-
1741
SD-YOLOv8: SAM-Assisted Dual-Branch YOLOv8 Model for Tea Bud Detection on Optical Images
Published 2025-03-01“…This demonstrates its superior capability in efficiently detecting tea buds against complex backgrounds. …”
Get full text
Article -
1742
Early Detection of Alzheimer’s Disease: An Extensive Review of Advancements in Machine Learning Mechanisms Using an Ensemble and Deep Learning Technique
Published 2023-12-01“…The findings of this study contribute significantly to the field of AD diagnoses and pave the way for more precise and efficient early detection strategies.…”
Get full text
Article -
1743
Underwater Magnetic Sensors Network
Published 2025-04-01“…This study explores the design and performance of an underwater magnetic sensor network (UMSN) tailored for intrusion detection in complex environments such as riverbeds and areas with dense vegetation. …”
Get full text
Article -
1744
A Scalable Framework for Real-Time Network Security Traffic Analysis and Attack Detection Using Machine and Deep Learning
Published 2025-04-01“…This dual approach of real-time and static analysis provides a robust foundation for developing scalable, efficient, and automated security solutions, essential for managing the evolving threats in modern networks.…”
Get full text
Article -
1745
Evaluating model generalization for cow detection in free-stall barn settings: Insights from the COw LOcalization (COLO) dataset
Published 2025-08-01“…This study investigates the generalization capabilities of object detection models for cow detection in indoor free-stall barn settings, focusing on varying training data characteristics such as view angles and lighting, and model complexities. …”
Get full text
Article -
1746
FED-GEM-CN: A federated dual-CNN architecture with contrastive cross-attention for maritime radar intrusion detection
Published 2025-09-01“…These findings substantiate the efficacy of the proposed system in delivering robust, energy-efficient, and privacy-aware intrusion detection tailored to the constraints of maritime radar networks. …”
Get full text
Article -
1747
Multi-Modal Dynamic Fusion for Defect Detection in Electronic Products: A Novel Approach Based on Energy and Deep Learning
Published 2025-01-01“…Conventional defect detection approaches, which typically depend on a single modality, often fall short in both efficiency and reliability. …”
Get full text
Article -
1748
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Published 2025-02-01“…The model employs classifiers such as Decision Tree Classifier, Random Forest Classifier (RFC), and gradient boosting techniques like XGBoost (XGBC) to enhance detection accuracy and efficiency. The proposed hybrid (KMS + PCA + RFC) approach achieves remarkable performance, with an accuracy of 99.94% and an f1-score of 99.94% on the WSN-DS dataset. …”
Get full text
Article -
1749
Enhanced framework for credit card fraud detection using robust feature selection and a stacking ensemble model approach
Published 2025-06-01“…With the increase in online payment volumes, conventional fraud detection technologies are increasingly confronted by the complexity of fraudulent strategies that require intelligent and scalable alternatives. …”
Get full text
Article -
1750
Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit
Published 2025-01-01“…The emergence of machine learning and deep learning models has enhanced the feasibility of hardware Trojan detection, as these models can learn complex patterns and representations from extensive datasets. …”
Get full text
Article -
1751
A Small-Sample Target Detection Method of Side-Scan Sonar Based on CycleGAN and Improved YOLOv8
Published 2025-02-01“…Because of their low cost and ease of deployment, side-scan sonars is one of the most widely used underwater survey instruments. However, the complexity of the marine environment and the difficulty in target acquisition limit the detection accuracy of side-scan sonars. …”
Get full text
Article -
1752
-
1753
High-resolution accurate mass- mass spectrometry based- untargeted metabolomics: Reproducibility and detection power across data-dependent acquisition, data-independent acquisition...
Published 2025-01-01“…Here, we compare three acquisition modes—Data-Dependent Acquisition (DDA), Data-Independent Acquisition (DIA), and AcquireX —to evaluate performance and reproducibility in detecting low-abundance metabolites in a complex matrix. …”
Get full text
Article -
1754
Non-Destructive Detection of Fillet Fish Quality Using MQ135 Gas Sensor and Neutrosophic Logic-Enhanced System
Published 2025-04-01“…This integration enhances decision-making by accurately modeling complex real-world uncertainties. These methods, combining electronic nose technology, artificial intelligence, and neutrosophic inference, provide a robust, non-destructive, and cost-effective approach to detecting spoilage in fillet fish. …”
Get full text
Article -
1755
BlockDroid: detection of Android malware from images using lightweight convolutional neural network models with ensemble learning and blockchain for mobile devices
Published 2025-05-01“…Because these methods can automatically extract meaningful features from data and efficiently learn complex relationships, they can achieve better performance in malware detection as well as in solving many other problems. …”
Get full text
Article -
1756
A Novel Convolutional Neural Network–Long Short-term Memory Model for Interplanetary Coronal Mass Ejection Detection
Published 2025-01-01“…This study presents a convolutional neural network–long short-term memory (CNN-LSTM) model with dynamic loss function, designed to efficiently process complex multidimensional spatiotemporal data. …”
Get full text
Article -
1757
Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge
Published 2025-01-01“…Its protocol-agnostic design and customized preprocessing method enable it to efficiently detect network attacks across multiple protocols while preserving the original packet structure. …”
Get full text
Article -
1758
Secure Quantum Communication With Multi-Users in Quantum Networks
Published 2025-01-01“…The performance of the system has been analyzed with metrics like detection accuracy of eavesdrop attack (97%), communication complexity (95%), effective key rate (590 b/s), communication efficiency (96%), and computational overhead (98%). …”
Get full text
Article -
1759
Towards precision diagnosis: a novel hybrid DC-CAD model for lung disease detection leveraging multi-scale capsule networks and temporal dynamics
Published 2025-05-01“…Abstract The early detection of lung diseases, including cancer, is essential for improving patient outcomes. …”
Get full text
Article -
1760
Identifying All Matches of a Rigid Object in an Input Image Using Visible Triangles
Published 2025-03-01“…It has been suggested that for objects identifiable by their corners, every triangle formed by these corner points can serve as a reference for detecting other corner points. This approach enables effective rigid object detection, including partial matches. …”
Get full text
Article