期刊文献+
共找到10,572篇文章
< 1 2 250 >
每页显示 20 50 100
RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm
1
作者 Lieping Zhang Xiaoxu Shi +3 位作者 Liu Tang Yilin Wang Jiansheng Peng Jianchu Zou 《Computers, Materials & Continua》 SCIE EI 2024年第2期2111-2136,共26页
A Rapid-exploration Random Tree(RRT)autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping(SLAM)algorithm was proposed to solve the problems of... A Rapid-exploration Random Tree(RRT)autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping(SLAM)algorithm was proposed to solve the problems of low efficiency of detecting frontier boundary points and drift distortion in the process of map building in the traditional RRT algorithm in the autonomous detection strategy of mobile robot.Firstly,an RRT global frontier boundary point detection algorithm based on the multi-guide-node deflection strategy was put forward,which introduces the reference value of guide nodes’deflection probability into the random sampling function so that the global search tree can detect frontier boundary points towards the guide nodes according to random probability.After that,a new autonomous detection algorithm for mobile robots was proposed by combining the graph optimization-based Karto SLAM algorithm with the previously improved RRT algorithm.The algorithm simulation platform based on the Gazebo platform was built.The simulation results show that compared with the traditional RRT algorithm,the proposed RRT autonomous detection algorithm can effectively reduce the time of autonomous detection,plan the length of detection trajectory under the condition of high average detection coverage,and complete the task of autonomous detection mapping more efficiently.Finally,with the help of the ROS-based mobile robot experimental platform,the performance of the proposed algorithm was verified in the real environment of different obstacles.The experimental results show that in the actual environment of simple and complex obstacles,the proposed RRT autonomous detection algorithm was superior to the traditional RRT autonomous detection algorithm in the time of detection,length of detection trajectory,and average coverage,thus improving the efficiency and accuracy of autonomous detection. 展开更多
关键词 Autonomous detection RRT algorithm mobile robot ROS Karto SLAM algorithm
下载PDF
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms
2
作者 Asma Hassan Alshehri 《Computers, Materials & Continua》 SCIE EI 2024年第2期2767-2786,共20页
Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,... Online review platforms are becoming increasingly popular,encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services.Using Sybil accounts,bot farms,and real account purchases,immoral actors demonize rivals and advertise their goods.Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years.The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones.This paper adopts a semi-supervised machine learning method to detect fake reviews on any website,among other things.Online reviews are classified using a semi-supervised approach(PU-learning)since there is a shortage of labeled data,and they are dynamic.Then,classification is performed using the machine learning techniques Support Vector Machine(SVM)and Nave Bayes.The performance of the suggested system has been compared with standard works,and experimental findings are assessed using several assessment metrics. 展开更多
关键词 SECURITY fake review semi-supervised learning ML algorithms review detection
下载PDF
Gradient Optimizer Algorithm with Hybrid Deep Learning Based Failure Detection and Classification in the Industrial Environment
3
作者 Mohamed Zarouan Ibrahim M.Mehedi +1 位作者 Shaikh Abdul Latif Md.Masud Rana 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1341-1364,共24页
Failure detection is an essential task in industrial systems for preventing costly downtime and ensuring the seamlessoperation of the system. Current industrial processes are getting smarter with the emergence of Indu... Failure detection is an essential task in industrial systems for preventing costly downtime and ensuring the seamlessoperation of the system. Current industrial processes are getting smarter with the emergence of Industry 4.0.Specifically, various modernized industrial processes have been equipped with quite a few sensors to collectprocess-based data to find faults arising or prevailing in processes along with monitoring the status of processes.Fault diagnosis of rotating machines serves a main role in the engineering field and industrial production. Dueto the disadvantages of existing fault, diagnosis approaches, which greatly depend on professional experienceand human knowledge, intellectual fault diagnosis based on deep learning (DL) has attracted the researcher’sinterest. DL reaches the desired fault classification and automatic feature learning. Therefore, this article designs a Gradient Optimizer Algorithm with Hybrid Deep Learning-based Failure Detection and Classification (GOAHDLFDC)in the industrial environment. The presented GOAHDL-FDC technique initially applies continuous wavelettransform (CWT) for preprocessing the actual vibrational signals of the rotating machinery. Next, the residualnetwork (ResNet18) model was exploited for the extraction of features from the vibration signals which are thenfed into theHDLmodel for automated fault detection. Finally, theGOA-based hyperparameter tuning is performedtoadjust the parameter valuesof theHDLmodel accurately.The experimental result analysis of the GOAHDL-FD Calgorithm takes place using a series of simulations and the experimentation outcomes highlight the better resultsof the GOAHDL-FDC technique under different aspects. 展开更多
关键词 Fault detection Industry 4.0 gradient optimizer algorithm deep learning rotating machineries artificial intelligence
下载PDF
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
4
作者 Honghao Zhu MengChu Zhou +1 位作者 Yu Xie Aiiad Albeshri 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期377-390,共14页
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods. 展开更多
关键词 Credit card fraud detection(CCFD) dandelion algorithm(DA) feature selection normal sowing operator
下载PDF
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
5
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 Cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
下载PDF
Mango Pest Detection Using Entropy-ELM with Whale Optimization Algorithm 被引量:2
6
作者 U.Muthaiah S.Chitra 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3447-3458,共12页
Image processing,agricultural production,andfield monitoring are essential studies in the researchfield.Plant diseases have an impact on agricultural production and quality.Agricultural disease detection at a preliminar... Image processing,agricultural production,andfield monitoring are essential studies in the researchfield.Plant diseases have an impact on agricultural production and quality.Agricultural disease detection at a preliminary phase reduces economic losses and improves the quality of crops.Manually identifying the agricultural pests is usually evident in plants;also,it takes more time and is an expensive technique.A drone system has been developed to gather photographs over enormous regions such as farm areas and plantations.An atmosphere generates vast amounts of data as it is monitored closely;the evaluation of this big data would increase the production of agricultural production.This paper aims to identify pests in mango trees such as hoppers,mealybugs,inflorescence midges,fruitflies,and stem borers.Because of the massive volumes of large-scale high-dimensional big data collected,it is necessary to reduce the dimensionality of the input for classify-ing images.The community-based cumulative algorithm was used to classify the pests in the existing system.The proposed method uses the Entropy-ELM method with Whale Optimization to improve the classification in detecting pests in agricul-ture.The Entropy-ELM method with the Whale Optimization Algorithm(WOA)is used for feature selection,enhancing mango pests’classification accuracy.Support Vector Machines(SVMs)are especially effective for classifying while users get var-ious classes in which they are interested.They are created as suitable classifiers to categorize any dataset in Big Data effectively.The proposed Entropy-ELM-WOA is more capable compared to the existing systems. 展开更多
关键词 Whale optimization algorithm Entropy-ELM feature selection pests detection support vector machine mango trees classification
下载PDF
An Efficient Approach Based on Remora Optimization Algorithm and Levy Flight for Intrusion Detection
7
作者 Abdullah Mujawib Alashjaee 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期235-254,共20页
With the recent increase in network attacks by threats,malware,and other sources,machine learning techniques have gained special attention for intrusion detection due to their ability to classify hundreds of features ... With the recent increase in network attacks by threats,malware,and other sources,machine learning techniques have gained special attention for intrusion detection due to their ability to classify hundreds of features into normal system behavior or an attack attempt.However,feature selection is a vital preprocessing stage in machine learning approaches.This paper presents a novel feature selection-based approach,Remora Optimization Algorithm-Levy Flight(ROA-LF),to improve intrusion detection by boosting the ROA performance with LF.The developed ROA-LF is assessed using several evaluation measures on five publicly available datasets for intrusion detection:Knowledge discovery and data mining tools competition,network security laboratory knowledge discovery and data mining,intrusion detection evaluation dataset,block out traffic network,Canadian institute of cybersecu-rity and three engineering problems:Cantilever beam design,three-bar truss design,and pressure vessel design.A comparative analysis between developed ROA-LF,particle swarm optimization,salp swarm algorithm,snake opti-mizer,and the original ROA methods is also presented.The results show that the developed ROA-LF is more efficient and superior to other feature selection methods and the three tested engineering problems for intrusion detection. 展开更多
关键词 Feature selection metaheuristic algorithms intrusion detection Remora optimization algorithm Levy flight
下载PDF
An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection
8
作者 Salahahaldeen Duraibi 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2509-2525,共17页
With the growth of the discipline of digital communication,the topic has acquiredmore attention in the cybersecuritymedium.The Intrusion Detection(ID)system monitors network traffic to detect malicious activities.The ... With the growth of the discipline of digital communication,the topic has acquiredmore attention in the cybersecuritymedium.The Intrusion Detection(ID)system monitors network traffic to detect malicious activities.The paper introduces a novel Feature Selection(FS)approach for ID.Reptile Search Algorithm(RSA)—is a new optimization algorithm;in this method,each agent searches a new region according to the position of the host,which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate.To overcome these problems,this study introduces an improved RSA approach by integrating Cauchy Mutation(CM)into the RSA’s structure.Thus,the CM can effectively expand search space and enhance the performance of the RSA.The developed RSA-CM is assessed on five publicly available ID datasets:KDD-CUP99,NSL-KDD,UNSW-NB15,CIC-IDS2017,and CIC-IDS2018 and two engineering problems.The RSA-CM is compared with the original RSA,and three other state-of-the-art FS methods,namely particle swarm optimization,grey wolf optimization,and multi-verse optimizer,and quantitatively is evaluated using fitness value,the number of selected optimum features,accuracy,precision,recall,and F1-score evaluationmeasures.The results reveal that the developed RSA-CMgot better results than the other competitive methods applied for FS on the ID datasets and the examined engineering problems.Moreover,the Friedman test results confirm that RSA-CMhas a significant superiority compared to other methods as an FS method for ID. 展开更多
关键词 Feature selection intrusion detection metaheuristic algorithms reptile search algorithm cauchy mutation
下载PDF
Automated Pavement Crack Detection Using Deep Feature Selection and Whale Optimization Algorithm
9
作者 Shorouq Alshawabkeh Li Wu +3 位作者 Daojun Dong Yao Cheng Liping Li Mohammad Alanaqreh 《Computers, Materials & Continua》 SCIE EI 2023年第10期63-77,共15页
Pavement crack detection plays a crucial role in ensuring road safety and reducing maintenance expenses.Recent advancements in deep learning(DL)techniques have shown promising results in detecting pavement cracks;howe... Pavement crack detection plays a crucial role in ensuring road safety and reducing maintenance expenses.Recent advancements in deep learning(DL)techniques have shown promising results in detecting pavement cracks;however,the selection of relevant features for classification remains challenging.In this study,we propose a new approach for pavement crack detection that integrates deep learning for feature extraction,the whale optimization algorithm(WOA)for feature selection,and random forest(RF)for classification.The performance of the models was evaluated using accuracy,recall,precision,F1 score,and area under the receiver operating characteristic curve(AUC).Our findings reveal that Model 2,which incorporates RF into the ResNet-18 architecture,outperforms baseline Model 1 across all evaluation metrics.Nevertheless,our proposed model,which combines ResNet-18 with both WOA and RF,achieves significantly higher accuracy,recall,precision,and F1 score compared to the other two models.These results underscore the effectiveness of integrating RF and WOA into ResNet-18 for pavement crack detection applications.We applied the proposed approach to a dataset of pavement images,achieving an accuracy of 97.16%and an AUC of 0.984.Our results demonstrate that the proposed approach surpasses existing methods for pavement crack detection,offering a promising solution for the automatic identification of pavement cracks.By leveraging this approach,potential safety hazards can be identified more effectively,enabling timely repairs and maintenance measures.Lastly,the findings of this study also emphasize the potential of integrating RF and WOA with deep learning for pavement crack detection,providing road authorities with the necessary tools to make informed decisions regarding road infrastructure maintenance. 展开更多
关键词 Pavement crack detection deep learning feature selection whale optimization algorithm civil engineering
下载PDF
Adaptive Butterfly Optimization Algorithm(ABOA)Based Feature Selection and Deep Neural Network(DNN)for Detection of Distributed Denial-of-Service(DDoS)Attacks in Cloud
10
作者 S.Sureshkumar G.K.D.Prasanna Venkatesan R.Santhosh 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1109-1123,共15页
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz... Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualization deployment,the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties.The Intrusion Detection System(IDS)is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources.DDoS attacks are becoming more frequent and powerful,and their attack pathways are continually changing,which requiring the development of new detection methods.Here the purpose of the study is to improve detection accuracy.Feature Selection(FS)is critical.At the same time,the IDS’s computational problem is limited by focusing on the most relevant elements,and its performance and accuracy increase.In this research work,the suggested Adaptive butterfly optimization algorithm(ABOA)framework is used to assess the effectiveness of a reduced feature subset during the feature selection phase,that was motivated by this motive Candidates.Accurate classification is not compromised by using an ABOA technique.The design of Deep Neural Networks(DNN)has simplified the categorization of network traffic into normal and DDoS threat traffic.DNN’s parameters can be finetuned to detect DDoS attacks better using specially built algorithms.Reduced reconstruction error,no exploding or vanishing gradients,and reduced network are all benefits of the changes outlined in this paper.When it comes to performance criteria like accuracy,precision,recall,and F1-Score are the performance measures that show the suggested architecture outperforms the other existing approaches.Hence the proposed ABOA+DNN is an excellent method for obtaining accurate predictions,with an improved accuracy rate of 99.05%compared to other existing approaches. 展开更多
关键词 Cloud computing distributed denial of service intrusion detection system adaptive butterfly optimization algorithm deep neural network
下载PDF
Device Anomaly Detection Algorithm Based on Enhanced Long Short-Term Memory Network
11
作者 罗辛 陈静 +1 位作者 袁德鑫 杨涛 《Journal of Donghua University(English Edition)》 CAS 2023年第5期548-559,共12页
The problems in equipment fault detection include data dimension explosion,computational complexity,low detection accuracy,etc.To solve these problems,a device anomaly detection algorithm based on enhanced long short-... The problems in equipment fault detection include data dimension explosion,computational complexity,low detection accuracy,etc.To solve these problems,a device anomaly detection algorithm based on enhanced long short-term memory(LSTM)is proposed.The algorithm first reduces the dimensionality of the device sensor data by principal component analysis(PCA),extracts the strongly correlated variable data among the multidimensional sensor data with the lowest possible information loss,and then uses the enhanced stacked LSTM to predict the extracted temporal data,thus improving the accuracy of anomaly detection.To improve the efficiency of the anomaly detection,a genetic algorithm(GA)is used to adjust the magnitude of the enhancements made by the LSTM model.The validation of the actual data from the pumps shows that the algorithm has significantly improved the recall rate and the detection speed of device anomaly detection,with the recall rate of 97.07%,which indicates that the algorithm is effective and efficient for device anomaly detection in the actual production environment. 展开更多
关键词 anomaly detection production equipment genetic algorithm(GA) long short-term memory(LSTM) principal component analysis(PCA)
下载PDF
Micro Calcification Detection in Mammogram Images Using Contiguous Convolutional Neural Network Algorithm
12
作者 P.Gomathi C.Muniraj P.S.Periasamy 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1887-1899,共13页
The mortality rate decreases as the early detection of Breast Cancer(BC)methods are emerging very fast,and when the starting stage of BC is detected,it is curable.The early detection of the disease depends on the imag... The mortality rate decreases as the early detection of Breast Cancer(BC)methods are emerging very fast,and when the starting stage of BC is detected,it is curable.The early detection of the disease depends on the image processing techniques,and it is used to identify the disease easily and accurately,especially the micro calcifications are visible on mammography when they are 0.1 mm or bigger,and cancer cells are about 0.03 mm,which is crucial for identifying in the BC area.To achieve this micro calcification in the BC images,it is necessary to focus on the four main steps presented in this work.There are three significant stages of the process assigned to find the BC using a thermal image;the image processing procedures are described below.In the first stage of the process,the Gaussian filter technique is implemented to magnify the screening image.During the second stage,BC detection is separated from the pre-processed image.The Proposed Versatile K-means clustering(VKC)algorithm with segmentation is used to identify the BC detection form of the screening image.The centroids are then recalculated using proposed VKC,which takes the mean of all data points allocated to that centroid’s cluster,lowering the overall intracluster variance in comparison to the prior phase.The“means”in K-means refers to the process of averaging the data and determining a new centroid.This process eliminates unnecessary areas of interest.First,the mammogram screening image information is taken from the patient and begins with the Contiguous Convolutional Neural Network(CCNN)method.The proposed CCNN is used to classify the Micro calcification in the BC spot using the feature values is the fourth stage of the process.The assess the presence of high-definition digital infrared thermography technology and knowledge base and suggests that future diagnostic and treatment services in breast cancer imaging will be developed.The use of sophisticated CCNN techniques in thermography is being developed to attain a greater level of consistency.The implemented(CCNN)technique’s performance is examined with different classification parameters like Recall,Precision,F-measure and accuracy.Finally,the Breast Cancer stages will be classified based on the true positive and true negative values. 展开更多
关键词 Contiguous Convolutional Neural Network(CCNN) Gaussian filter Versatile K-Means Clustering(VKC)algorithm mammogram cancer detection
下载PDF
SAR Change Detection Algorithm Combined with FFDNet Spatial Denoising
13
作者 Yuqing Wu Qing Xu +3 位作者 Zheng Zhang Jingzhen Ma Tianming Zhao Xinming Zhu 《Journal of Environmental & Earth Sciences》 2023年第2期88-101,共14页
Objectives:When detecting changes in synthetic aperture radar(SAR)images,the quality of the difference map has an important impact on the detection results,and the speckle noise in the image interferes with the extrac... Objectives:When detecting changes in synthetic aperture radar(SAR)images,the quality of the difference map has an important impact on the detection results,and the speckle noise in the image interferes with the extraction of change information.In order to improve the detection accuracy of SAR image change detection and improve the quality of the difference map,this paper proposes a method that combines the popular deep neural network with the clustering algorithm.Methods:Firstly,the SAR image with speckle noise was constructed,and the FFDNet architecture was used to retrain the SAR image,and the network parameters with better effect on speckle noise suppression were obtained.Then the log ratio operator is generated by using the reconstructed image output from the network.Finally,K-means and FCM clustering algorithms are used to analyze the difference images,and the binary map of change detection results is generated.Results:The experimental results have high detection accuracy on Bern and Sulzberger’s real data,which proves the effectiveness of the method. 展开更多
关键词 SAR change detection Image noise reduction FFDNet Difference diagram Clustering algorithm
下载PDF
Review of Fabric Defect Detection Based on Computer Vision 被引量:2
14
作者 朱润虎 辛斌杰 +1 位作者 邓娜 范明珠 《Journal of Donghua University(English Edition)》 CAS 2023年第1期18-26,共9页
In textile inspection field,the fabric defect refers to the destruction of the texture structure on the fabric surface.The technology of computer vision makes it possible to detect defects automatically.Firstly,the ov... In textile inspection field,the fabric defect refers to the destruction of the texture structure on the fabric surface.The technology of computer vision makes it possible to detect defects automatically.Firstly,the overall structure of the fabric defect detection system is introduced and some mature detection systems are studied.Then the fabric detection methods are summarized,including structural methods,statistical methods,frequency domain methods,model methods and deep learning methods.In addition,the evaluation criteria of automatic detection algorithms are discussed and the characteristics of various algorithms are analyzed.Finally,the research status of this field is discussed,and the future development trend is predicted. 展开更多
关键词 computer vision fabric defect detection algorithm evaluation textile inspection
下载PDF
UGC-YOLO:Underwater Environment Object Detection Based on YOLO with a Global Context Block 被引量:1
15
作者 YANG Yuyi CHEN Liang +2 位作者 ZHANG Jian LONG Lingchun WANG Zhenfei 《Journal of Ocean University of China》 SCIE CAS CSCD 2023年第3期665-674,共10页
With the continuous development and utilization of marine resources,the underwater target detection has gradually become a popular research topic in the field of underwater robot operations and target detection.Howeve... With the continuous development and utilization of marine resources,the underwater target detection has gradually become a popular research topic in the field of underwater robot operations and target detection.However,it is difficult to combine the environmental semantic information and the semantic information of targets at different scales by detection algorithms due to the complex underwater environment.In this paper,a cascade model based on the UGC-YOLO network structure with high detection accuracy is proposed.The YOLOv3 convolutional neural network is employed as the baseline structure.By fusing the global semantic information between two residual stages in the parallel structure of the feature extraction network,the perception of underwater targets is improved and the detection rate of hard-to-detect underwater objects is raised.Furthermore,the deformable convolution is applied to capture longrange semantic dependencies and PPM pooling is introduced in the highest layer network for aggregating semantic information.Finally,a multi-scale weighted fusion approach is presented for learning semantic information at different scales.Experiments are conducted on an underwater test dataset and the results have demonstrated that our proposed algorithm could detect aquatic targets in complex degraded underwater images.Compared with the baseline network algorithm,the Common Objects in Context(COCO)evaluation metric has been improved by 4.34%. 展开更多
关键词 object detection underwater environment semantic information semantic features deep learning algorithm
下载PDF
Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System 被引量:1
16
作者 Abdullah M.Basahel Mohammad Yamin +1 位作者 Sulafah M.Basahel E.Laxmi Lydia 《Computers, Materials & Continua》 SCIE EI 2023年第2期4319-4336,共18页
Cloud Computing(CC)is the preference of all information technology(IT)organizations as it offers pay-per-use based and flexible services to its users.But the privacy and security become the main hindrances in its achi... Cloud Computing(CC)is the preference of all information technology(IT)organizations as it offers pay-per-use based and flexible services to its users.But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders.Intrusion Detection System(IDS)refers to one of the commonly utilized system for detecting attacks on cloud.IDS proves to be an effective and promising technique,that identifies malicious activities and known threats by observing traffic data in computers,and warnings are given when such threatswere identified.The current mainstream IDS are assisted with machine learning(ML)but have issues of low detection rates and demanded wide feature engineering.This article devises an Enhanced Coyote Optimization with Deep Learning based Intrusion Detection System for Cloud Security(ECODL-IDSCS)model.The ECODL-IDSCS model initially addresses the class imbalance data problem by the use of Adaptive Synthetic(ADASYN)technique.For detecting and classification of intrusions,long short term memory(LSTM)model is exploited.In addition,ECO algorithm is derived to optimally fine tune the hyperparameters related to the LSTM model to enhance its detection efficiency in the cloud environment.Once the presented ECODL-IDSCS model is tested on benchmark dataset,the experimental results show the promising performance of the ECODL-IDSCS model over the existing IDS models. 展开更多
关键词 Intrusion detection system cloud security coyote optimization algorithm class imbalance data deep learning
下载PDF
The Human Eye Pupil Detection System Using BAT Optimized Deep Learning Architecture 被引量:1
17
作者 S.Navaneethan P.Siva Satya Sreedhar +1 位作者 S.Padmakala C.Senthilkumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期125-135,共11页
The pupil recognition method is helpful in many real-time systems,including ophthalmology testing devices,wheelchair assistance,and so on.The pupil detection system is a very difficult process in a wide range of datas... The pupil recognition method is helpful in many real-time systems,including ophthalmology testing devices,wheelchair assistance,and so on.The pupil detection system is a very difficult process in a wide range of datasets due to problems caused by varying pupil size,occlusion of eyelids,and eyelashes.Deep Convolutional Neural Networks(DCNN)are being used in pupil recognition systems and have shown promising results in terms of accuracy.To improve accuracy and cope with larger datasets,this research work proposes BOC(BAT Optimized CNN)-IrisNet,which consists of optimizing input weights and hidden layers of DCNN using the evolutionary BAT algorithm to efficiently find the human eye pupil region.The proposed method is based on very deep architecture and many tricks from recently developed popular CNNs.Experiment results show that the BOC-IrisNet proposal can efficiently model iris microstructures and provides a stable discriminating iris representation that is lightweight,easy to implement,and of cutting-edge accuracy.Finally,the region-based black box method for determining pupil center coordinates was introduced.The proposed architecture was tested using various IRIS databases,including the CASIA(Chinese academy of the scientific research institute of automation)Iris V4 dataset,which has 99.5%sensitivity and 99.75%accuracy,and the IIT(Indian Institute of Technology)Delhi dataset,which has 99.35%specificity and MMU(Multimedia University)99.45%accuracy,which is higher than the existing architectures. 展开更多
关键词 BAT algorithm IRIS datasets DCNN pupil detection black box method
下载PDF
Density-based trajectory outlier detection algorithm 被引量:9
18
作者 Zhipeng Liu Dechang Pi Jinfeng Jiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期335-340,共6页
With the development of global position system(GPS),wireless technology and location aware services,it is possible to collect a large quantity of trajectory data.In the field of data mining for moving objects,the pr... With the development of global position system(GPS),wireless technology and location aware services,it is possible to collect a large quantity of trajectory data.In the field of data mining for moving objects,the problem of anomaly detection is a hot topic.Based on the development of anomalous trajectory detection of moving objects,this paper introduces the classical trajectory outlier detection(TRAOD) algorithm,and then proposes a density-based trajectory outlier detection(DBTOD) algorithm,which compensates the disadvantages of the TRAOD algorithm that it is unable to detect anomalous defects when the trajectory is local and dense.The results of employing the proposed algorithm to Elk1993 and Deer1995 datasets are also presented,which show the effectiveness of the algorithm. 展开更多
关键词 density-based algorithm trajectory outlier detection(TRAOD) partition-and-detect framework Hausdorff distance
下载PDF
GA-iForest: An Efficient Isolated Forest Framework Based on Genetic Algorithm for Numerical Data Outlier Detection 被引量:4
19
作者 LI Kexin LI Jing +3 位作者 LIU Shuji LI Zhao BO Jue LIU Biqi 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2019年第6期1026-1038,共13页
With the development of data age,data quality has become one of the problems that people pay much attention to.As a field of data mining,outlier detection is related to the quality of data.The isolated forest algorith... With the development of data age,data quality has become one of the problems that people pay much attention to.As a field of data mining,outlier detection is related to the quality of data.The isolated forest algorithm is one of the more prominent numerical data outlier detection algorithms in recent years.In the process of constructing the isolation tree by the isolated forest algorithm,as the isolation tree is continuously generated,the difference of isolation trees will gradually decrease or even no difference,which will result in the waste of memory and reduced efficiency of outlier detection.And in the constructed isolation trees,some isolation trees cannot detect outlier.In this paper,an improved iForest-based method GA-iForest is proposed.This method optimizes the isolated forest by selecting some better isolation trees according to the detection accuracy and the difference of isolation trees,thereby reducing some duplicate,similar and poor detection isolation trees and improving the accuracy and stability of outlier detection.In the experiment,Ubuntu system and Spark platform are used to build the experiment environment.The outlier datasets provided by ODDS are used as test.According to indicators such as the accuracy,recall rate,ROC curves,AUC and execution time,the performance of the proposed method is evaluated.Experimental results show that the proposed method can not only improve the accuracy and stability of outlier detection,but also reduce the number of isolation trees by 20%-40%compared with the original iForest method. 展开更多
关键词 outlier detection isolation tree isolated forest genetic algorithm feature selection
下载PDF
Leakage Detection in Water Distribution Network Based on a New Heuristic Genetic Algorithm Model 被引量:4
20
作者 Ali Nasirian Mahmoud F. Maghrebi Siavash Yazdani 《Journal of Water Resource and Protection》 2013年第3期294-303,共10页
The leakage control is an important task, because it is associated with some problems such as economic loss, safety concerns, and environmental damages. The pervious methods which have already been devised for leakage... The leakage control is an important task, because it is associated with some problems such as economic loss, safety concerns, and environmental damages. The pervious methods which have already been devised for leakage detection are not only expensive and time consuming, but also have a low efficient. As a result, the global leakage detection methods such as leak detection based on simulation and calibration of the network have been considered recently. In this research, leak detection based on calibration in two hypothetical and a laboratorial networks is considered. Additionally a novel optimization method called step-by-step elimination method (SSEM) combining with a genetic algorithm (GA) is introduced to calibration and leakage detection in networks. This method step-by-step detects and eliminates the nodes that provide no contribution in leakage among uncertain parameters of calibration of a network. The proposed method initiates with an ordinary calibration for a studied network, follow by elimination of suspicious nodes among adjusted parameters, then, the network is re-calibrated. Finally the process is repeated until the numbers of unknown demands are equal to the desired numbers or the exact leakage locations and values are determined. These investigations illustrate the capability of this method for detecting the locations and sizes of leakages. 展开更多
关键词 CALIBRATION SSEM WATER DISTRIBUTION LEAK detection GENETIC algorithm
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部