Suggested Topics within your search.
Suggested Topics within your search.
-
2361
MHFS-FORMER: Multiple-Scale Hybrid Features Transformer for Lane Detection
Published 2025-05-01“…Furthermore, a significant drawback of most existing lane-detection algorithms lies in their reliance on complex post-processing and strong prior knowledge. …”
Get full text
Article -
2362
Enhancing credit card fraud detection: highly imbalanced data case
Published 2024-12-01“…Given the inherent imbalance in fraud detection data, feature selection must be done with an enhanced focus. …”
Get full text
Article -
2363
Shifting of Research Trends in Fault Detection and Estimation of Location in Power System
Published 2025-01-01“…Fault detection is a critical process in ensuring the reliability and safety of modern power systems. …”
Get full text
Article -
2364
Detection of Malicious Clients in Federated Learning Using Graph Neural Network
Published 2025-01-01“…However, due to its distributed nature, this paradigm is susceptible to adversarial threats such as sign-flipping attacks, in which malicious clients reverse model parameter signs in order to poison the global aggregation process. This study introduces a detection framework that is graph-based and leverages Graph Attention Networks (GATs) to overcome these challenges. …”
Get full text
Article -
2365
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01“…The analysis revealed vital features significantly impacting malware detection, such as process services, active services, file handles, registry keys, and callback functions. …”
Get full text
Article -
2366
Automated Seizure Detection through EEG Analysis and Deep Learning Technique
Published 2024-06-01“…This is because neurologists are burdened with analyzing electroencephalogram (EEG) data via visual inspection, and automating the process can reduce their workload. However, one of the challenges of automatic seizure detection using EEG analysis is extracting optimal features that can distinguish between different states of epilepsy. …”
Get full text
Article -
2367
Multimodal fusion based few-shot network intrusion detection system
Published 2025-07-01“…Existing few-shot learning methods, while reducing reliance on large datasets, mostly handle single-modality data and fail to fully exploit complementary information across different modalities, limiting detection performance. To address this challenge, we introduce a multimodal fusion based few-shot network intrusion detection method that merges traffic feature graphs and network feature sets. …”
Get full text
Article -
2368
Longitudinal tear detection system for belt conveyor based on deep learning
Published 2025-07-01“…In response to the common problems faced by belt conveyors in the field of longitudinal tear detection, such as high missed detection rate, frequent false alarms, and insufficient intelligence level, we develop an intelligent detection system for longitudinal tearing of strip surfaces that integrates machine vision and line laser technology. …”
Get full text
Article -
2369
Radiographic detection of welding defects based on neural ordinary differential equations
Published 2025-05-01Get full text
Article -
2370
PVLF: point-voxel local feature fusion for 3D detection
Published 2025-06-01“…PVLF explores local spatial features to improve accuracy regarding tiny object detection. To address the potential complex computational issues in the convolution process, we have designed an innovative Adaptive Sparse Convolution (ASC) module that effectively eliminates redundant information in the feature layer. …”
Get full text
Article -
2371
Application of Deep Learning in Food Safety Detection and Risk Early Warning
Published 2025-03-01“…The application of deep learning in food safety detection and risk early warning is becoming more and more extensive, thus providing new opportunities for improving food safety, quality control and authenticity identification. …”
Get full text
Article -
2372
An explainable transformer model for Alzheimer’s disease detection using retinal imaging
Published 2025-07-01“…These findings are compared to existing clinical studies on detecting AD using retinal biomarkers, allowing us to identify the most important features for AD detection in each imaging modality. …”
Get full text
Article -
2373
Analysis and Detection of Four Typical Arm Current Measurement Faults in MMC
Published 2025-07-01“…The entire fault detection process takes less than 20 ms. Finally, the feasibility and effectiveness of the proposed method are validated through MATLAB/Simulink simulations and experimental results.…”
Get full text
Article -
2374
Automatic eddy detection in the MIZ based on YOLO algorithm and SAR images
Published 2025-06-01“…Thus, we explored the feasibility of automating the eddy detection process by applying YOLOv8, a state-of-the-art computer vision model, to high-resolution synthetic aperture radar data, specifically targeting the dynamic region of the Fram Strait. …”
Get full text
Article -
2375
RFID-embedded mattress for sleep disorder detection for athletes in sports psychology
Published 2025-04-01“…A multi-layered mattress design integrates advanced RFID technology with machine learning algorithms—Gaussian process regression (GPR) and linear regression (LR)—to classify postures and detect movement anomalies. …”
Get full text
Article -
2376
An Object Detection Algorithm for Orchard Vehicles Based on AGO-PointPillars
Published 2025-07-01“…With the continuous expansion of the orchard planting area, there is an urgent need for autonomous orchard vehicles that can reduce the labor intensity of fruit farmers and improve the efficiency of operations to assist operators in the process of orchard operations. An object detection system that can accurately identify potholes, trees, and other orchard objects is essential to achieve unmanned operation of the orchard vehicle. …”
Get full text
Article -
2377
ANALYZING EEG SIGNALS FOR STRESS DETECTION USING RANDOM FOREST ALGORITHM
Published 2024-10-01“…Detection of stress using EEG signals has gained much interest because of monitoring and early intervention. …”
Get full text
Article -
2378
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01“…As one of the most widely utilized censorship circumvention systems, Tor faces serious Sybil attacks in bridge distribution.Censors with rich network and human resources usually deploy a large number of Sybils, which disguise themselves as normal nodes to obtain bridges information and block them.In the process, due to the different identities, purposes and intentions of Sybils and normal nodes, individual or group behavior differences occur in network activities, called as node behavior characteristics.To handle the Sybil attacks threat, a Sybil detection mechanism integrating physical-social attributes was proposed based on the analysis of node behavior characteristics.The physical-social attributes evaluation methods were designed.The credit value of nodes objectively reflecting the operation status of bridges on the nodes and the suspicion index of nodes reflecting the blocking status of bridges, were utilized to evaluate the physical attributes of nodes.The social attributes of nodes were evaluated by the social similarity, which described the static attribute labels of nodes and their social trust characterizing the dynamic interaction behaviors of nodes.Furthermore, integrating the physical-social attributes, the credibility of nodes were defined as the possibility of the current node being a Sybil, which was exploited as a guidance on inferring the true identifies of nodes, so as to achieve accurate detection on Sybils.The detection performance of the proposed mechanism based on the constructed Tor network operation status simulator and the Microblog PCU dataset were simulated.The results show that the proposed mechanism can effectively improve the true positive rate on Sybils, and decrease the false positive rate.It also has stronger resistance on the deceptive behavior of censors, and still performs well in the absence of node social attributes.…”
Get full text
Article -
2379
An Earlier Predictive Rollover Index Designed for Bus Rollover Detection and Prevention
Published 2018-01-01Get full text
Article -
2380
JDroid: Android malware detection using hybrid opcode feature vector
Published 2025-07-01“…Experimental results show that the proposed approach has an accuracy value of 98.6% and an area under the curve (AUC) value of 99.6% in malware detection without being affected by the obfuscation process.…”
Get full text
Article