveraging one interpretable feature and little training data. …”
Get full text
Article -
1295
Research and Implementation of Travel Aids for Blind and Visually Impaired People
Published 2025-07-01“…To address embedded device computational constraints, we developed a lightweight object detection and segmentation algorithm. Key innovations include a multi-scale attention feature extraction backbone, a dual-stream fusion module incorporating the Mamba architecture, and adaptive context-aware detection/segmentation heads. …”
Get full text
Article -
1296
Morphological characterization of Mycobacterium tuberculosis in a MODS culture for an automatic diagnostics through pattern recognition.
Published 2013-01-01“…Lack of adequate early diagnostics and MDR detection is a critical problem in control efforts. …”
Get full text
Article -
1297
Development of Impact Factors Reverse Analysis Method for Software Complexes’ Support Automation
Published 2025-05-01“…This research represents a corresponding and developed specialized impact factors reverse analysis method for software complexes’ support automation; it is intended for the analysis of impact factors affecting the supported software’s (or processes of its comprehensive support) subjective perception results, as one of the constituent tasks of the more complex problem of software complexes’ support automation. …”
Get full text
Article -
1298
An efficient cost calculation method for disparity estimation of stereo matching considering shadow occlusion
Published 2025-05-01“…This research work proposes a novel cost calculation method that considers shadow occlusion areas to address the issues of poor disparity estimation in urban areas, termed Matching Cost based on Shadow Properties (MCSP), error estimation of the shadow occlusion area, which not only considers the problem of disparity error estimation in the shadow occlusion areas but also considers the problem of edge integrity and smoothness in the disparity estimation results. …”
Get full text
Article -
1299
Cotton Weed-YOLO: A Lightweight and Highly Accurate Cotton Weed Identification Model for Precision Agriculture
Published 2024-12-01“…In this paper, a novel weed recognition model, Cotton Weed-YOLO, is proposed to improve the accuracy and efficiency of weed detection. CW-YOLO is based on YOLOv8 and introduces a dual-branch structure combining a Vision Transformer and a Convolutional Neural Network to address the problems of the small receptive field of the CNN and the high computational complexity of the transformer. …”
Get full text
Article -
1300
A Systematic Study on the Extraction and Image Reproduction of Ceramic Sculpture Artworks
Published 2022-01-01“…In order to solve the research on the extraction of ceramic sculpture artwork patterns, and, in the process of image reproduction, the problem of too few feature points in the object image, the author proposes an image stitching algorithm that combines SIFT and MSER algorithms. …”
Get full text
Article