-
361
Method for extracting ship shaft rate features by fusing acoustic and magnetic field
Published 2025-07-01“…Abstract To address the challenge of detecting small underwater targets, this paper proposes a detection method based on the fusion of acoustic and magnetic fields. …”
Get full text
Article -
362
Current Problems of the Forensic Analysis of Handwriting and Signatures Made with Modern Technical Means
Published 2022-08-01Get full text
Article -
363
Features of the development and clinical course of pneumothorax in patients with a new coronavirus infection
Published 2022-10-01“…New coronavirus infection (COVID-19) is a modern global problem that requires the rapid development of diagnostic and treatment methods, as well as the study of pathological effects on body tissues. …”
Get full text
Article -
364
Vehicle Detection and Shape Refinement Based on LiDAR
Published 2022-12-01“…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
Get full text
Article -
365
Application of artificial intelligence in ophthalmology for solving the problem of semantic segmentation of fundus images
Published 2023-10-01“…Basic problems of using the neural network approach in biomedicine are formulated. …”
Get full text
Article -
366
Algorithm for Recognition of Small Air Targets by Trajectory Features in Passive Bistatic Radar
Published 2023-11-01“…Development of an algorithm for recognizing small air targets by trajectory features based on machine learning. Implementation and evaluation of the quality of decision-making methods in a given recognition problem. …”
Get full text
Article -
367
Good Apples / Bad Apples: Detection and classification of damage
Published 2024-05-01“…Parameters of the segment anything algorithm are evaluated for this problem domain and appropriateness of algorithm features is discussed for the real problem, obtaining directions for algorithmic improvement.…”
Get full text
Article -
368
To the problem of extended serological testing for viral hepatitis B in rheumatoid arthritis patients
Published 2025-01-01Get full text
Article -
369
The admissible amount of borrowings as a problem of organization of research work and of quality control
Published 2018-11-01“…Another possible problem comes when the part of the borrowings fits those frames while the appropriateness of quotations remains questionable.The data on the borrowed volumes received by the primary computer plagiarism test cannot be considered objective if the volume of text taken by one author from another one’s work is viewed.To detect the degree of borrowings (either correct or incorrect) the report of the system on each of the documents is to be verified by the specialist. …”
Get full text
Article -
370
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
371
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
372
Improved printed circuit board defect detection scheme
Published 2025-01-01“…Abstract In this paper, an improved printed circuit board(PCB)defect detection scheme named PD-YOLOv8 is proposed, which is specialized in the common and challenging problem of small target recognition in PCB inspection. …”
Get full text
Article -
373
Encrypted malicious traffic detection based on neural network
Published 2025-03-01“…A scalable window self-attention mechanism is designed, and the Transfomer neural network model is used to classify feature maps, achieving efficient detection of malicious traffic.Experimental results show that this method performs well in detection accuracy, recall rate, and model robustness, and provides a feasible solution to the problem of malicious behavior detection in encrypted traffic.…”
Get full text
Article -
374
Integrating Correlation-Based Feature Selection and Clustering for Improved Cardiovascular Disease Diagnosis
Published 2018-01-01“…The obtained effects have been evaluated regarding the number of detected dependencies between parameters. Experiment results showed the advantage of the presented approach compared to other feature selection methods and without using clustering to support statistical inference.…”
Get full text
Article -
375
Psychological Stress Detection Using Transformer-Based Models
Published 2024-06-01“…Stress is a significant mental health problem that results in a lack of concentration. It has been more widely identified through social media since people who are under stress usually post about their physical pain and tiredness. …”
Get full text
Article -
376
On the effect of sampling frequency on the electricity theft detection performance
Published 2022-12-01“…Abstract Electricity theft is a common problem in many countries and affects the revenue of the electricity industry significantly. …”
Get full text
Article -
377
Fire and Smoke Detection Based on Improved YOLOV11
Published 2025-01-01“…Traditional object detection methods rely more on manually designed features and rules. …”
Get full text
Article -
378
A New Method for Weak Fault Feature Extraction Based on Improved MED
Published 2018-01-01“…Because of the characteristics of weak signal and strong noise, the low-speed vibration signal fault feature extraction has been a hot spot and difficult problem in the field of equipment fault diagnosis. …”
Get full text
Article -
379
Automatic Fall Risk Detection Based on Imbalanced Data
Published 2021-01-01“…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
Get full text
Article -
380
DISEASES OF THE GENITOURINARY SYSTEM IN HIV INFECTION–A NEW PROBLEM OF MODERN UROLOGY
Published 2016-01-01Get full text
Article