-
21
A robust cyclic-feature detection against noise uncertainty
Published 2016-10-01“…However, noise uncertainty will degrade its performance severely. Aiming at this problem, a cyclic-feature detection method resisting to noise uncertainty was proposed. …”
Get full text
Article -
22
SIFT Feature-Based Video Camera Boundary Detection Algorithm
Published 2021-01-01“…Aiming at the problem of low accuracy of edge detection of the film and television lens, a new SIFT feature-based camera detection algorithm was proposed. …”
Get full text
Article -
23
Bacterial Disease Detection of Cherry Plant Using Deep Features
Published 2024-04-01“…These machine learning-based features have been used for the detection of bacteria-based diseases commonly seen on the leaves of cherry plants. …”
Get full text
Article -
24
Impact of Lexical Features on Answer Detection Model in Discussion Forums
Published 2021-01-01“…However, this study proposed an answer detection model that is exclusively relying on lexical features and employs a random forest classifier for classification of answers in discussion boards. …”
Get full text
Article -
25
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature
Published 2025-03-01“…A cross-architecture vulnerability detection method combining semantic and attribute feature is proposed. …”
Get full text
Article -
26
Exploiting Full-Scale Feature for Remote Sensing Object Detection Based on Refined Feature Mining and Adaptive Fusion
Published 2021-01-01“…Object detection for remote sensing images remains a challenging problem. …”
Get full text
Article -
27
Enhancing Facial Feature Detection: Hybrid Active Shape and Active Appearance Model (HASAAM)
Published 2024-01-01“…The aim of the HASAAM integrated fitting model is to find new solutions for the feature identification issue by combining the strengths of the Active Shape Model (ASM) and Active Appearance Model (AAM) to provide unique findings on the feature detection problem. …”
Get full text
Article -
28
The Problem of Detecting Incitement in Extremist Content (Using Examples from the Internet)
Published 2019-10-01Get full text
Article -
29
Method of detecting IRC Botnet based on the multi-features of traffic flow
Published 2013-10-01Get full text
Article -
30
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
31
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
32
Deep blur detection network with boundary-aware multi-scale features
Published 2022-12-01“…To solve this problem, we newly establish a boundary-aware multi-scale deep network in this paper. …”
Get full text
Article -
33
The Impact of Feature Extraction in Random Forest Classifier for Fake News Detection
Published 2024-12-01“…This research focuses on detecting and classifying fake news using the Random Forest algorithm by investigating the impact of feature extraction techniques on classification accuracy, this study specifically employs the TF-IDF method. …”
Get full text
Article -
34
Straight Line Features Detection and Mosaic of Wind Power Blades Image
Published 2020-10-01“…A splicing method based on line features is proposed to solve this problem. This method first detects straight lines in the images of the wind power blade, then selects the deduplication as the feature for image registration, and finally splices the blade image according to translation rotation matrix.Experimental results show that the proposed method shows strong robustness and stability in complex situations such as single structure, small coincidence degree and diverse backgroundstability.…”
Get full text
Article -
35
Surface Defect Detection Based on Adaptive Multi-Scale Feature Fusion
Published 2025-03-01“…However, the diversity of defects and the presence of complex backgrounds bring significant challenges to salient object detection. To this end, this study proposes a new adaptive multi-scale feature fusion network (AMSFF-Net) to solve the SOD problem of object surface defects. …”
Get full text
Article -
36
Infrared dim tiny-sized target detection based on feature fusion
Published 2025-02-01“…These two main modules are employed as the core to form a feature fusion network to realize the detection of infrared dim tiny-sized targets. …”
Get full text
Article -
37
Camouflage Target Detection Method with Mutual Compensation of Local-Global Features
Published 2025-02-01“…In response to the above problems, this paper proposes a camouflaged target detection method based on local-global feature mutual compensation, which uses local features and global features to compensate for each other to detect camouflaged targets. …”
Get full text
Article -
38
Webshell malicious traffic detection method based on multi-feature fusion
Published 2021-12-01“…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
Get full text
Article -
39
Multi-Scale Feature Fusion Model for Bridge Appearance Defect Detection
Published 2024-03-01“…To deal with these issues, this paper proposes a novel Multi-scale Feature Fusion (MFF) model for bridge appearance disease detection. …”
Get full text
Article -
40
Investigating feature extraction by SIFT methods for prostate cancer early detection
Published 2025-03-01“…This study, therefore, highlights the potential for use in the early detection of prostate cancer with advanced feature extraction methods, such as SIFT, and points toward a very promising direction of further research on applying computer vision techniques to problems in medical diagnostic applications. …”
Get full text
Article