期刊文献+
共找到224,453篇文章
< 1 2 250 >
每页显示 20 50 100
Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles
1
作者 Qunyue Mu Qiancheng Yu +2 位作者 Chengchen Zhou Lei Liu Xulong Yu 《Computers, Materials & Continua》 SCIE EI 2024年第7期449-466,共18页
Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cam... Wearing helmetswhile riding electric bicycles can significantly reduce head injuries resulting fromtraffic accidents.To effectively monitor compliance,the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles.However,manual enforcement by traffic police is time-consuming and labor-intensive.Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques.This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles,addressing these challenges.The proposedmodel improves uponYOLOv8n by deepening the network structure,incorporating weighted connections,and introducing lightweight convolutional modules.These modifications aim to enhance the precision of small target recognition while reducing the model’s parameters,making it suitable for deployment on low-performance devices in real traffic scenarios.Experimental results demonstrate that the model achieves an mAP@0.5 of 91.8%,showing an 11.5%improvement over the baselinemodel,with a 16.2%reduction in parameters.Additionally,themodel achieves a frames per second(FPS)rate of 58,meeting the accuracy and speed requirements for detection in actual traffic scenarios. 展开更多
关键词 YOLOv8 object detection electric bicycle helmet detection electric bicycle license plate detection
下载PDF
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
2
作者 Amardeep Singh Hamad Ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
下载PDF
Detecting XSS with Random Forest and Multi-Channel Feature Extraction
3
作者 Qiurong Qin Yueqin Li +3 位作者 Yajie Mi Jinhui Shen Kexin Wu Zhenzhao Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期843-874,共32页
In the era of the Internet,widely used web applications have become the target of hacker attacks because they contain a large amount of personal information.Among these vulnerabilities,stealing private data through cr... In the era of the Internet,widely used web applications have become the target of hacker attacks because they contain a large amount of personal information.Among these vulnerabilities,stealing private data through crosssite scripting(XSS)attacks is one of the most commonly used attacks by hackers.Currently,deep learning-based XSS attack detection methods have good application prospects;however,they suffer from problems such as being prone to overfitting,a high false alarm rate,and low accuracy.To address these issues,we propose a multi-stage feature extraction and fusion model for XSS detection based on Random Forest feature enhancement.The model utilizes RandomForests to capture the intrinsic structure and patterns of the data by extracting leaf node indices as features,which are subsequentlymergedwith the original data features to forma feature setwith richer information content.Further feature extraction is conducted through three parallel channels.Channel I utilizes parallel onedimensional convolutional layers(1Dconvolutional layers)with different convolutional kernel sizes to extract local features at different scales and performmulti-scale feature fusion;Channel II employsmaximum one-dimensional pooling layers(max 1D pooling layers)of various sizes to extract key features from the data;and Channel III extracts global information bi-directionally using a Bi-Directional Long-Short TermMemory Network(Bi-LSTM)and incorporates a multi-head attention mechanism to enhance global features.Finally,effective classification and prediction of XSS are performed by fusing the features of the three channels.To test the effectiveness of the model,we conduct experiments on six datasets.We achieve an accuracy of 100%on the UNSW-NB15 dataset and 99.99%on the CICIDS2017 dataset,which is higher than that of the existing models. 展开更多
关键词 Random forest feature enhancement three-channel parallelism XSS detection
下载PDF
A Method for Detecting and Recognizing Yi Character Based on Deep Learning
4
作者 Haipeng Sun Xueyan Ding +2 位作者 Jian Sun HuaYu Jianxin Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期2721-2739,共19页
Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition,we present a deep learning-based approach for Yi character detec... Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition,we present a deep learning-based approach for Yi character detection and recognition.In the detection stage,an improved Differentiable Binarization Network(DBNet)framework is introduced to detect Yi characters,in which the Omni-dimensional Dynamic Convolution(ODConv)is combined with the ResNet-18 feature extraction module to obtain multi-dimensional complementary features,thereby improving the accuracy of Yi character detection.Then,the feature pyramid network fusion module is used to further extract Yi character image features,improving target recognition at different scales.Further,the previously generated feature map is passed through a head network to produce two maps:a probability map and an adaptive threshold map of the same size as the original map.These maps are then subjected to a differentiable binarization process,resulting in an approximate binarization map.This map helps to identify the boundaries of the text boxes.Finally,the text detection box is generated after the post-processing stage.In the recognition stage,an improved lightweight MobileNetV3 framework is used to recognize the detect character regions,where the original Squeeze-and-Excitation(SE)block is replaced by the efficient Shuffle Attention(SA)that integrates spatial and channel attention,improving the accuracy of Yi characters recognition.Meanwhile,the use of depth separable convolution and reversible residual structure can reduce the number of parameters and computation of the model,so that the model can better understand the contextual information and improve the accuracy of text recognition.The experimental results illustrate that the proposed method achieves good results in detecting and recognizing Yi characters,with detection and recognition accuracy rates of 97.5%and 96.8%,respectively.And also,we have compared the detection and recognition algorithms proposed in this paper with other typical algorithms.In these comparisons,the proposed model achieves better detection and recognition results with a certain reliability. 展开更多
关键词 Yi characters text detection text recognition attention mechanism deep neural network
下载PDF
Standard-definition White-light,High-definition White-light versus Narrow-band Imaging Endoscopy for Detecting Colorectal Adenomas:A Multicenter Randomized Controlled Trial
5
作者 Chang-wei DUAN Hui-hong ZHAI +10 位作者 Hui XIE Xian-zong MA Dong-liang YU Lang YANG Xin WANG Yu-fen TANG Jie ZHANG Hui SU Jian-qiu SHENG Jun-feng XU Peng JIN 《Current Medical Science》 SCIE CAS 2024年第3期554-560,共7页
Objective This study aimed to compare the performance of standard-definition white-light endoscopy(SD-WL),high-definition white-light endoscopy(HD-WL),and high-definition narrow-band imaging(HD-NBI)in detecting colore... Objective This study aimed to compare the performance of standard-definition white-light endoscopy(SD-WL),high-definition white-light endoscopy(HD-WL),and high-definition narrow-band imaging(HD-NBI)in detecting colorectal lesions in the Chinese population.Methods This was a multicenter,single-blind,randomized,controlled trial with a non-inferiority design.Patients undergoing endoscopy for physical examination,screening,and surveillance were enrolled from July 2017 to December 2020.The primary outcome measure was the adenoma detection rate(ADR),defined as the proportion of patients with at least one adenoma detected.The associated factors for detecting adenomas were assessed using univariate and multivariate logistic regression.Results Out of 653 eligible patients enrolled,data from 596 patients were analyzed.The ADRs were 34.5%in the SD-WL group,33.5%in the HD-WL group,and 37.5%in the HD-NBI group(P=0.72).The advanced neoplasm detection rates(ANDRs)in the three arms were 17.1%,15.5%,and 10.4%(P=0.17).No significant differences were found between the SD group and HD group regarding ADR or ANDR(ADR:34.5%vs.35.6%,P=0.79;ANDR:17.1%vs.13.0%,P=0.16,respectively).Similar results were observed between the HD-WL group and HD-NBI group(ADR:33.5%vs.37.7%,P=0.45;ANDR:15.5%vs.10.4%,P=0.18,respectively).In the univariate and multivariate logistic regression analyses,neither HD-WL nor HD-NBI led to a significant difference in overall adenoma detection compared to SD-WL(HD-WL:OR 0.91,P=0.69;HD-NBI:OR 1.15,P=0.80).Conclusion HD-NBI and HD-WL are comparable to SD-WL for overall adenoma detection among Chinese outpatients.It can be concluded that HD-NBI or HD-WL is not superior to SD-WL,but more effective instruction may be needed to guide the selection of different endoscopic methods in the future.Our study’s conclusions may aid in the efficient allocation and utilization of limited colonoscopy resources,especially advanced imaging technologies. 展开更多
关键词 standard-definition white-light endoscopy high-definition white-light endoscopy narrow-band imaging colonoscopy colorectal cancer screening adenoma detection rate
下载PDF
A proposal for detecting weak electromagnetic waves around 2.6μm wavelength with Sr optical clock
6
作者 韩弱水 王伟 汪涛 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期452-457,共6页
Infrared signal detection is widely used in many fields.Due to the detection principle,however,the accuracy and range of detection are limited.Thanks to the ultra stability of the^(87)Sr optical lattice clock,external... Infrared signal detection is widely used in many fields.Due to the detection principle,however,the accuracy and range of detection are limited.Thanks to the ultra stability of the^(87)Sr optical lattice clock,external infrared electromagnetic wave disturbances can be responded to.Utilizing the ac Stark shift of the clock transition,we propose a new method to detect infrared signals.According to our calculations,the theoretical detection accuracy in the vicinity of its resonance band of 2.6μm can reach the order of 10-14W,while the minimum detectable signal of common detectors is on the order of 10^(-10)W. 展开更多
关键词 infrared signal detection ^(87)Sr optical lattice clock ac Stark shift ultra stability
下载PDF
Method for Detecting Industrial Defects in Intelligent Manufacturing Using Deep Learning
7
作者 Bowen Yu Chunli Xie 《Computers, Materials & Continua》 SCIE EI 2024年第1期1329-1343,共15页
With the advent of Industry 4.0,marked by a surge in intelligent manufacturing,advanced sensors embedded in smart factories now enable extensive data collection on equipment operation.The analysis of such data is pivo... With the advent of Industry 4.0,marked by a surge in intelligent manufacturing,advanced sensors embedded in smart factories now enable extensive data collection on equipment operation.The analysis of such data is pivotal for ensuring production safety,a critical factor in monitoring the health status of manufacturing apparatus.Conventional defect detection techniques,typically limited to specific scenarios,often require manual feature extraction,leading to inefficiencies and limited versatility in the overall process.Our research presents an intelligent defect detection methodology that leverages deep learning techniques to automate feature extraction and defect localization processes.Our proposed approach encompasses a suite of components:the high-level feature learning block(HLFLB),the multi-scale feature learning block(MSFLB),and a dynamic adaptive fusion block(DAFB),working in tandem to extract meticulously and synergistically aggregate defect-related characteristics across various scales and hierarchical levels.We have conducted validation of the proposed method using datasets derived from gearbox and bearing assessments.The empirical outcomes underscore the superior defect detection capability of our approach.It demonstrates consistently high performance across diverse datasets and possesses the accuracy required to categorize defects,taking into account their specific locations and the extent of damage,proving the method’s effectiveness and reliability in identifying defects in industrial components. 展开更多
关键词 Industrial defect detection deep learning intelligent manufacturing
下载PDF
Detecting the backfill pipeline blockage and leakage through an LSTM-based deep learning model 被引量:1
8
作者 Bolin Xiao Shengjun Miao +2 位作者 Daohong Xia Huatao Huang Jingyu Zhang 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2023年第8期1573-1583,共11页
Detecting a pipeline's abnormal status,which is typically a blockage and leakage accident,is important for the continuity and safety of mine backfill.The pipeline system for gravity-transport high-density backfill... Detecting a pipeline's abnormal status,which is typically a blockage and leakage accident,is important for the continuity and safety of mine backfill.The pipeline system for gravity-transport high-density backfill(GHB)is complex.Specifically designed,efficient,and accurate abnormal pipeline detection methods for GHB are rare.This work presents a long short-term memory-based deep learning(LSTM-DL)model for GHB pipeline blockage and leakage diagnosis.First,an industrial pipeline monitoring system was introduced using pressure and flow sensors.Second,blockage and leakage field experiments were designed to solve the problem of negative sample deficiency.The pipeline's statistical characteristics with different working statuses were analyzed to show their complexity.Third,the architecture of the LSTM-DL model was elaborated on and evaluated.Finally,the LSTM-DL model was compared with state-of-the-art(SOTA)learning algorithms.The results show that the backfilling cycle comprises multiple working phases and is intermittent.Although pressure and flow signals fluctuate stably in a normal cycle,their values are diverse in different cycles.Plugging causes a sudden change in interval signal features;leakage results in long variation duration and a wide fluctuation range.Among the SOTA models,the LSTM-DL model has the highest detection accuracy of98.31%for all states and the lowest misjudgment or false positive rate of 3.21%for blockage and leakage states.The proposed model can accurately recognize various pipeline statuses of complex GHB systems. 展开更多
关键词 mine backfill blockage and leakage pipeline detection long short-term memory networks deep learning
下载PDF
Detecting While Accessing:A Semi-Supervised Learning-Based Approach for Malicious Traffic Detection in Internet of Things 被引量:1
9
作者 Yantian Luo Hancun Sun +3 位作者 Xu Chen Ning Ge Wei Feng Jianhua Lu 《China Communications》 SCIE CSCD 2023年第4期302-314,共13页
In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In thi... In the upcoming large-scale Internet of Things(Io T),it is increasingly challenging to defend against malicious traffic,due to the heterogeneity of Io T devices and the diversity of Io T communication protocols.In this paper,we propose a semi-supervised learning-based approach to detect malicious traffic at the access side.It overcomes the resource-bottleneck problem of traditional malicious traffic defenders which are deployed at the victim side,and also is free of labeled traffic data in model training.Specifically,we design a coarse-grained behavior model of Io T devices by self-supervised learning with unlabeled traffic data.Then,we fine-tune this model to improve its accuracy in malicious traffic detection by adopting a transfer learning method using a small amount of labeled data.Experimental results show that our method can achieve the accuracy of 99.52%and the F1-score of 99.52%with only 1%of the labeled training data based on the CICDDoS2019 dataset.Moreover,our method outperforms the stateof-the-art supervised learning-based methods in terms of accuracy,precision,recall and F1-score with 1%of the training data. 展开更多
关键词 malicious traffic detection semi-supervised learning Internet of Things(Io T) TRANSFORMER masked behavior model
下载PDF
An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud 被引量:1
10
作者 P.Sherubha S.P.Sasirekha +4 位作者 A.Dinesh Kumar Anguraj J.Vakula Rani Raju Anitha S.Phani Praveen R.Hariharan Krishnan 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期149-166,共18页
The Cloud system shows its growing functionalities in various industrial applications.The safety towards data transfer seems to be a threat where Network Intrusion Detection System(NIDS)is measured as an essential ele... The Cloud system shows its growing functionalities in various industrial applications.The safety towards data transfer seems to be a threat where Network Intrusion Detection System(NIDS)is measured as an essential element to fulfill security.Recently,Machine Learning(ML)approaches have been used for the construction of intellectual IDS.Most IDS are based on ML techniques either as unsupervised or supervised.In supervised learning,NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns.Similarly,the unsupervised model fails to provide a satisfactory outcome.Hence,to boost the functionality of unsupervised learning,an effectual auto-encoder is applied for feature selection to select good features.Finally,the Naïve Bayes classifier is used for classification purposes.This approach exposes the finest generalization ability to train the data.The unlabelled data is also used for adoption towards data analysis.Here,redundant and noisy samples over the dataset are eliminated.To validate the robustness and efficiency of NIDS,the anticipated model is tested over the NSL-KDD dataset.The experimental outcomes demonstrate that the anticipated approach attains superior accuracy with 93%,which is higher compared to J48,AB tree,Random Forest(RF),Regression Tree(RT),Multi-Layer Perceptrons(MLP),Support Vector Machine(SVM),and Fuzzy.Similarly,False Alarm Rate(FAR)and True Positive Rate(TPR)of Naive Bayes(NB)is 0.3 and 0.99,respectively.When compared to prevailing techniques,the anticipated approach also delivers promising outcomes. 展开更多
关键词 Network intrusion detection system feature selection auto-encoder support vector machine(SVM) ANOMALY
下载PDF
A Fluorescent Probe based on a Carbazole Derivative for Detecting Brilliant Blue in Food
11
作者 YANG Yunqiong YANG Jiaxin +3 位作者 FEI Shaojun ZHANG Zhirui LIU Yang ZHANG Hao 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2023年第2期308-311,共4页
Here a fluorescent probe based on a carbazole derivative(CNS)was developed to increase the detection range and reduce the detection limit of brilliant blue.Characteristics of CNS are studied.Due to the quenching abili... Here a fluorescent probe based on a carbazole derivative(CNS)was developed to increase the detection range and reduce the detection limit of brilliant blue.Characteristics of CNS are studied.Due to the quenching ability of colorants,CNS shows an excellent current response to brilliant blue(from 1 to 10μM)with a detection limit of 2.7×10^(-8)mol/L(3σ/k)in the conditions of a 1:1 volume ratio of water to tetrahydrofuran.And the stability and reproducibility of CNS in the detection of actual samples indicate great potential for application. 展开更多
关键词 fluorescent probe carbazole derivative brilliant blue DETECTION
下载PDF
The concept of sUAS/DL-based system for detecting and classifying abandoned small firearms
12
作者 Jungmok Ma Oleg A.Yakimenko 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第12期23-31,共9页
Military object detection and identification is a key capability in surveillance and reconnaissance.It is a major factor in warfare effectiveness and warfighter survivability.Inexpensive,portable,and rapidly deployabl... Military object detection and identification is a key capability in surveillance and reconnaissance.It is a major factor in warfare effectiveness and warfighter survivability.Inexpensive,portable,and rapidly deployable small unmanned aerial systems(s UAS)in conjunction with powerful deep learning(DL)based object detection models are expected to play an important role for this application.To prove overall feasibility of this approach,this paper discusses some aspects of designing and testing of an automated detection system to locate and identify small firearms left at the training range or at the battlefield.Such a system is envisioned to involve an s UAS equipped with a modern electro-optical(EO)sensor and relying on a trained convolutional neural network(CNN).Previous study by the authors devoted to finding projectiles on the ground revealed certain challenges such as small object size,changes in aspect ratio and image scale,motion blur,occlusion,and camouflage.This study attempts to deal with these challenges in a realistic operational scenario and go further by not only detecting different types of firearms but also classifying them into different categories.This study used a YOLOv2CNN(Res Net-50 backbone network)to train the model with ground truth data and demonstrated a high mean average precision(m AP)of 0.97 to detect and identify not only small pistols but also partially occluded rifles. 展开更多
关键词 Small firearms Object detection Deep learning Small unmanned aerial systems
下载PDF
Blockchain‑oriented approach for detecting cyber‑attack transactions
13
作者 Zhiqi Feng Yongli Li Xiaochen Ma 《Financial Innovation》 2023年第1期2190-2227,共38页
With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial secu... With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial security has become a top priority with the sustainable development of blockchain-based platforms because of an increasing number of cyber attacks,which have resulted in a huge loss of crypto assets in recent years.Therefore,it is imperative to study the real-time detection of cyber attacks to facilitate effective supervision and regulation.To this end,this paper proposes the weighted and extended isolation forest algorithms and designs a novel framework for the real-time detection of cyber-attack transactions by thoroughly studying and summarizing real-world examples.Furthermore,this study develops a new detection approach for locating the compromised address of a cyber attack to resolve the data scarcity of hack addresses and reduce time consumption.Moreover,three experiments are carried out not only to apply on different types of cyber attacks but also to compare the proposed approach with the widely used existing methods.The results demonstrate the high efficiency and generality of the proposed approach.Finally,the lower time consumption and robustness of our method were validated through additional experiments.In conclusion,the proposed blockchain-oriented approach in this study can handle real-time detection of cyber attacks and has significant scope for applications. 展开更多
关键词 Blockchain Cyber-attack detection Extended isolation forest Decentralized application Financial security Fintech
下载PDF
Deep learning-based method for detecting anomalies in electromagnetic environment situation
14
作者 Wei-lin Hu Lun-wen Wang +2 位作者 Chuang Peng Ran-gang Zhu Meng-bo Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第8期231-241,共11页
The anomaly detection of electromagnetic environment situation(EMES) has essential reference value for electromagnetic equipment behavior cognition and battlefield threat assessment.In this paper,we proposed a deep le... The anomaly detection of electromagnetic environment situation(EMES) has essential reference value for electromagnetic equipment behavior cognition and battlefield threat assessment.In this paper,we proposed a deep learning-based method for detecting anomalies in EMES to address the problem of relatively low efficiency of electromagnetic environment situation anomaly detection(EMES-AD).Firstly,the convolutional kernel extracts the static features of different regions of the EMES.Secondly,the dynamic features of the region are obtained by using a recurrent neural network(LSTM).Thirdly,the Spatio-temporal features of the region are recovered by using a de-convolutional network and then fused to predict the EMES.The structural similarity algorithm(SSIM) is used to determine whether it is anomalous.We developed the detection framework,de-signed the network parameters,simulated the data sets containing different anomalous types of EMES,and carried out the detection experiments.The experimental results show that the proposed method is effective. 展开更多
关键词 Electromagnetic environment situation(EMES) Anomaly detection(AD) Regional features integration LSTM CNN
下载PDF
The Possibility of Detecting our Solar System through Astrometry
15
作者 Dong-Hong Wu 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2023年第11期198-204,共7页
Searching for exoplanets with different methods has always been the focus of astronomers over the past few years.Among multiple planet detection techniques,astrometry stands out for its capability to accurately determ... Searching for exoplanets with different methods has always been the focus of astronomers over the past few years.Among multiple planet detection techniques,astrometry stands out for its capability to accurately determine the orbital parameters of exoplanets.In this study,we examine the likelihood of extraterrestrial intelligent civilizations detecting planets in our solar system using the astrometry method.By conducting injection-recovery simulations,we investigate the detectability of the four giant planets in our solar system under different observing baselines and observational errors.Our findings indicate that extraterrestrial intelligence could detect and characterize all four giant planets,provided they are observed for a minimum of 90 yr with signal-noise ratios exceeding 1.For individual planets such as Jupiter,Saturn,and Neptune,a baseline that surpasses half of their orbital periods is necessary for detection.However,Uranus requires longer observing baselines since its orbital period is roughly half of that of Neptune.If the astrometry precision is equal to or better than 10μas,all 8707 stars located within30 pc of our solar system possess the potential to detect the four giant planets within 100 yr.Additionally,our prediction suggests that over 300 stars positioned within 10 pc from our solar system could detect our Earth if they achieve an astrometry precision of 0.3μas. 展开更多
关键词 ASTROMETRY planets and satellites:detection Planetary Systems
下载PDF
Dense Spatial-Temporal Graph Convolutional Network Based on Lightweight OpenPose for Detecting Falls
16
作者 Xiaorui Zhang Qijian Xie +2 位作者 Wei Sun Yongjun Ren Mithun Mukherjee 《Computers, Materials & Continua》 SCIE EI 2023年第10期47-61,共15页
Fall behavior is closely related to high mortality in the elderly,so fall detection becomes an important and urgent research area.However,the existing fall detection methods are difficult to be applied in daily life d... Fall behavior is closely related to high mortality in the elderly,so fall detection becomes an important and urgent research area.However,the existing fall detection methods are difficult to be applied in daily life due to a large amount of calculation and poor detection accuracy.To solve the above problems,this paper proposes a dense spatial-temporal graph convolutional network based on lightweight OpenPose.Lightweight OpenPose uses MobileNet as a feature extraction network,and the prediction layer uses bottleneck-asymmetric structure,thus reducing the amount of the network.The bottleneck-asymmetrical structure compresses the number of input channels of feature maps by 1×1 convolution and replaces the 7×7 convolution structure with the asymmetric structure of 1×7 convolution,7×1 convolution,and 7×7 convolution in parallel.The spatial-temporal graph convolutional network divides the multi-layer convolution into dense blocks,and the convolutional layers in each dense block are connected,thus improving the feature transitivity,enhancing the network’s ability to extract features,thus improving the detection accuracy.Two representative datasets,Multiple Cameras Fall dataset(MCF),and Nanyang Technological University Red Green Blue+Depth Action Recognition dataset(NTU RGB+D),are selected for our experiments,among which NTU RGB+D has two evaluation benchmarks.The results show that the proposed model is superior to the current fall detection models.The accuracy of this network on the MCF dataset is 96.3%,and the accuracies on the two evaluation benchmarks of the NTU RGB+D dataset are 85.6%and 93.5%,respectively. 展开更多
关键词 Fall detection lightweight OpenPose spatial-temporal graph convolutional network dense blocks
下载PDF
Detecting Double JPEG Compressed Color Images via an Improved Approach
17
作者 Xiaojie Zhao Xiankui Meng +2 位作者 Ruyong Ren Shaozhang Niu Zhenguang Gao 《Computers, Materials & Continua》 SCIE EI 2023年第4期1765-1781,共17页
Detecting double Joint Photographic Experts Group (JPEG) compressionfor color images is vital in the field of image forensics. In previousresearches, there have been various approaches to detecting double JPEGcompress... Detecting double Joint Photographic Experts Group (JPEG) compressionfor color images is vital in the field of image forensics. In previousresearches, there have been various approaches to detecting double JPEGcompression with different quantization matrices. However, the detectionof double JPEG color images with the same quantization matrix is stilla challenging task. An effective detection approach to extract features isproposed in this paper by combining traditional analysis with ConvolutionalNeural Networks (CNN). On the one hand, the number of nonzero pixels andthe sum of pixel values of color space conversion error are provided with 12-dimensional features through experiments. On the other hand, the roundingerror, the truncation error and the quantization coefficient matrix are used togenerate a total of 128-dimensional features via a specially designed CNN. Insuch aCNN, convolutional layers with fixed kernel of 1×1 and Dropout layersare adopted to prevent overfitting of the model, and an average pooling layeris used to extract local characteristics. In this approach, the Support VectorMachine (SVM) classifier is applied to distinguishwhether a given color imageis primarily or secondarily compressed. The approach is also suitable for thecase when customized needs are considered. The experimental results showthat the proposed approach is more effective than some existing ones whenthe compression quality factors are low. 展开更多
关键词 Color image forensics double JPEG compression detection the same quantization matrix CNN
下载PDF
Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm
18
作者 Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam +6 位作者 Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期553-574,共22页
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the network.IPv6 has introduced new features like Neighbour Discovery Protocol(NDP)and A... Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the network.IPv6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address Auto-configuration Scheme.IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol(ICMPv6).IPv6 is vulnerable to numerous attacks like Denial of Service(DoS)and Distributed Denial of Service(DDoS)which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications.Therefore,an Intrusion Detection System(IDS)is a monitoring system of the security of a network that detects suspicious activities and deals with amassive amount of data comprised of repetitive and inappropriate features which affect the detection rate.A feature selection(FS)technique helps to reduce the computation time and complexity by selecting the optimum subset of features.This paper proposes a method for detecting DDoS flooding attacks(FA)based on ICMPv6 messages using a Binary Flower PollinationAlgorithm(BFPA-FA).The proposed method(BFPA-FA)employs FS technology with a support vector machine(SVM)to identify the most relevant,influential features.Moreover,The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios.The results show that the proposed method BFPAFA achieved the best accuracy rate(97.96%)for the ICMPv6 DDoS detection with a reduced number of features(9)to half the total(19)features.The proven proposed method BFPA-FAis effective in the ICMPv6 DDoS attacks via IDS. 展开更多
关键词 IPv6 ICMPV6 DDoS feature selection flower pollination algorithm anomaly detection
下载PDF
A PCR-Based Method for Detecting Pathogen of Rice False Smut
19
作者 Liu Lian-fu HaseebYounis +6 位作者 Peng Li-li Yang Shuo Yang Song-run Shu Yu-wei Wang Meng Mukadasi Rexiti Zhang Jun-hua 《Journal of Northeast Agricultural University(English Edition)》 CAS 2023年第3期30-35,共6页
Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to dete... Rice false smut is a destructive disease that affects rice grain badly.The disease seriously affects the yield and quality of rice in Heilongjiang Province.In this paper,a pair of specific primers was designed to detect the false smut pathogen rapidly and efficiently.The results showed that the pair of primers had strong specificity for false smut pathogen.In addition,the sensitivity of this primer to the genomic DNA of rice false smut pathogen in PCR reaction was 1 pg.By using these primers,the rice false smut pathogen could be detected within 48 h after inoculation,and a PCR reaction system with good specificity and high sensitivity was established. 展开更多
关键词 rice false smut PCR reaction system molecular detection
下载PDF
Enhanced Deep Learning for Detecting Suspicious Fall Event in Video Data
20
作者 Madhuri Agrawal Shikha Agrawal 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2653-2667,共15页
Suspicious fall events are particularly significant hazards for the safety of patients and elders.Recently,suspicious fall event detection has become a robust research case in real-time monitoring.This paper aims to d... Suspicious fall events are particularly significant hazards for the safety of patients and elders.Recently,suspicious fall event detection has become a robust research case in real-time monitoring.This paper aims to detect suspicious fall events during video monitoring of multiple people in different moving back-grounds in an indoor environment;it is further proposed to use a deep learning method known as Long Short Term Memory(LSTM)by introducing visual atten-tion-guided mechanism along with a bi-directional LSTM model.This method contributes essential information on the temporal and spatial locations of‘suspi-cious fall’events in learning the video frame in both forward and backward direc-tions.The effective“You only look once V4”(YOLO V4)–a real-time people detection system illustrates the detection of people in videos,followed by a track-ing module to get their trajectories.Convolutional Neural Network(CNN)fea-tures are extracted for each person tracked through bounding boxes.Subsequently,a visual attention-guided Bi-directional LSTM model is proposed for the final suspicious fall event detection.The proposed method is demonstrated using two different datasets to illustrate the efficiency.The proposed method is evaluated by comparing it with other state-of-the-art methods,showing that it achieves 96.9%accuracy,good performance,and robustness.Hence,it is accep-table to monitor and detect suspicious fall events. 展开更多
关键词 Convolutional neural network(CNN) Bi-directional long short term memory(Bi-directional LSTM) you only look once v4(YOLO-V4) fall detection computer vision
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部