Suggested Topics within your search.
Suggested Topics within your search.
-
1881
Online Meta-Recommendation of CUSUM Hyperparameters for Enhanced Drift Detection
Published 2025-04-01“…The Cumulative Sum (CUSUM) method, based on calculating the cumulative values within a time series, is commonly used for change detection due to its early detection of small drifts, simplicity, low computational cost, and robustness to noise. …”
Get full text
Article -
1882
Infrared Detection of Substation Objects Using the Visible Light Spectrum
Published 2025-03-01“…Our proposed method allows using an object detector with results comparable to other works that performed detection directly on the infrared domain while requiring no significant changes to the model architecture. …”
Get full text
Article -
1883
AN ITERATIVE PROCEDURE FOR OUTLIER DETECTION IN GSTAR(1;1) MODEL
Published 2022-09-01“…The process is repeated by detecting outliers and adding them to the model until a GSTAR model is obtained with no outliers detected. …”
Get full text
Article -
1884
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…Following an examination of numerous publicly known Java deserialization vulnerabilities, a runtime detection-based defense technology solution for Java deserialization vulnerabilities was proposed. …”
Get full text
Article -
1885
Ripe Tomato Detection Algorithm Based on Improved YOLOv9
Published 2024-11-01“…To ensure the accuracy of inspection results, You Only Look Once version 9 (YOLOv9) has been explored as a fruit detection algorithm. To tackle the challenge of identifying tomatoes and the low accuracy of small object detection in complex environments, we propose a ripe tomato recognition algorithm based on an enhanced YOLOv9-C model. …”
Get full text
Article -
1886
Dog facial landmarks detection and its applications for facial analysis
Published 2025-07-01“…We additionally provide a benchmark for dog facial landmarks detection and demonstrate two case studies for landmark detection models trained on the DogFLW. …”
Get full text
Article -
1887
Non-Destructive Detection of Fruit Quality: Technologies, Applications and Prospects
Published 2025-06-01“…Fruit quality testing plays a crucial role in the advancement of fruit industry, which is related to market competitiveness, consumer satisfaction and production process optimization. In recent years, nondestructive testing technology has become a research hotspot due to its outstanding advantages. …”
Get full text
Article -
1888
Nighttime Vehicle Detection Algorithm Based on Improved YOLOv7
Published 2025-01-01“…Second, a lightweight efficient feature fusion network (GS-EFF) is constructed to optimize multi-scale feature alignment by combining the jump connection and GSConv modules to reduce the information loss in the feature fusion process and lower the number of parameters. The Soft-EloU-NMS post-processing algorithm is further proposed to effectively reduce the leakage detection rate of dense small targets by fusing the multi-dimensional evaluation of overlap, center distance and aspect ratio. …”
Get full text
Article -
1889
Electrochemical Detection of Sequence-Specific DNA with the Amplification of Gold Nanoparticles
Published 2011-01-01“…Scanning electron microscopy (SEM) and electrochemical impedance spectra (EIS) were used to investigate the film assembly process. The DNA hybridization events were monitored by differential pulse voltammetry (DPV), and adriamycin was used as the electrochemical indicator. …”
Get full text
Article -
1890
Road Damage Detection Using Yolov9-Based Imagery
Published 2025-05-01“…An annotated dataset of road images was used during the model training and testing process. The results show that the YOLOv9 model can accurately detect road damage. …”
Get full text
Article -
1891
Verification of the Reliability of an Automated Urine Test Strip Colorimetric Program Using Colorimetric Analysis: Survey Study
Published 2025-01-01“…The image taken with a smartphone camera on top of the photography box was judged by this program. This program used Accelerated KAZE to perform image-matching processing to reduce the effect of misalignment during photography. …”
Get full text
Article -
1892
Calibration and uncertainty quantification for deep learning-based drought detection
Published 2025-06-01“…Deep learning models have recently succeeded in detecting extreme climate events and promise to uncover and understand droughts further. …”
Get full text
Article -
1893
Prospects for detecting the couplings of axion-like particle with neutrinos at the CEPC
Published 2024-10-01“…Abstract We explore the possibility of detecting the couplings of axion-like particle (ALP) with leptons from their loop-level impact on the ALP couplings to electroweak (EW) gauge bosons via the signal process at the circular electron positron collider (CEPC) and obtain prospective sensitivities to the ALP-lepton couplings. …”
Get full text
Article -
1894
Detecting phishing gangs via taint analysis on the Ethereum blockchain
Published 2023-01-01“…Experimental results indicate that the proposed framework can be used to build a uniform platform to monitor every account on the Ethereum blockchain for early warning of phishing scams and detection of the phishers' money laundering and cashing process.…”
Get full text
Article -
1895
Optimized Detection Algorithm for Vertical Irregularities in Vertical Curve Segments
Published 2024-11-01“…The inertial reference method was then applied to process the acceleration and relative displacement data between the detection beam and the track, yielding virtual irregularities. …”
Get full text
Article -
1896
Study on PV Defect Detection Based on CWE YOLOv8
Published 2025-01-01“…A lightweight EfficientHead detection head is also introduced to boost the model’s accuracy and robustness in complex detection scenarios. …”
Get full text
Article -
1897
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
1898
Knowledge Error Detection via Textual and Structural Joint Learning
Published 2025-02-01“…Current methods for knowledge graph error detection primarily focus on graph structure and overlook the importance of textual information in error detection. …”
Get full text
Article -
1899
A Method for Detecting Tomato Maturity Based on Deep Learning
Published 2024-11-01“…The modeling of global and local information is realized through the self-attention mechanism, which improves the generalization ability and feature extraction ability of the model, thereby bringing higher detection accuracy. Secondly, the C2f convolution in the neck section is replaced with Distribution Shifting Convolution, so that the model can better process spatial information and further improve the object detection accuracy. …”
Get full text
Article -
1900
Myocarditis Detection Using Proximal Policy Optimization and Mutual Learning
Published 2024-09-01“…To address class imbalance, a proximal policy optimization (PPO)-based algorithm is utilized, significantly improving the training process by preventing abrupt policy shifts and stabilizing them. …”
Get full text
Article