-
321
A Context-Aware Doorway Alignment and Depth Estimation Algorithm for Assistive Wheelchairs
Published 2025-07-01“…These challenges highlight a pressing need for intelligent doorway detection algorithm for assistive wheelchairs that go beyond traditional object detection. …”
Get full text
Article -
322
-
323
Low-Voltage Alternating Current Series Arc Fault Detection Using Periodic Background Subtraction and Linear Dividing Lines
Published 2025-01-01“…To address the challenges in fully expressing the fault features of low-voltage series arcs and the limitations of existing detection algorithms, this paper proposes a novel method combining periodic background subtraction and linear dividing lines for detecting arc faults. …”
Get full text
Article -
324
Bayesian Denoising Algorithm for Low SNR Photon-Counting Lidar Data via Probabilistic Parameter Optimization Based on Signal and Noise Distribution
Published 2025-06-01“…The Ice, Cloud, and land Elevation Satellite-2 has provided unprecedented global surface elevation measurements through photon-counting Lidar (Light detection and ranging), yet its low signal-to-noise ratio (SNR) poses significant challenges for denoising algorithms. …”
Get full text
Article -
325
High-Precision and Low-Complexity Symbol Synchronization Algorithm Based on Dual-Threshold Amplitude Decision for Real-Time IMDD OFDM-PON
Published 2019-01-01“…We propose a low-complexity and high-precision symbol synchronization algorithm based on dual-threshold amplitude decision for field programmable gate array-based real-time intensity modulation direct detection orthogonal frequency division multiplexing-passive optical network (OFDM-PON) system. …”
Get full text
Article -
326
An Accurate GNSS Spoofing Detection Method Based on Multiscale Eye Diagrams
Published 2025-02-01“…Spoofing detection is critical for GNSS security. To address the issues of low detection rates and insufficient coverage in traditional methods, this study proposes an eye diagram detection method based on the multiscale Canny algorithm with minimum misjudgment probability (EDDM-MSC-MMP). …”
Get full text
Article -
327
TPNet: A High-Performance and Lightweight Detector for Ship Detection in SAR Imagery
Published 2025-04-01Get full text
Article -
328
-
329
Research on dimension measurement algorithm for parcel boxes in high-speed sorting system
Published 2025-07-01“…In this paper, we propose a 3D localization algorithm for rectangular packaging boxes based on deep learning, and design a lightweight parcel box detection model, the Efficient Object detection Network (EODNet). …”
Get full text
Article -
330
Post-integration based point-line feature visual SLAM in low-texture environments
Published 2025-04-01“…Abstract To address the issues of weak robustness and low accuracy of traditional SLAM data processing algorithms in weak texture environments such as low light and low contrast, this paper first studies and improves the data feature extraction method, optimizing the AGAST-based feature extraction algorithm to adaptively adjust the extraction threshold according to the gradient size of different data features. …”
Get full text
Article -
331
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
332
Computationally Enhanced UAV-Based Real-Time Pothole Detection Using YOLOv7-C3ECA-DSA Algorithm
Published 2025-01-01“…Although YOLO-based algorithms have been widely adopted for their speed and efficiency in object detection, achieving a balance between high accuracy and low inference time remains a challenge, particularly in scenarios involving small objects and complex features. …”
Get full text
Article -
333
Passive indoor human daily behavior detection method based on channel state information
Published 2019-04-01“…The daily behavior detection of indoor human based on CSI is developing rapidly in the field of WSN.At present,most of the research is still in the environment of 2.4 GHz,so the detection rate,robustness and overall performance still need to be improved.In order to solve this problem,a passive indoor human behavior detection method HDFi (Human Detection with Wi-Fi) based on CSI signal was proposed.The method was used to detect the indoor human daily behavior in a 5 GHz band environment,which was divided into three steps:data acquisition,data processing,feature extraction,online detection.Firstly,the experiment collected typical daily behavioral data in complex laboratory and relatively empty meeting room.Secondly,the amplitude and phase data with more obvious features were extracted and processed by low-pass filtering to obtain a set of stable and noise-free data,and then the fingerprint database was established effectively.Finally,in the real-time detection stage,the collected data features were classified by SVM algorithm to extract more stable eigenvalues,and a classification model of indoor human daily behavior detection was established,and then matched the data in the fingerprint database.The experimental results show that the proposed method has the characteristics of high efficiency,high precision and good robustness,and the method does not need any testing personnel to carry any electronic equipment,so it has high practicability.…”
Get full text
Article -
334
-
335
-
336
Hate Speech Detection and Online Public Opinion Regulation Using Support Vector Machine Algorithm: Application and Impact on Social Media
Published 2025-04-01“…In this study, the SVM (Support Vector Machine) algorithm is used to map text features from low-dimensional to high-dimensional space using kernel function techniques to meet complex nonlinear classification challenges. …”
Get full text
Article -
337
Multi-Robot Cooperative Simultaneous Localization and Mapping Algorithm Based on Sub-Graph Partitioning
Published 2025-05-01“…Specifically, in front-end loop detection, the proposed algorithm achieves an F1-score improvement of approximately 8.5–51.5% compared to other methods. …”
Get full text
Article -
338
Abnormal behavior detection method of fish school under low dissolved oxygen stress based on image processing and compressed sensing
Published 2018-07-01“…In order to overcome the time-consuming and laborious problems of artificial observation, we proposed an automatic detection method of abnormal behavior of fish school under low dissolved oxygen stress based on image processing and compressed sensing algorithm. …”
Get full text
Article -
339
An NN Framework for Target Number Detection in FMCW Radar Systems via Hankelization: A Low-Dimensional Data Representation Perspective
Published 2025-01-01“…In this paper, we introduce a novel neural network (NN)-based algorithm that significantly improves the target number detection in frequency modulated continuous wave (FMCW) radar systems. …”
Get full text
Article -
340