-
101
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
Published 2025-06-01“…After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. …”
Get full text
Article -
102
-
103
-
104
Adaptive weight optimization with large pretraining for pest detection
Published 2025-12-01“…Herein, we propose an adaptive weight optimization method based on transfer learning for multimodal pest detection. …”
Get full text
Article -
105
Detection and Optimization of Traffic Networks Based on Voronoi Diagram
Published 2021-01-01“…We present a traffic peak detection method, which constructs the Voronoi diagram of the input traffic flow data and computes the prominence of candidate peak points using the diagram. …”
Get full text
Article -
106
Optimizing screening procedures for early detection of glycemic disorders
Published 2014-03-01“…To estimate the actual prevalence of type 2 diabetes mellitus (T2DM) and prediabetes in individuals at high risk for T2DM and to develop an optimized stepwise screening procedure. Materials and Methods. …”
Get full text
Article -
107
Hybrid metaheuristic optimization for detecting and diagnosing noncommunicable diseases
Published 2025-03-01“…Abstract In our data-driven world, the healthcare sector faces significant challenges in the early detection and management of Non-Communicable Diseases (NCDs). …”
Get full text
Article -
108
Initial evaluation of a state-wide multi-method survey to estimate koala occupancy and abundance
Published 2025-07-01“…We evaluated how these methods, individually and combined, influenced koala detection, occupancy, and relative abundance-related performance criteria to optimise the state-wide koala survey. …”
Get full text
Article -
109
Optimization of Parameters and Comparison of Detection Signals for Planar Coil Particle Detection Sensors with Different Core Materials
Published 2024-12-01“…We obtain the sensor structure after optimizing the magnetic field. The sensor is made using experimental methods, and the iron particles and copper particles are detected. …”
Get full text
Article -
110
A Coverage-Based Cooperative Detection Method for CDUAV: Insights from Prediction Error Pipeline Modeling
Published 2025-05-01“…To address the challenges of detection and acquisition caused by trajectory prediction errors during the midcourse–terminal guidance handover phase in cross-domain unmanned aerial vehicles (CDUAV), this study proposes a collaborative multi-interceptor detection coverage optimization method based on predictive error pipeline modeling. …”
Get full text
Article -
111
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
112
-
113
Depression Detection and Diagnosis Based on Electroencephalogram (EEG) Analysis: A Systematic Review
Published 2025-01-01Subjects: “…mild depression disorder (MDD) detection…”
Get full text
Article -
114
GreyWolfLSM: an accurate oil spill detection method based on level set method from synthetic aperture radar imagery
Published 2022-12-01Subjects: “…Oil spill detection…”
Get full text
Article -
115
Lightweight blasthole image detection and positioning method
Published 2025-03-01Get full text
Article -
116
-
117
Identifying key drivers of heatwaves: A novel spatio-temporal framework for extreme event detection
Published 2025-09-01Get full text
Article -
118
Model updating method for detect and localize structural damage using generalized flexibility matrix and improved grey wolf optimizer algorithm (I-GWO)
Published 2025-07-01“…Furthermore, they show that when compared to grey wolf optimizer (GWO) and particle swarm optimizer (PSO), I-GWO can offer a dependable method for precisely detecting damage.…”
Get full text
Article -
119
Corrections to “An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network”
Published 2024-01-01“…Presents corrections to the paper, (Corrections to “An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network”).…”
Get full text
Article -
120