-
101
Optimizing Sensor Placement for Event Detection: A Case Study in Gaseous Chemical Detection
Published 2025-04-01“…In dynamic industrial environments, strategic sensor placement is key to accurately monitoring equipment and detecting critical events. Despite progress in Industry 4.0 and the Internet of Things, research on optimal sensor placement remains limited. …”
Get full text
Article -
102
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
Published 2025-06-01“…After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. …”
Get full text
Article -
103
A Drilling Debris Tracking and Velocity Measurement Method Based on Fine Target Feature Fusion Optimization
Published 2025-08-01Get full text
Article -
104
-
105
Detection and Optimization of Traffic Networks Based on Voronoi Diagram
Published 2021-01-01“…We present a traffic peak detection method, which constructs the Voronoi diagram of the input traffic flow data and computes the prominence of candidate peak points using the diagram. …”
Get full text
Article -
106
Adaptive weight optimization with large pretraining for pest detection
Published 2025-12-01“…Herein, we propose an adaptive weight optimization method based on transfer learning for multimodal pest detection. …”
Get full text
Article -
107
Optimizing screening procedures for early detection of glycemic disorders
Published 2014-03-01“…To estimate the actual prevalence of type 2 diabetes mellitus (T2DM) and prediabetes in individuals at high risk for T2DM and to develop an optimized stepwise screening procedure. Materials and Methods. …”
Get full text
Article -
108
Hybrid metaheuristic optimization for detecting and diagnosing noncommunicable diseases
Published 2025-03-01“…Abstract In our data-driven world, the healthcare sector faces significant challenges in the early detection and management of Non-Communicable Diseases (NCDs). …”
Get full text
Article -
109
-
110
Initial evaluation of a state-wide multi-method survey to estimate koala occupancy and abundance
Published 2025-07-01“…We evaluated how these methods, individually and combined, influenced koala detection, occupancy, and relative abundance-related performance criteria to optimise the state-wide koala survey. …”
Get full text
Article -
111
-
112
A Coverage-Based Cooperative Detection Method for CDUAV: Insights from Prediction Error Pipeline Modeling
Published 2025-05-01“…To address the challenges of detection and acquisition caused by trajectory prediction errors during the midcourse–terminal guidance handover phase in cross-domain unmanned aerial vehicles (CDUAV), this study proposes a collaborative multi-interceptor detection coverage optimization method based on predictive error pipeline modeling. …”
Get full text
Article -
113
Optimization of Parameters and Comparison of Detection Signals for Planar Coil Particle Detection Sensors with Different Core Materials
Published 2024-12-01“…We obtain the sensor structure after optimizing the magnetic field. The sensor is made using experimental methods, and the iron particles and copper particles are detected. …”
Get full text
Article -
114
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
115
-
116
A PERFORMANCE-BASED APPROACH TO AIRSPACE OPTIMIZATION USING WIND-OPTIMAL TRACKS NETWORK IN HO CHI MINH FIR
Published 2025-06-01Subjects: “…optimization method…”
Get full text
Article -
117
GreyWolfLSM: an accurate oil spill detection method based on level set method from synthetic aperture radar imagery
Published 2022-12-01Subjects: “…Oil spill detection…”
Get full text
Article -
118
Lightweight blasthole image detection and positioning method
Published 2025-03-01Get full text
Article -
119
-
120
Model updating method for detect and localize structural damage using generalized flexibility matrix and improved grey wolf optimizer algorithm (I-GWO)
Published 2025-07-01“…Furthermore, they show that when compared to grey wolf optimizer (GWO) and particle swarm optimizer (PSO), I-GWO can offer a dependable method for precisely detecting damage.…”
Get full text
Article