-
161
TFC: A Series of Band Selection Methods for Hyperspectral Target Detection
Published 2025-01-01“…According to the different method for solving constrained optimization problem, the TFC methods are divided into TFC-MP (TFC-Matching Pursuit), TFC-OMP (TFC-Orthogonal Matching Pursuit) and TFC-StOMP (TFC-Stagewise Orthogonal Matching Pursuit) methods. …”
Get full text
Article -
162
Comparative analysis of adaptive and general labeling methods for soybean leaf detection
Published 2025-06-01“…This study examines the influence of different labeling methods on the efficiency of artificial intelligence (AI) based soybean leaf detection. …”
Get full text
Article -
163
Investigating feature extraction by SIFT methods for prostate cancer early detection
Published 2025-03-01“…This research study, therefore, seeks to explore the effectiveness of the SIFT method in improving feature extraction toward the accurate detection of incipient prostate cancer. …”
Get full text
Article -
164
Detecting Simulated Nosocomial Disease Outbreaks with Sequential Monte Carlo Methods
Published 2025-03-01“…In this study, we propose a novel approach that extends the state-of-the-art for detecting nosocomial disease outbreaks using Sequential Monte Carlo methods, also known as particle filters (PFs). …”
Get full text
Article -
165
Model updating method for detect and localize structural damage using generalized flexibility matrix and improved grey wolf optimizer algorithm (I-GWO)
Published 2025-07-01“…Furthermore, they show that when compared to grey wolf optimizer (GWO) and particle swarm optimizer (PSO), I-GWO can offer a dependable method for precisely detecting damage.…”
Get full text
Article -
166
Corrections to “An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network”
Published 2024-01-01“…Presents corrections to the paper, (Corrections to “An Author Gender Detection Method Using Whale Optimization Algorithm and Artificial Neural Network”).…”
Get full text
Article -
167
Human-Machine Function Allocation Method for Submersible Fault Detection Tasks
Published 2024-11-01“…Based on this method, we identified the LOA2 as the optimal human-computer function allocation scheme. …”
Get full text
Article -
168
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01“…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
Get full text
Article -
169
Loss Function Optimization Method and Unsupervised Extraction Approach D-DBSCAN for Improving the Moving Target Perception of 3D Imaging Sonar
Published 2025-03-01“…This method automatically generates single-frame target detection boxes based on multi-frame joint segmentation, offering advantages in speed, cost, and accuracy. …”
Get full text
Article -
170
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01Get full text
Article -
171
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01Get full text
Article -
172
An Accurate GNSS Spoofing Detection Method Based on Multiscale Eye Diagrams
Published 2025-02-01“…The results show that the MSC-MMP outperforms traditional edge extraction algorithms by over 0.072 in terms of the optimal dataset scale F score (ODS-F). Compared to signal quality monitoring (SQM) and Carrier-to-Noise Ratio methods, the EDDM-MSC-MMP method increases spoofing detection coverage by over 60%, achieving the highest detection rate in the TEXBAT dataset. …”
Get full text
Article -
173
A Classification Data Packets Using the Threshold Method for Detection of DDoS
Published 2024-06-01“…Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.…”
Get full text
Article -
174
Text Detection Method With Emphasis on Text Component Importance and Lightweight Design
Published 2024-01-01“…As the main carrier of information exchange, text detection is crucial in image scenes. However, the complexity of text detection tasks is high, there are many interference items, and existing text detection methods have problems such as excessive smoothing. …”
Get full text
Article -
175
Investigating the Efficacy of Topological Methods for Optimal Sensor Placement in Water Distribution Systems
Published 2024-09-01“…Sensor systems are crucial for detecting contaminations promptly. Traditional optimization methods to define sensor locations often require resource-intensive network modeling, posing challenges for water utilities. …”
Get full text
Article -
176
Tensor Network Methods for Hyperparameter Optimization and Compression of Convolutional Neural Networks
Published 2025-02-01“…In this work, we address these challenges using Tensor Network-based methods. For HPO, we propose and evaluate the TetraOpt algorithm against various optimization algorithms. …”
Get full text
Article -
177
Aptamer-based Gold Nanoparticles Colorimetric Method for Rapid Detection of Chlorpyrifos
Published 2025-08-01“…Leveraging the property of gold nanoparticles to aggregate and change color in high-salt environments and the protective effect of aptamers against the aggregation of gold nanoparticles, a colorimetric detection method using gold nanoparticles was established by optimizing the reaction system. …”
Get full text
Article -
178
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01Get full text
Article -
179
A Strawberry Ripeness Detection Method Based on Improved YOLOv8
Published 2025-06-01Get full text
Article -
180
Stegan detection method for latent images for intellectual property protection systems
Published 2023-02-01“…Improving the quality of detection and stego-detection of latent images embedded in the protected object of intellectual property by various methods. …”
Get full text
Article