-
1
Optimization of norovirus concentration and infectivity detection methods in seawater
Published 2025-04-01“…ConclusionsThe norovirus concentration and detection method established and optimized in this study significantly improved the recovery rate and detection accuracy of norovirus, which is of great significance for improving food safety testing and infectious disease prevention and control.…”
Get full text
Article -
2
Universal anomaly detection at the LHC: transforming optimal classifiers and the DDD method
Published 2025-04-01Get full text
Article -
3
Optimal-Transport-Based Positive and Unlabeled Learning Method for Windshear Detection
Published 2024-11-01“…In this paper, we aim to investigate a machine learning method for windshear detection based on previously collected wind velocity data and windshear records. …”
Get full text
Article -
4
SARE: an optimized method for detection functional regulatory elements in genome
Published 2025-04-01“…The SARE method addresses the limitations of traditional fixed-fragment approaches by detecting variable-length regulatory elements. …”
Get full text
Article -
5
Optimized Detection Algorithm for Vertical Irregularities in Vertical Curve Segments
Published 2024-11-01Get full text
Article -
6
Optimized driver fatigue detection method using multimodal neural networks
Published 2025-04-01Get full text
Article -
7
Strategy optimization method based on UAVs-assisted detection of covert communication
Published 2025-08-01“…Specifically, the UAV actively transmitsnoise to Alice’s transmission channels to disrupt covert transmission whenWillie detects a covert communication transmission. Furthermore, we ana-lyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditionsfor the existence of a Nash equilibrium, and formulate optimal strategiesfor both sides.…”
Get full text
Article -
8
Low Complexity Optimized AOR Method for Massive MIMO Signal Detection
Published 2025-01-01“…Simulation results of the proposed method indicate superior performance compared to existing techniques in detection accuracy, error rates, and reduced computational complexity.…”
Get full text
Article -
9
Ship detection optimization method in SAR imagery based on multi-feature weighting
Published 2020-03-01“…Aiming at the problem that the accuracy of traditional ship detection algorithms is not satisfying in complex scene with many false alarm targets,a ship detection optimization method in SAR imagery based on multi-feature weighting was proposed.Firstly,the marker-based watershed algorithm was employed to remove land from SAR amplitude image.Then,the CFAR algorithm based on log-normal distribution was used to obtain candidate targets from no land image.Furthermore,the length to width ratio,the ship area and the contrast ratio of the candidate targets were extracted.Finally,a variance coefficient method was proposed to distribute the weight of the three features,and the confidence levels were calculated by combining the normalized feature vectors of the candidate targets with the feature weight.By determining the best confidence level,false alarm targets among the candidate targets were removed to optimize ship detection results.In order to verify the proposed method,experiments were carried on with the GF-3 SAR images of different complex scenes.The experimental results show that the proposed method is feasible and effective.…”
Get full text
Article -
10
A Joint Optimization Method for Cooperative Detection Resources Based on Channel Capacity
Published 2022-01-01“…Aiming at the resource optimization problem in the cooperative detection task, the objective function is constructed based on the channel capacity, and the artificial bee colony (ABC) algorithm is improved to realize the joint optimization of the UAV swarm trajectory and radiation power. …”
Get full text
Article -
11
Automatic Feature Engineering-Based Optimization Method for Car Loan Fraud Detection
Published 2021-01-01“…To tackle this issue, this paper proposed an optimized deep feature synthesis (DFS) method in the automatic feature engineering scheme to improve the car loan fraud detection. …”
Get full text
Article -
12
A Semantic Segmentation-Based GNSS Signal Occlusion Detection and Optimization Method
Published 2025-08-01“…To address this issue, we dig into the environmental perception perspective to propose a semantic segmentation-based GNSS signal occlusion detection and optimization method. The approach distinguishes between building and tree occlusions and adjusts signal weights accordingly to enhance positioning accuracy. …”
Get full text
Article -
13
An optimization method of multiscale storage tank target detection introducing an attention mechanism
Published 2024-01-01Get full text
Article -
14
Applying a Machine Learning Method to Detect Changing Neuronal Activity in Seizure Disorders
Published 2025-05-01Get full text
Article -
15
Enhancing knee osteoarthritis detection with AI, image denoising, and optimized classification methods and the importance of physical therapy methods
Published 2025-03-01“…Then, feature selection was made using the neighborhood component analysis (NCA) method for the developed system to produce more successful results, and the optimized feature map was classified into six different classifiers. …”
Get full text
Article -
16
-
17
DOG: An Object Detection Adversarial Attack Method
Published 2025-01-01“…This study presents an object detection adversarial attack method (DOG) based on the dynamic optimization of a multi-scale feature grid cluster, aimed at addressing the challenges of poor transferability in white-box attacks and long generation cycles in black-box attacks within the current adversarial example generation techniques. …”
Get full text
Article -
18
A novel deep learning model based on YOLOv5 optimal method for coal gangue image recognition
Published 2025-05-01“…You Only Look Once version 5 (YOLOv5), with its rapid inference speed and high accuracy, offers a suitable solution for real-time coal gangue detection. This research investigates the application of YOLOv5 for coal gangue image recognition, involving data preprocessing, model training, and optimization. …”
Get full text
Article -
19
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
20
An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network
Published 2020-01-01“…Machine learning and meta-heuristic algorithms are valuable techniques to extract hidden patterns useful for detecting gender of a text. In this paper, an artificial neural network (ANN) is employed as a classifier to detect the gender of an email author and the whale optimization algorithm (WOA) is used to find optimal weights and biases for improving the accuracy of the ANN classification. …”
Get full text
Article