-
1001
Experimental Demonstration of 16-QAM DD-SEFDM With Cascaded BPSK Iterative Detection
Published 2016-01-01“…To simplify the complexity of a spectrally efficient frequency-division multiplexing (SEFDM) system, cascaded binary-phase-shift-keying iterative detection (CBID) is proposed for square <inline-formula> <tex-math notation="LaTeX">$M$</tex-math></inline-formula>-ary quadrature-amplitude-modulation (M-QAM) SEFDM as the first decoding stage, in conjunction with a fixed sphere decoder (FSD). …”
Get full text
Article -
1002
Automatic detection of foreign object intrusion along railway tracks based on MACENet.
Published 2025-01-01“…Ensuring high accuracy and efficiency in foreign object intrusion detection along railway lines is critical for guaranteeing railway operational safety under limited resource conditions. …”
Get full text
Article -
1003
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
1004
An Anomaly Detection Method for Industrial System Cybersecurity Based on GGL-WAVE-CNN
Published 2025-07-01“…Current approaches often struggle to handle complex, unknown topological time series data, thereby necessitating improved anomaly detection accuracy. …”
Get full text
Article -
1005
Integrating ANN and ANFIS for effective fault detection and location in modern power grid
Published 2025-01-01“…The increasing complexity and demand for reliability in modern power systems necessitate advanced techniques for fault detection, classification, and location. …”
Get full text
Article -
1006
Intelligent Casting Quality Inspection Method Integrating Anomaly Detection and Semantic Segmentation
Published 2025-04-01“…Customized optical path design is often required, especially when conducting internal and external defect inspections, which increases overall operational complexity and reduces inspection efficiency. We developed an automated optical inspection (AOI) system to address these challenges. …”
Get full text
Article -
1007
Effects of Ageing and Sex on Complexity in the Human Sleep EEG: A Comparison of Three Symbolic Dynamic Analysis Methods
Published 2019-01-01“…All three SDA techniques distinguished the vigilance states (i.e., wakefulness, REM sleep, NREM sleep, and its sub-stages: stage 1, stage 2, and slow wave sleep). Complexity of the sleep EEG increased with ageing. Sex on the other hand did not affect the complexity values assessed with any of these three SDA methods, even though FFT detected sex differences. …”
Get full text
Article -
1008
Research on Defect Detection in Lightweight Photovoltaic Cells Using YOLOv8-FSD
Published 2025-01-01“…Given the high computational complexity and poor real-time performance of current photovoltaic cell surface defect detection methods, this study proposes a lightweight model, YOLOv8-FSD, based on YOLOv8. …”
Get full text
Article -
1009
ITD-YOLO: An Improved YOLO Model for Impurities in Premium Green Tea Detection
Published 2025-04-01“…To solve this technical problem in the industry, this article proposes a lightweight algorithm for detecting and sorting impurities in premium green tea in order to improve sorting efficiency and reduce labor intensity. …”
Get full text
Article -
1010
-
1011
Outlier detection algorithm based on fast density peak clustering outlier factor
Published 2022-10-01“…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
Get full text
Article -
1012
Outlier detection algorithm based on fast density peak clustering outlier factor
Published 2022-10-01“…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
Get full text
Article -
1013
Multi-Scale Construction Site Fire Detection Algorithm with Integrated Attention Mechanism
Published 2025-06-01“…To address the issues of large target-scale variations and frequent false detections in construction site fire monitoring, we propose a fire detection algorithm based on an improved YOLOv8 model, achieving real-time and efficient detection of fires on construction sites. …”
Get full text
Article -
1014
Quantitative Detection of Water Content of Winter Jujubes Based on Spectral Morphological Features
Published 2025-02-01“…The spectral information extracted from hyperspectral images is characterized by redundancy and complexity, while the spectral morphological features extracted from the spectral information help to simplify the data and provide rich information about the material composition. …”
Get full text
Article -
1015
-
1016
Dynamic Aerial Small Target Detection Algorithm Based on Compound Zoom Scaling
Published 2025-04-01“…Experiments conducted on the VisDrone2019 UAV aerial ima-gery dataset demonstrate that the proposed algorithm improves mAP by 2.1%, reduces FLOPs by 32.5%, and decreases computational complexity, resulting in superior detection performance.…”
Get full text
Article -
1017
Towards real-time interest point detection and description for mobile and robotic devices
Published 2024-09-01“…This paper demonstrates how techniques, developed for other CNN use cases, can be integrated into interest point detection and description systems to compress their network size and reduce the computational complexity; this reduces the barrier to their uptake in computationally challenged environments. …”
Get full text
Article -
1018
Anomaly detection and removal strategies for in-line permittivity sensor signal used in bioprocesses
Published 2025-07-01“…Trivial approaches, such as moving average filtering, do not adequately capture the complexity of the problem. However, our method provides a structured solution through three consecutive steps: 1) Signal preprocessing to reduce noise and eliminate context dependency; 2) Anomaly detection using threshold-based identification; 3) Validation and removal of identified anomalies.Results and discussionWe demonstrate that our approach effectively detects and removes anomalies by compensating signal shift value, while remaining computationally efficient and practical for real-time use. …”
Get full text
Article -
1019
Vehicle detection in drone aerial views based on lightweight OSD-YOLOv10
Published 2025-07-01“…Compared to other YOLO series and lightweight models, OSD-YOLOv10 exhibits superior detection accuracy and lower computational complexity, achieving an optimal balance between high accuracy and low resource consumption. …”
Get full text
Article -
1020
Hierarchical Mixed-Precision Post-Training Quantization for SAR Ship Detection Networks
Published 2024-10-01“…Post-training quantization (PTQ) provides an efficient method for pre-training neural networks to effectively reduce memory and computational resources without retraining. …”
Get full text
Article