期刊文献+
共找到4,099篇文章
< 1 2 205 >
每页显示 20 50 100
Real-Time Detection and Instance Segmentation of Strawberry in Unstructured Environment
1
作者 Chengjun Wang Fan Ding +4 位作者 Yiwen Wang Renyuan Wu Xingyu Yao Chengjie Jiang Liuyi Ling 《Computers, Materials & Continua》 SCIE EI 2024年第1期1481-1501,共21页
The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-r... The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots.Real-time identification of strawberries in an unstructured envi-ronment is a challenging task.Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy.To this end,the present study proposes an Efficient YOLACT(E-YOLACT)algorithm for strawberry detection and segmentation based on the YOLACT framework.The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism,pyramid squeeze shuffle attention(PSSA),for efficient feature extraction.Additionally,an attention-guided context-feature pyramid network(AC-FPN)is employed instead of FPN to optimize the architecture’s performance.Furthermore,a feature-enhanced model(FEM)is introduced to enhance the prediction head’s capabilities,while efficient fast non-maximum suppression(EF-NMS)is devised to improve non-maximum suppression.The experimental results demonstrate that the E-YOLACT achieves a Box-mAP and Mask-mAP of 77.9 and 76.6,respectively,on the custom dataset.Moreover,it exhibits an impressive category accuracy of 93.5%.Notably,the E-YOLACT also demonstrates a remarkable real-time detection capability with a speed of 34.8 FPS.The method proposed in this article presents an efficient approach for the vision system of a strawberry-picking robot. 展开更多
关键词 YOLACT real-time detection instance segmentation attention mechanism STRAWBERRY
下载PDF
Real-Time Object Detection and Face Recognition Application for the Visually Impaired
2
作者 Karshiev Sanjar Soyoun Bang +1 位作者 SookheeRyue Heechul Jung 《Computers, Materials & Continua》 SCIE EI 2024年第6期3569-3583,共15页
The advancement of navigation systems for the visually impaired has significantly enhanced their mobility by mitigating the risk of encountering obstacles and guiding them along safe,navigable routes.Traditional appro... The advancement of navigation systems for the visually impaired has significantly enhanced their mobility by mitigating the risk of encountering obstacles and guiding them along safe,navigable routes.Traditional approaches primarily focus on broad applications such as wayfinding,obstacle detection,and fall prevention.However,there is a notable discrepancy in applying these technologies to more specific scenarios,like identifying distinct food crop types or recognizing faces.This study proposes a real-time application designed for visually impaired individuals,aiming to bridge this research-application gap.It introduces a system capable of detecting 20 different food crop types and recognizing faces with impressive accuracies of 83.27%and 95.64%,respectively.These results represent a significant contribution to the field of assistive technologies,providing visually impaired users with detailed and relevant information about their surroundings,thereby enhancing their mobility and ensuring their safety.Additionally,it addresses the vital aspects of social engagements,acknowledging the challenges faced by visually impaired individuals in recognizing acquaintances without auditory or tactile signals,and highlights recent developments in prototype systems aimed at assisting with face recognition tasks.This comprehensive approach not only promises enhanced navigational aids but also aims to enrich the social well-being and safety of visually impaired communities. 展开更多
关键词 Artificial intelligence deep learning real-time object detection application
下载PDF
Analyzing the Impact of Scene Transitions on Indoor Camera Localization through Scene Change Detection in Real-Time
3
作者 Muhammad S.Alam Farhan B.Mohamed +2 位作者 Ali Selamat Faruk Ahmed AKM B.Hossain 《Intelligent Automation & Soft Computing》 2024年第3期417-436,共20页
Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems.The scene can change during the image sequence and plays a vital role in the localization performance o... Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems.The scene can change during the image sequence and plays a vital role in the localization performance of robotic applications in terms of accuracy and speed.This research proposed a real-time indoor camera localization system based on a recurrent neural network that detects scene change during the image sequence.An annotated image dataset trains the proposed system and predicts the camera pose in real-time.The system mainly improved the localization performance of indoor cameras by more accurately predicting the camera pose.It also recognizes the scene changes during the sequence and evaluates the effects of these changes.This system achieved high accuracy and real-time performance.The scene change detection process was performed using visual rhythm and the proposed recurrent deep architecture,which performed camera pose prediction and scene change impact evaluation.Overall,this study proposed a novel real-time localization system for indoor cameras that detects scene changes and shows how they affect localization performance. 展开更多
关键词 Camera pose estimation indoor camera localization real-time localization scene change detection simultaneous localization and mapping(SLAM)
下载PDF
A CNN-Based Single-Stage Occlusion Real-Time Target Detection Method
4
作者 Liang Liu Nan Yang +4 位作者 Saifei Liu Yuanyuan Cao Shuowen Tian Tiancheng Liu Xun Zhao 《Journal of Intelligent Learning Systems and Applications》 2024年第1期1-11,共11页
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m... Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection. 展开更多
关键词 real-time Mask Target CNN (Convolutional Neural Network) Single-Stage detection Multi-Scale Feature Perception
下载PDF
A fast and adaptive method for automatic weld defect detection in various real-time X-ray imaging systems 被引量:10
5
作者 邵家鑫 都东 +2 位作者 石涵 常保华 郭桂林 《China Welding》 EI CAS 2012年第1期8-12,共5页
A first and effective method is proposed to detect weld deject adaptively in various Dypes of real-time X-ray images obtained in different conditions. After weld extraction and noise reduction, a proper template of me... A first and effective method is proposed to detect weld deject adaptively in various Dypes of real-time X-ray images obtained in different conditions. After weld extraction and noise reduction, a proper template of median filter is used to estimate the weld background. After the weld background is subtracted from the original image, an adaptite threshold segmentation algorithm is proposed to obtain the binary image, and then the morphological close and open operation, labeling algorithm and fids'e alarm eliminating algorithm are applied to pracess the binary image to obtain the defect, ct detection result. At last, a fast realization procedure jbr proposed method is developed. The proposed method is tested in real-time X-ray image,s obtairted in different X-ray imaging sutems. Experiment results show that the proposed method is effective to detect low contrast weld dejects with few .false alarms and is adaptive to various types of real-time X-ray imaging systems. 展开更多
关键词 non-destructive testing real-time X-ray imaging weld defect automatie detection
下载PDF
A review of automatic detection of epilepsy based on EEG signals
6
作者 Qirui Ren Xiaofan Sun +6 位作者 Xiangqu Fu Shuaidi Zhang Yiyang Yuan Hao Wu Xiaoran Li Xinghua Wang Feng Zhang 《Journal of Semiconductors》 EI CAS CSCD 2023年第12期8-30,共23页
Epilepsy is a common neurological disorder that occurs at all ages.Epilepsy not only brings physical pain to patients,but also brings a huge burden to the lives of patients and their families.At present,epilepsy detec... Epilepsy is a common neurological disorder that occurs at all ages.Epilepsy not only brings physical pain to patients,but also brings a huge burden to the lives of patients and their families.At present,epilepsy detection is still achieved through the observation of electroencephalography(EEG)by medical staff.However,this process takes a long time and consumes energy,which will create a huge workload to medical staff.Therefore,it is particularly important to realize the automatic detection of epilepsy.This paper introduces,in detail,the overall framework of EEG-based automatic epilepsy identification and the typical methods involved in each step.Aiming at the core modules,that is,signal acquisition analog front end(AFE),feature extraction and classifier selection,method summary and theoretical explanation are carried out.Finally,the future research directions in the field of automatic detection of epilepsy are prospected. 展开更多
关键词 EPILEPSY ELECTROENCEPHALOGRAPHY automatic detection analog front end feature extraction CLASSIFIER
下载PDF
Force Sensitive Resistors-Based Real-Time Posture Detection System Using Machine Learning Algorithms
7
作者 Arsal Javaid Areeb Abbas +4 位作者 Jehangir Arshad Mohammad Khalid Imam Rahmani Sohaib Tahir Chauhdary Mujtaba Hussain Jaffery Abdulbasid S.Banga 《Computers, Materials & Continua》 SCIE EI 2023年第11期1795-1814,共20页
To detect the improper sitting posture of a person sitting on a chair,a posture detection system using machine learning classification has been proposed in this work.The addressed problem correlates to the third Susta... To detect the improper sitting posture of a person sitting on a chair,a posture detection system using machine learning classification has been proposed in this work.The addressed problem correlates to the third Sustainable Development Goal(SDG),ensuring healthy lives and promoting well-being for all ages,as specified by the World Health Organization(WHO).An improper sitting position can be fatal if one sits for a long time in the wrong position,and it can be dangerous for ulcers and lower spine discomfort.This novel study includes a practical implementation of a cushion consisting of a grid of 3×3 force-sensitive resistors(FSR)embedded to read the pressure of the person sitting on it.Additionally,the Body Mass Index(BMI)has been included to increase the resilience of the system across individual physical variances and to identify the incorrect postures(backward,front,left,and right-leaning)based on the five machine learning algorithms:ensemble boosted trees,ensemble bagged trees,ensemble subspace K-Nearest Neighbors(KNN),ensemble subspace discriminant,and ensemble RUSBoosted trees.The proposed arrangement is novel as existing works have only provided simulations without practical implementation,whereas we have implemented the proposed design in Simulink.The results validate the proposed sensor placements,and the machine learning(ML)model reaches a maximum accuracy of 99.99%,which considerably outperforms the existing works.The proposed concept is valuable as it makes it easier for people in workplaces or even at individual household levels to work for long periods without suffering from severe harmful effects from poor posture. 展开更多
关键词 Posture detection FSR sensor machine learning real-time KNN
下载PDF
Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT
8
作者 Muhammad Tahir Mingchu Li +4 位作者 Irfan Khan Salman AAl Qahtani Rubia Fatima Javed Ali Khan Muhammad Shahid Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第11期2529-2544,共16页
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the eff... Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)framework.Yet,delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems.We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this.This strategy is devised to streamline the data retrieval path,subsequently diminishing network strain.Crafting an adept cache processing scheme poses its own set of challenges,especially given the transient nature of monitoring data and the imperative for swift data transmission,intertwined with resource allocation tactics.This paper unveils a novel mobile healthcare solution that harnesses the power of our collaborative caching approach,facilitating nuanced health monitoring via edge devices.The system capitalizes on cloud computing for intricate health data analytics,especially in pinpointing health anomalies.Given the dynamic locational shifts and possible connection disruptions,we have architected a hierarchical detection system,particularly during crises.This system caches data efficiently and incorporates a detection utility to assess data freshness and potential lag in response times.Furthermore,we introduce the Cache-Assisted Real-Time Detection(CARD)model,crafted to optimize utility.Addressing the inherent complexity of the NP-hard CARD model,we have championed a greedy algorithm as a solution.Simulations reveal that our collaborative caching technique markedly elevates the Cache Hit Ratio(CHR)and data freshness,outshining its contemporaneous benchmark algorithms.The empirical results underscore the strength and efficiency of our innovative IoHT-based health monitoring solution.To encapsulate,this paper tackles the nuances of real-time health data monitoring in the IoHT landscape,presenting a joint edge-cloud caching strategy paired with a hierarchical detection system.Our methodology yields enhanced cache efficiency and data freshness.The corroborative numerical data accentuates the feasibility and relevance of our model,casting a beacon for the future trajectory of real-time health data monitoring systems. 展开更多
关键词 real-time health data monitoring Cache-Assisted real-time detection(CARD) edge-cloud collaborative caching scheme hierarchical detection Internet of Health Things(IoHT)
下载PDF
LDA-ID:An LDA-Based Framework for Real-Time Network Intrusion Detection
9
作者 Weidong Zhou Shengwei Lei +1 位作者 Chunhe Xia Tianbo Wang 《China Communications》 SCIE CSCD 2023年第12期166-181,共16页
Network intrusion poses a severe threat to the Internet.However,existing intrusion detection models cannot effectively distinguish different intrusions with high-degree feature overlap.In addition,efficient real-time ... Network intrusion poses a severe threat to the Internet.However,existing intrusion detection models cannot effectively distinguish different intrusions with high-degree feature overlap.In addition,efficient real-time detection is an urgent problem.To address the two above problems,we propose a Latent Dirichlet Allocation topic model-based framework for real-time network Intrusion Detection(LDA-ID),consisting of static and online LDA-ID.The problem of feature overlap is transformed into static LDA-ID topic number optimization and topic selection.Thus,the detection is based on the latent topic features.To achieve efficient real-time detection,we design an online computing mode for static LDA-ID,in which a parameter iteration method based on momentum is proposed to balance the contribution of prior knowledge and new information.Furthermore,we design two matching mechanisms to accommodate the static and online LDA-ID,respectively.Experimental results on the public NSL-KDD and UNSW-NB15 datasets show that our framework gets higher accuracy than the others. 展开更多
关键词 feature overlap LDA-ID optimal topic number determination real-time intrusion detection
下载PDF
Portable FBAR based E-nose for cold chain real-time bananas shelf time detection
10
作者 Chen Wu Jiuyan Li 《Nanotechnology and Precision Engineering》 CAS CSCD 2023年第1期32-39,共8页
Being cheap,nondestructive,and easy to use,gas sensors play important roles in the food industry.However,most gas sensors are suitable more for laboratory-quality fast testing rather than for cold-chain continuous and... Being cheap,nondestructive,and easy to use,gas sensors play important roles in the food industry.However,most gas sensors are suitable more for laboratory-quality fast testing rather than for cold-chain continuous and cumulative testing.Also,an ideal electronic nose(E-nose)in a cold chain should be stable to its surroundings and remain highly accurate and portable.In this work,a portable film bulk acoustic resonator(FBAR)-based E-nose was built for real-time measurement of banana shelf time.The sensor chamber to contain the portable circuit of the E-nose is as small as a smartphone,and by introducing an air-tight FBAR as a reference,the E-nose can avoid most of the drift caused by surroundings.With the help of porous layer by layer(LBL)coating of the FBAR,the sensitivity of the E-nose is 5 ppm to ethylene and 0.5 ppm to isoamyl acetate and isoamyl butyrate,while the detection range is large enough to cover a relative humidity of 0.8.In this regard,the E-nose can easily discriminate between yellow bananas with green necks and entirely yellow bananas while allowing the bananas to maintain their biological activities in their normal storage state,thereby showing the possibility of real-time shelf time detection.This portable FBAR-based E-nose has a large testing scale,high sensitivity,good humidity tolerance,and low frequency drift to its surroundings,thereby meeting the needs of cold-chain usage. 展开更多
关键词 Film bulk acoustic resonator(FBAR) Portable E-nose real-time detection Layer by layer
下载PDF
NFA:A neural factorization autoencoder based online telephony fraud detection
11
作者 Abdul Wahid Mounira Msahli +1 位作者 Albert Bifet Gerard Memmi 《Digital Communications and Networks》 SCIE CSCD 2024年第1期158-167,共10页
The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal ac... The proliferation of internet communication channels has increased telecom fraud,causing billions of euros in losses for customers and the industry each year.Fraudsters constantly find new ways to engage in illegal activity on the network.To reduce these losses,a new fraud detection approach is required.Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic.Developing an effective strategy to combat fraud has become challenging.Although much effort has been made to detect fraud,most existing methods are designed for batch processing,not real-time detection.To solve this problem,we propose an online fraud detection model using a Neural Factorization Autoencoder(NFA),which analyzes customer calling patterns to detect fraudulent calls.The model employs Neural Factorization Machines(NFM)and an Autoencoder(AE)to model calling patterns and a memory module to adapt to changing customer behaviour.We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods.Our results show that our approach outperforms the baselines,with an AUC of 91.06%,a TPR of 91.89%,an FPR of 14.76%,and an F1-score of 95.45%.These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks. 展开更多
关键词 Telecom industry Streaming anomaly detection Fraud analysis Factorization machine real-time system Security
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
12
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
13
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience real-time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Probabilistic Automatic Outlier Detection for Surface Air Quality Measurements from the China National Environmental Monitoring Network 被引量:11
14
作者 Huangjian WU Xiao TANG +4 位作者 Zifa WANG Lin WU Miaomiao LU Lianfang WEI Jiang ZHU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2018年第12期1522-1532,共11页
Although quality assurance and quality control procedures are routinely applied in most air quality networks, outliers can still occur due to instrument malfunctions, the influence of harsh environments and the limita... Although quality assurance and quality control procedures are routinely applied in most air quality networks, outliers can still occur due to instrument malfunctions, the influence of harsh environments and the limitation of measuring methods. Such outliers pose challenges for data-powered applications such as data assimilation, statistical analysis of pollution characteristics and ensemble forecasting. Here, a fully automatic outlier detection method was developed based on the probability of residuals, which are the discrepancies between the observed and the estimated concentration values. The estimation can be conducted using filtering—or regressions when appropriate—to discriminate four types of outliers characterized by temporal and spatial inconsistency, instrument-induced low variances, periodic calibration exceptions, and less PM_(10) than PM_(2.5) in concentration observations, respectively. This probabilistic method was applied to detect all four types of outliers in hourly surface measurements of six pollutants(PM_(2.5), PM_(10),SO_2,NO_2,CO and O_3) from 1436 stations of the China National Environmental Monitoring Network during 2014-16. Among the measurements, 0.65%-5.68% are marked as outliers. with PM_(10) and CO more prone to outliers. Our method successfully identifies a trend of decreasing outliers from 2014 to 2016,which corresponds to known improvements in the quality assurance and quality control procedures of the China National Environmental Monitoring Network. The outliers can have a significant impact on the annual mean concentrations of PM_(2.5),with differences exceeding 10 μg m^(-3) at 66 sites. 展开更多
关键词 PROBABILISTIC automatic OUTLIER detection air quality observation low PASS filter spatial regression BIVARIATE normal distribution
下载PDF
An automatic detection of green tide using multi-windows with their adaptive threshold from Landsat TM/ETM plus image 被引量:4
15
作者 WANG Changying CHU Jialan +3 位作者 TAN Meng SHAO Fengjing SUI Yi LI Shujing 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第11期106-114,共9页
Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of... Since the atmospheric correction is a necessary preprocessing step of remote sensing image before detecting green tide, the introduced error directly affects the detection precision. Therefore, the detection method of green tide is presented from Landsat TM/ETM plus image which needs not the atmospheric correction. In order to achieve an automatic detection of green tide, a linear relationship(y =0.723 x+0.504) between detection threshold y and subtraction x(x=λnir–λred) is found from the comparing Landsat TM/ETM plus image with the field surveys.Using this relationship, green tide patches can be detected automatically from Landsat TM/ETM plus image.Considering there is brightness difference between different regions in an image, the image will be divided into a plurality of windows(sub-images) with a same size firstly, and then each window will be detected using an adaptive detection threshold determined according to the discovered linear relationship. It is found that big errors will appear in some windows, such as those covered by clouds seriously. To solve this problem, the moving step k of windows is proposed to be less than the window width n. Using this mechanism, most pixels will be detected[n/k]×[n/k] times except the boundary pixels, then every pixel will be assigned the final class(green tide or sea water) according to majority rule voting strategy. It can be seen from the experiments, the proposed detection method using multi-windows and their adaptive thresholds can detect green tide from Landsat TM/ETM plus image automatically. Meanwhile, it avoids the reliance on the accurate atmospheric correction. 展开更多
关键词 automatic detection green tide adaptive threshold Landsat TM/ETM plus image
下载PDF
Real-Time Detection of Cracks on Concrete Bridge Decks Using Deep Learning in the Frequency Domain 被引量:8
16
作者 Qianyun Zhang Kaveh Barri +1 位作者 Saeed K.Babanajad Amir H.Alavi 《Engineering》 SCIE EI 2021年第12期1786-1796,共11页
This paper presents a vision-based crack detection approach for concrete bridge decks using an integrated one-dimensional convolutional neural network(1D-CNN)and long short-term memory(LSTM)method in the image frequen... This paper presents a vision-based crack detection approach for concrete bridge decks using an integrated one-dimensional convolutional neural network(1D-CNN)and long short-term memory(LSTM)method in the image frequency domain.The so-called 1D-CNN-LSTM algorithm is trained using thousands of images of cracked and non-cracked concrete bridge decks.In order to improve the training efficiency,images are first transformed into the frequency domain during a preprocessing phase.The algorithm is then calibrated using the flattened frequency data.LSTM is used to improve the performance of the developed network for long sequence data.The accuracy of the developed model is 99.05%,98.9%,and 99.25%,respectively,for training,validation,and testing data.An implementation framework is further developed for future application of the trained model for large-scale images.The proposed 1D-CNN-LSTM method exhibits superior performance in comparison with existing deep learning methods in terms of accuracy and computation time.The fast implementation of the 1D-CNN-LSTM algorithm makes it a promising tool for real-time crack detection. 展开更多
关键词 Crack detection Concrete bridge deck Deep learning real-time
下载PDF
A detailed investigation of low latitude tweek atmospherics observed by the WHU ELF/VLF receiver:Ⅰ. Automatic detection and analysis method 被引量:12
17
作者 RuoXian Zhou XuDong Gu +8 位作者 KeXin Yang GuangSheng Li BinBin Ni Juan Yi Long Chen FuTai Zhao ZhengYu Zhao Qi Wang LiQing Zhou 《Earth and Planetary Physics》 CSCD 2020年第2期120-130,共11页
As a dispersive wave mode produced by lightning strokes, tweek atmospherics provide important hints of lower ionospheric(i.e., D-region) electron density. Based on data accumulation from the WHU ELF/VLF receiver syste... As a dispersive wave mode produced by lightning strokes, tweek atmospherics provide important hints of lower ionospheric(i.e., D-region) electron density. Based on data accumulation from the WHU ELF/VLF receiver system, we develop an automatic detection module in terms of the maximum-entropy-spectral-estimation(MESE) method to identify unambiguous instances of low latitude tweeks.We justify the feasibility of our procedure through a detailed analysis of the data observed at the Suizhou Station(31.57°N, 113.32°E) on17 February 2016. A total of 3961 tweeks were registered by visual inspection;the automatic detection method captured 4342 tweeks, of which 3361 were correct ones, producing a correctness percentage of 77.4%(= 3361/4342) and a false alarm rate of 22.6%(= 981/4342).A Short-Time Fourier Transformation(STFT) was also applied to trace the power spectral profiles of identified tweeks and to evaluate the tweek propagation distance. It is found that the fitting accuracy of the frequency–time curve and the relative difference of propagation distance between the two methods through the slope and through the intercept can be used to further improve the accuracy of automatic tweek identification. We suggest that our automatic tweek detection and analysis method therefore supplies a valuable means to investigate features of low latitude tweek atmospherics and associated ionospheric parameters comprehensively. 展开更多
关键词 tweeks automatic detection WHU-VLF receiver
下载PDF
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction 被引量:2
18
作者 Yaojun Hao Fuzhi Zhang Jinbo Chao 《China Communications》 SCIE CSCD 2019年第8期130-146,共17页
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extracted by human engineering are usually aimed at some specific types of attacks. To further detect other new types of attacks, the traditional methods have to re-extract detection features with high knowledge cost. To address these limitations, the method for automatic extraction of robust features is proposed and then an Adaboost-based detection method is presented. Firstly, to obtain robust representation with prior knowledge, unlike uniform corruption rate in traditional mLDA(marginalized Linear Denoising Autoencoder), different corruption rates for items are calculated according to the ratings’ distribution. Secondly, the ratings sparsity is used to weight the mapping matrix to extract low-dimensional representation. Moreover, the uniform corruption rate is also set to the next layer in mSLDA(marginalized Stacked Linear Denoising Autoencoder) to extract the stable and robust user features. Finally, under the robust feature space, an Adaboost-based detection method is proposed to alleviate the imbalanced classification problem. Experimental results on the Netflix and Amazon review datasets indicate that the proposed method can effectively detect various attacks. 展开更多
关键词 shilling ATTACK ENSEMBLE detection FEATURES of automatic EXTRACTION marginalized linear DENOISING autoencoder
下载PDF
Real-time Fluorescence PCR Method for Detection of Burkholderia glumae from Rice 被引量:5
19
作者 FANG Yuan XU Li-hui TIAN Wen-xiao HUAI Yan YU Shan-hong LOU Miao-miao XIE Guan-lin 《Rice science》 SCIE 2009年第2期157-160,共4页
Burkholderia glumae causing seedling rot and grain rot of rice was listed as a plant quarantine disease of China in 2007. It's quite necessary to set up effective detection methods for the pathogen to manage further ... Burkholderia glumae causing seedling rot and grain rot of rice was listed as a plant quarantine disease of China in 2007. It's quite necessary to set up effective detection methods for the pathogen to manage further dispersal of this disease. The present study combined the real-time PCR method with classical PCR to increase the detecting efficiency, and to develop an accurate, rapid and sensitive method to detect the pathogen in the seed quarantine for effective management of the disease. The results showed that all the tested strains of B. glumae produced about 139 bp specific fragments by the real-time PCR and the general PCR methods, while others showed negative PCR result. The bacteria could be detected at the concentrations of 1×10^4 CFU/mL by general PCR method and at the concentrations below 100 CFU/mL by real-time fluorescence PCR method. B. glumae could be detected when the inoculated and healthy seeds were mixed with a proportion of 1:100. 展开更多
关键词 Burkholderia glumae bacterial grain rot detection real-time fluorescence polymerase chain reaction DCE
下载PDF
Development and validation of a TaqMan^(TM) fluorescent quantitative real-time PCR assay for the rapid detection of Edwardsiella tarda 被引量:2
20
作者 XIE Guosi HUANG Jie +3 位作者 ZHANG Qingli HAN Nana SHI Chengyin WANG Xiuhua 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2012年第4期140-148,共9页
Edwardsiella tarda is one of the most important emerging pathogens in tile global aquaculture industries. As such, an accurate diagnosis and quantitative analytical methods are urgently needed for this bacterium. In t... Edwardsiella tarda is one of the most important emerging pathogens in tile global aquaculture industries. As such, an accurate diagnosis and quantitative analytical methods are urgently needed for this bacterium. In this study, primers and a TaqMan probe specific to the conservative sequences of the 16S rRNA gene of E. tarda were designed. The concentration of primers and TaqMan probe were optimized to 200 nmol/L and 120 nmol/L, respectively. The detection sensitivity of the FQ- PCR assay was determined to be as low as five copies of the target sequence per reaction using the pGEM-16S rDNA recombinant plasmid as a template, which was 100 times more sensitive than conventional PCR. A standard curve by plotting the threshold cycle values (y) against the common logarithmic copies (logl0n~ as x; n~ is copy number) of pGEM-16S rDNA was generated. The results of intra- and inter-assay variability tests demonstrate that the established FQ-PCR method was highly reproducible. The assay was specific for E. tarda as it showed that there was no cross-reactivity to eight additional bacterial pathogen strains in aquaculture. Thus, the FQ-PCR assay has the potential for diagnostic purposes and for other applications, especially for the rapid detection and quantification of low-grade E. tarda infections. 展开更多
关键词 Edwardsiella tarda TAQMAN real-time PCR detection 16S rDNA
下载PDF
上一页 1 2 205 下一页 到第
使用帮助 返回顶部