-
301
A Sensor Data Prediction and Early-Warning Method for Coal Mining Faces Based on the MTGNN-Bayesian-IF-DBSCAN Algorithm
Published 2025-07-01“…In the context of intelligent coal mine safety monitoring, an integrated prediction and early-warning method named MTGNN-Bayesian-IF-DBSCAN (Multi-Task Graph Neural Network–Bayesian Optimization–Isolation Forest–Density-Based Spatial Clustering of Applications with Noise) is proposed to address the challenges of gas concentration prediction and anomaly detection in coal mining faces. …”
Get full text
Article -
302
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01Get full text
Article -
303
Fault detection and diagnosis method for heterogeneous wireless network based on GAN
Published 2020-08-01Get full text
Article -
304
Bitemporal Remote Sensing Change Detection With State-Space Models
Published 2025-01-01“…This article investigates the impact of different scanning mechanisms within Mamba, evaluating five mainstream methods to optimize its performance in change detection. …”
Get full text
Article -
305
Gas sensors and real-time video for accurate classroom occupancy detection
Published 2025-06-01“…This study introduces an advanced methodology for optimizing HVAC efficiency through real-time classroom occupancy detection by combining video analysis with gas sensor data to enhance accuracy and reliability. …”
Get full text
Article -
306
An Accurate GNSS Spoofing Detection Method Based on Multiscale Eye Diagrams
Published 2025-02-01“…The results show that the MSC-MMP outperforms traditional edge extraction algorithms by over 0.072 in terms of the optimal dataset scale F score (ODS-F). Compared to signal quality monitoring (SQM) and Carrier-to-Noise Ratio methods, the EDDM-MSC-MMP method increases spoofing detection coverage by over 60%, achieving the highest detection rate in the TEXBAT dataset. …”
Get full text
Article -
307
A Classification Data Packets Using the Threshold Method for Detection of DDoS
Published 2024-06-01“…Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.…”
Get full text
Article -
308
Text Detection Method With Emphasis on Text Component Importance and Lightweight Design
Published 2024-01-01“…As the main carrier of information exchange, text detection is crucial in image scenes. However, the complexity of text detection tasks is high, there are many interference items, and existing text detection methods have problems such as excessive smoothing. …”
Get full text
Article -
309
Harnessing feature pruning with optimal deep learning based DDoS cyberattack detection on IoT environment
Published 2025-05-01“…In contrast, Artificial Intelligence (AI)-based methods have proven more effective in detecting cyber-attacks than conventional approaches. …”
Get full text
Article -
310
Non-destructive detection of early wheat germination via deep learning-optimized terahertz imaging
Published 2025-05-01“…Abstract Wheat, a major global cereal crop, is prone to quality degradation from early sprouting when stored improperly, resulting in substantial economic losses. Traditional methods for detecting early sprouting are labor-intensive and destructive, underscoring the need for rapid, non-destructive alternatives. …”
Get full text
Article -
311
UAV rice panicle blast detection based on enhanced feature representation and optimized attention mechanism
Published 2025-02-01Get full text
Article -
312
Tensor Network Methods for Hyperparameter Optimization and Compression of Convolutional Neural Networks
Published 2025-02-01“…In this work, we address these challenges using Tensor Network-based methods. For HPO, we propose and evaluate the TetraOpt algorithm against various optimization algorithms. …”
Get full text
Article -
313
Optimal Skin Prick Test Panel for Detecting Respiratory Allergens in Children: A Retrospective Study
Published 2023-06-01“…This study aims to identify the sensitization pattern of children in different age groups and to define the minimum number and type of allergen extracts in an SPT to detect a sensitized child.Materials and Methods:This retrospective study was conducted in the Outpatient Clinic of the Pediatric Allergy, Immunology, and Pulmonology Unit of a tertiary Children’s Hospital from October 2019 to December 2020. …”
Get full text
Article -
314
Aptamer-based Gold Nanoparticles Colorimetric Method for Rapid Detection of Chlorpyrifos
Published 2025-08-01“…Under the optimal conditions of 200 mmol/L NaCl concentration and 5000 nmol/L aptamer concentration, the method exhibited a good linear relationship within the chlorpyrifos concentration range of 10~1000 ng/mL (R2=0.997) and achieved a detection limit of 9.41 ng/mL. …”
Get full text
Article -
315
Computational intelligence to detect bearing faults using optimal features from motor current signals
Published 2024-12-01“…The study aims to find the fewest and most reliable features in the dataset from Paderborn University so that a simple and accurate way can be found to diagnose faults using current signals. The selection of optimal features is initially performed using three algorithms: the equilibrium optimizer, the emperor penguin optimizer (EPO), and the butterfly optimization method. …”
Get full text
Article -
316
-
317
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01Get full text
Article -
318
A Strawberry Ripeness Detection Method Based on Improved YOLOv8
Published 2025-06-01Get full text
Article -
319
Stegan detection method for latent images for intellectual property protection systems
Published 2023-02-01“…Improving the quality of detection and stego-detection of latent images embedded in the protected object of intellectual property by various methods. …”
Get full text
Article -
320
Detection of Attacks in Network Traffic with the Autoencoder-Based Unsupervised Learning Method
Published 2022-12-01“…The threshold value is calculated as a value that will optimize the model performance. It is observed that supervised learning methods lead to difficulties and cost increases in the detection of cyber-attacks and the labeling process. …”
Get full text
Article