期刊文献+
共找到1,504篇文章
< 1 2 76 >
每页显示 20 50 100
ADCP-YOLO:A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops
1
作者 Changjun Zhou Dongfang Chen +1 位作者 Chenyang Shi Taiyong Li 《Computers, Materials & Continua》 2026年第3期1895-1919,共25页
With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and exc... With the rapid development of smart manufacturing,intelligent safety monitoring in industrial workshops has become increasingly important.To address the challenges of complex backgrounds,target scale variation,and excessive model parameters in worker violation detection,this study proposes ADCP-YOLO,an enhanced lightweight model based on YOLOv8.Here,“ADCP”represents four key improvements:Alterable Kernel Convolution(AKConv),Dilated-Wise Residual(DWR)module,Channel Reconstruction Global Attention Mechanism(CRGAM),and Powerful-IoU loss.These components collaboratively enhance feature extraction,multi-scale perception,and localization accuracy while effectively reducing model complexity and computational cost.Experimental results show that ADCP-YOLO achieves a mAP of 90.6%,surpassing YOLOv8 by 3.0%with a 6.6%reduction in parameters.These findings demonstrate that ADCP-YOLO successfully balances accuracy and efficiency,offering a practical solution for intelligent safety monitoring in smart factory workshops. 展开更多
关键词 YOLO violation behavior detection AKConv CRGAM DWR Powerful-IoU
在线阅读 下载PDF
Lightweight Airborne Vision Abnormal Behavior Detection Algorithm Based on Dual-Path Feature Optimization
2
作者 Baixuan Han Yueping Peng +5 位作者 Zecong Ye Hexiang Hao Xuekai Zhang Wei Tang Wenchao Kang Qilong Li 《Computers, Materials & Continua》 2026年第2期754-784,共31页
Aiming at the problem of imbalance between detection accuracy and algorithm model lightweight in UAV aerial image target detection algorithm,a lightweight multi-category abnormal behavior detection algorithm based on ... Aiming at the problem of imbalance between detection accuracy and algorithm model lightweight in UAV aerial image target detection algorithm,a lightweight multi-category abnormal behavior detection algorithm based on improved YOLOv11n is designed.By integrating multi-head grouped self-attention mechanism and Partial-Conv,a two-way feature grouping fusion module(DFPF)was designed,which carried out effective channel segmentation and fusion strategies to reduce redundant calculations andmemory access.C3K2 module was improved,and then unstructured pruning and feature distillation technologywere used.The algorithmmodel is lightweight,and the feature extraction ability for airborne visual abnormal behavior targets is strengthened,and the computational efficiency of the model is improved.Finally,we test the generalization of the baseline model and the improved model on the VisDrone2019 dataset.The results show that com-pared with the baseline model,the detection accuracy of the final improved model on the airborne visual abnormal behavior dataset is improved from 90.2% to 94.8%,and the model parameters are reduced by 50.9% to meet the detection requirements of high efficiency and high precision.The detection accuracy of the improved model on the Vis-Drone2019 public dataset is 1.3% higher than that of the baseline model,indicating the effectiveness of the improved method in this paper. 展开更多
关键词 YOLOv11 algorithm multi-class abnormal behavior detection feature extraction UAV aerial photography datasets
在线阅读 下载PDF
A Hybrid Deep Learning Approach for Real-Time Cheating Behaviour Detection in Online Exams Using Video Captured Analysis
3
作者 Dao Phuc Minh Huy Gia Nhu Nguyen Dac-Nhuong Le 《Computers, Materials & Continua》 2026年第3期1179-1198,共20页
Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning appr... Online examinations have become a dominant assessment mode,increasing concerns over academic integrity.To address the critical challenge of detecting cheating behaviours,this study proposes a hybrid deep learning approach that combines visual detection and temporal behaviour classification.The methodology utilises object detection models—You Only Look Once(YOLOv12),Faster Region-based Convolutional Neural Network(RCNN),and Single Shot Detector(SSD)MobileNet—integrated with classification models such as Convolutional Neural Networks(CNN),Bidirectional Gated Recurrent Unit(Bi-GRU),and CNN-LSTM(Long Short-Term Memory).Two distinct datasets were used:the Online Exam Proctoring(EOP)dataset from Michigan State University and the School of Computer Science,Duy Tan Unievrsity(SCS-DTU)dataset collected in a controlled classroom setting.A diverse set of cheating behaviours,including book usage,unauthorised interaction,internet access,and mobile phone use,was categorised.Comprehensive experiments evaluated the models based on accuracy,precision,recall,training time,inference speed,and memory usage.We evaluate nine detector-classifier pairings under a unified budget and score them via a calibrated harmonic mean of detection and classification accuracies,enabling deployment-oriented selection under latency and memory constraints.Macro-Precision/Recall/F1 and Receiver Operating Characteristic-Area Under the Curve(ROC-AUC)are reported for the top configurations,revealing consistent advantages of object-centric pipelines for fine-grained cheating cues.The highest overall score is achieved by YOLOv12+CNN(97.15%accuracy),while SSD-MobileNet+CNN provides the best speed-efficiency trade-off for edge devices.This research provides valuable insights into selecting and deploying appropriate deep learning models for maintaining exam integrity under varying resource constraints. 展开更多
关键词 Online exam proctoring cheating behavior detection deep learning real-time monitoring object detection human behavior recognition
在线阅读 下载PDF
Real-Time Classroom Behavior Detection and Visualization System Based on an Improved YOLOv11
4
作者 Jiajun Li Nannan Wang +2 位作者 Junhao Zhang Xiaozhou Yao Wei Wei 《教育技术与创新》 2025年第4期1-13,共13页
Automatic analysis of student behavior in classrooms has gained importance with the rise of smart education and vision technologies.However,the limited real-time accuracy of existing methods severely constrains their ... Automatic analysis of student behavior in classrooms has gained importance with the rise of smart education and vision technologies.However,the limited real-time accuracy of existing methods severely constrains their practical classroom deployment.To address this issue of low accuracy,we propose an improved YOLOv11-based detector that integrates CARAFE upsampling,DySnakeConv,DyHead,and SMFA fusion modules.This new model for real-time classroom behavior detection captures fine-grained student behaviors with low latency.Additionally,we have developed a visualization system that presents data through intuitive dashboards.This system enables teachers to dynamically grasp classroom engagement by tracking student participation and involvement.The enhanced YOLOv11 model achieves an mAP@0.5 of 87.2%on the evaluated datasets,surpassing baseline models.This significance lies in two aspects.First,it provides a practical technical route for deployable live classroom behavior monitoring and engagement feedback systems.Second,by integrating this proposed system,educators could make data-informed and fine-grained teaching decisions,ultimately improving instructional quality and learning outcomes. 展开更多
关键词 classroom behavior detection real-time object detection student engagement visualization dashboard AI in education
在线阅读 下载PDF
Dual Clustering Detection Model of Power Theft Based on User Behavior Analysis
5
作者 Dongdong Zhang Feng Jiang +3 位作者 Hui Hwang Goh Tianhao Liu Hui Liu Thomas Wu 《CSEE Journal of Power and Energy Systems》 2025年第5期2165-2177,共13页
Under the background of big data,a series of power theft behaviors of residents not only cause significant economic losses but also bring incalculable security risks.According to the unique characteristics of resident... Under the background of big data,a series of power theft behaviors of residents not only cause significant economic losses but also bring incalculable security risks.According to the unique characteristics of residential users,a dual clustering detection model of power theft is proposed in this paper based on analysis of users’power consumption behavior.First,by establishing a preliminary diagnosis model of power theft based on improved K-means clustering,shortcomings of the original Kmeans algorithm,such as determination of the K value and initial cluster center,low calculation efficiency,and vulnerability to noise,are improved.Second,based on power consumption characteristics of residential users,their power consumption behavior patterns are classified,11 types of residential power consumption patterns are summarized,and the final set of power thieves is determined by curve similarity analysis.Simulation results show the proposed model can significantly improve detection rate,false detection rate,and other evaluation indicators for the dataset of residential users at the same time,which provides a reference for power theft detection in power supply companies. 展开更多
关键词 Anomaly detection curve similarity comparison K-means clustering power consumption behavior
原文传递
Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies
6
作者 Seong-Su Yoon Dong-Hyuk Shin Ieck-Chae Euom 《Computer Modeling in Engineering & Sciences》 2025年第11期2683-2706,共24页
With the continuous expansion of digital infrastructures,malicious behaviors in host systems have become increasingly sophisticated,often spanning multiple processes and employing obfuscation techniques to evade detec... With the continuous expansion of digital infrastructures,malicious behaviors in host systems have become increasingly sophisticated,often spanning multiple processes and employing obfuscation techniques to evade detection.Audit logs,such as Sysmon,offer valuable insights;however,existing approaches typically flatten event sequences or rely on generic graph models,thereby discarding the natural parent-child process hierarchy that is critical for analyzing multiprocess attacks.This paper proposes a structure-aware threat detection framework that transforms audit logs into a unified two-dimensional(2D)spatio-temporal representation,where process hierarchy is modeled as the spatial axis and event chronology as the temporal axis.In addition,entropy-based features are incorporated to robustly capture obfuscated and non-linguistic strings,overcoming the limitations of semantic embeddings.The model’s performance was evaluated on publicly available datasets,achieving competitive results with an accuracy exceeding 95%and an F1-score of at least 0.94.The proposed approach provides a promising and reproducible solution for detecting attacks with unknown indicators of compromise(IoCs)by analyzing the relationships and behaviors of processes recorded in large-scale audit logs. 展开更多
关键词 System security anomaly detection host-based log analysis hierarchical process structure machine learning deep learning malicious behavior
在线阅读 下载PDF
A Transactional-Behavior-Based Hierarchical Gated Network for Credit Card Fraud Detection
7
作者 Yu Xie MengChu Zhou +3 位作者 Guanjun Liu Lifei Wei Honghao Zhu Pasquale De Meo 《IEEE/CAA Journal of Automatica Sinica》 2025年第7期1489-1503,共15页
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system,as well as to enforce customer confidence in digital payment systems.Historically,credit ca... The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system,as well as to enforce customer confidence in digital payment systems.Historically,credit card companies have used rulebased approaches to detect fraudulent transactions,but these have proven inadequate due to the complexity of fraud strategies and have been replaced by much more powerful solutions based on machine learning or deep learning algorithms.Despite significant progress,the current approaches to fraud detection suffer from a number of limitations:for example,it is unclear whether some transaction features are more effective than others in discriminating fraudulent transactions,and they often neglect possible correlations among transactions,even though they could reveal illicit behaviour.In this paper,we propose a novel credit card fraud detection(CCFD)method based on a transaction behaviour-based hierarchical gated network.First,we introduce a feature-oriented extraction module capable of identifying key features from original transactions,and such analysis is effective in revealing the behavioural characteristics of fraudsters.Second,we design a transaction-oriented extraction module capable of capturing the correlation between users’historical and current transactional behaviour.Such information is crucial for revealing users’sequential behaviour patterns.Our approach,called transactional-behaviour-based hierarchical gated network model(TbHGN),extracts two types of new transactional features,which are then combined in a feature interaction module to learn the final transactional representations used for CCFD.We have conducted extensive experiments on a real-world credit card transaction dataset with an increase in average F1 between 1.42%and 6.53%and an improvement in average AUC between 0.63%and 2.78%over the state of the art. 展开更多
关键词 Credit card fraud detection(CCFD) feature extraction gated recurrent network transactional behavior
在线阅读 下载PDF
Research on Android Malware Detection and Interception Based on Behavior Monitoring 被引量:5
8
作者 PENG Guojun SHAO Yuru +2 位作者 WANG Taige ZHAN Xian ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2012年第5期421-427,共7页
Focusing on the sensitive behaviors of malware, such as privacy stealing and money costing, this paper proposes a new method to monitor software behaviors and detect malicious applications on Android platform. Accordi... Focusing on the sensitive behaviors of malware, such as privacy stealing and money costing, this paper proposes a new method to monitor software behaviors and detect malicious applications on Android platform. According to the theory and implementation of Android Binder interprocess communication mechanism, a prototype system that integrates behavior monitoring and intercepting, malware detection, and identification is built in this work. There are 50 different kinds of samples used in the experiment of malware detection, including 40 normal samples and 10 malicious samples. The theoretical analysis and experimental result demonstrate that this system is effective in malware detection and interception, with a true positive rate equal to 100% and a false positive rate less than 3%. 展开更多
关键词 ANDROID software behavior smartphone security malware detection
原文传递
An Unknown Trojan Detection Method Based on Software Network Behavior 被引量:2
9
作者 LIANG Yu PENG Guojun +1 位作者 ZHANG Huanguo WANG Ying 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期369-376,共8页
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) atta... Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) attack intents: besides dealing with damaging or destroying facilities, the more essential purpose of APT attacks is to gather confidential data from target hosts by planting Trojans. Inspired by this idea and some in-depth analyses on recently happened APT attacks, five typical communication characteristics are adopted to describe application’s network behavior, with which a fine-grained classifier based on Decision Tree and Na ve Bayes is modeled. Finally, with the training of supervised machine learning approaches, the classification detection method is implemented. Compared with general methods, this method is capable of enhancing the detection and awareness capability of unknown Trojans with less resource consumption. 展开更多
关键词 targeted attack unknown Trojan detection software network behavior machine learning
原文传递
Abnormal behavior detection by causality analysis and sparse reconstruction 被引量:1
10
作者 WANG Jun XIA Li-min 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第12期2842-2852,共11页
A new approach for abnormal behavior detection was proposed using causality analysis and sparse reconstruction. To effectively represent multiple-object behavior, low level visual features and causality features were ... A new approach for abnormal behavior detection was proposed using causality analysis and sparse reconstruction. To effectively represent multiple-object behavior, low level visual features and causality features were adopted. The low level visual features, which included trajectory shape descriptor, speeded up robust features and histograms of optical flow, were used to describe properties of individual behavior, and causality features obtained by causality analysis were introduced to depict the interaction information among a set of objects. In order to cope with feature noisy and uncertainty, a method for multiple-object anomaly detection was presented via a sparse reconstruction. The abnormality of the testing sample was decided by the sparse reconstruction cost from an atomically learned dictionary. Experiment results show the effectiveness of the proposed method in comparison with other state-of-the-art methods on the public databases for abnormal behavior detection. 展开更多
关键词 ABNORMAL behavior detection GRANGER CAUSALITY test CAUSALITY FEATURE SPARSE RECONSTRUCTION
在线阅读 下载PDF
Outlier Behavior Detection for Indoor Environment Based on t-SNE Clustering 被引量:3
11
作者 Shinjin Kang Soo Kyun Kim 《Computers, Materials & Continua》 SCIE EI 2021年第9期3725-3736,共12页
In this study,we propose a low-cost system that can detect the space outlier utilization of residents in an indoor environment.We focus on the users’app usage to analyze unusual behavior,especially in indoor spaces.T... In this study,we propose a low-cost system that can detect the space outlier utilization of residents in an indoor environment.We focus on the users’app usage to analyze unusual behavior,especially in indoor spaces.This is reflected in the behavioral analysis in that the frequency of using smartphones in personal spaces has recently increased.Our system facilitates autonomous data collection from mobile app logs and Google app servers and generates a high-dimensional dataset that can detect outlier behaviors.The density-based spatial clustering of applications with noise(DBSCAN)algorithm was applied for effective singular movement analysis.To analyze high-level mobile phone usage,the t-distributed stochastic neighbor embedding(t-SNE)algorithm was employed.These two clustering algorithms can effectively detect outlier behaviors in terms of movement and app usage in indoor spaces.The experimental results showed that our system enables effective spatial behavioral analysis at a low cost when applied to logs collected in actual living spaces.Moreover,large volumes of data required for outlier detection can be easily acquired.The system can automatically detect the unusual behavior of a user in an indoor space.In particular,this study aims to reflect the recent trend of the increasing use of smartphones in indoor spaces to the behavioral analysis. 展开更多
关键词 Outlier detection trajectory clustering behavior analysis app data SMARTPHONE
在线阅读 下载PDF
BARN:Behavior-Aware Relation Network for multi-label behavior detection in socially housed macaques 被引量:1
12
作者 Sen Yang Zhi-Yuan Chen +5 位作者 Ke-Wei Liang Cai-Jie Qin Yang Yang Wen-Xuan Fan Chen-Lu Jie Xi-Bo Ma 《Zoological Research》 SCIE CSCD 2023年第6期1026-1038,共13页
Quantification of behaviors in macaques provides crucial support for various scientific disciplines,including pharmacology,neuroscience,and ethology.Despite recent advancements in the analysis of macaque behavior,rese... Quantification of behaviors in macaques provides crucial support for various scientific disciplines,including pharmacology,neuroscience,and ethology.Despite recent advancements in the analysis of macaque behavior,research on multi-label behavior detection in socially housed macaques,including consideration of interactions among them,remains scarce.Given the lack of relevant approaches and datasets,we developed the Behavior-Aware Relation Network(BARN)for multi-label behavior detection of socially housed macaques.Our approach models the relationship of behavioral similarity between macaques,guided by a behavior-aware module and novel behavior classifier,which is suitable for multi-label classification.We also constructed a behavior dataset of rhesus macaques using ordinary RGB cameras mounted outside their cages.The dataset included 65?913 labels for19 behaviors and 60?367 proposals,including identities and locations of the macaques.Experimental results showed that BARN significantly improved the baseline SlowFast network and outperformed existing relation networks.In conclusion,we successfully achieved multilabel behavior detection of socially housed macaques with both economic efficiency and high accuracy. 展开更多
关键词 Macaque behavior Drug safety assessment Multi-label behavior detection behavioral similarity Relation network
在线阅读 下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network 被引量:1
13
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
在线阅读 下载PDF
Abnormal Crowd Behavior Detection Based on the Entropy of Optical Flow 被引量:1
14
作者 Zheyi Fan Wei Li +1 位作者 Zhonghang He Zhiwen Liu 《Journal of Beijing Institute of Technology》 EI CAS 2019年第4期756-763,共8页
To improve the detection accuracy and robustness of crowd anomaly detection,especially crowd emergency evacuation detection,the abnormal crowd behavior detection method is proposed.This method is based on the improved... To improve the detection accuracy and robustness of crowd anomaly detection,especially crowd emergency evacuation detection,the abnormal crowd behavior detection method is proposed.This method is based on the improved statistical global optical flow entropy which can better describe the degree of chaos of crowd.First,the optical flow field is extracted from the video sequences and a 2D optical flow histogram is gained.Then,the improved optical flow entropy,combining information theory with statistical physics is calculated from 2D optical flow histograms.Finally,the anomaly can be detected according to the abnormality judgment formula.The experimental results show that the detection accuracy achieved over 95%in three public video datasets,which indicates that the proposed algorithm outperforms other state-of-the-art algorithms. 展开更多
关键词 abnormal events detection optical flows entropy crowded scenes crowd behavior
在线阅读 下载PDF
Abnormal Crowd Behavior Detection Using Optimized Pyramidal Lucas-Kanade Technique 被引量:1
15
作者 G.Rajasekaran J.Raja Sekar 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2399-2412,共14页
Abnormal behavior detection is challenging and one of the growing research areas in computer vision.The main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/u... Abnormal behavior detection is challenging and one of the growing research areas in computer vision.The main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/uncertain events.In this work,Pyramidal Lucas Kanade algorithm is optimized using EME-HOs to achieve the objective.First stage,OPLKT-EMEHOs algorithm is used to generate the opticalflow from MIIs.Second stage,the MIIs opticalflow is applied as input to 3 layer CNN for detect the abnormal crowd behavior.University of Minnesota(UMN)dataset is used to evaluate the proposed system.The experi-mental result shows that the proposed method provides better classification accu-racy by comparing with the existing methods.Proposed method provides 95.78%of precision,90.67%of recall,93.09%of f-measure and accuracy with 91.67%. 展开更多
关键词 Crowd behavior analysis anomaly detection Motion Information
在线阅读 下载PDF
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior 被引量:1
16
作者 Faisal Alghayadh Debatosh Debnath 《Advances in Internet of Things》 2021年第1期10-25,共16页
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ... With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique. 展开更多
关键词 Anomaly detection Smart Home Systems behavioral Patterns SECURITY Threats
在线阅读 下载PDF
A Detection Algorithm for Two-Wheeled Vehicles in Complex Scenarios Based on Semi-Supervised Learning
17
作者 Mingen Zhong Kaibo Yang +4 位作者 Ziji Xiao Jiawei Tan Kang Fan Zhiying Deng Mengli Zhou 《Computers, Materials & Continua》 2025年第7期1055-1071,共17页
With the rapid urbanization and exponential population growth in China,two-wheeled vehicles have become a popular mode of transportation,particularly for short-distance travel.However,due to a lack of safety awareness... With the rapid urbanization and exponential population growth in China,two-wheeled vehicles have become a popular mode of transportation,particularly for short-distance travel.However,due to a lack of safety awareness,traffic violations by two-wheeled vehicle riders have become a widespread concern,contributing to urban traffic risks.Currently,significant human and material resources are being allocated to monitor and intercept non-compliant riders to ensure safe driving behavior.To enhance the safety,efficiency,and cost-effectiveness of traffic monitoring,automated detection systems based on image processing algorithms can be employed to identify traffic violations from eye-level video footage.In this study,we propose a robust detection algorithm specifically designed for two-wheeled vehicles,which serves as a fundamental step toward intelligent traffic monitoring.Our approach integrates a novel convolutional and attention mechanism to improve detection accuracy and efficiency.Additionally,we introduce a semi-supervised training strategy that leverages a large number of unlabeled images to enhance the model’s learning capability by extracting valuable background information.This method enables the model to generalize effectively to diverse urban environments and varying lighting conditions.We evaluate our proposed algorithm on a custom-built dataset,and experimental results demonstrate its superior performance,achieving an average precision(AP)of 95%and a recall(R)of 90.6%.Furthermore,the model maintains a computational efficiency of only 25.7 GFLOPs while achieving a high processing speed of 249 FPS,making it highly suitable for deployment on edge devices.Compared to existing detection methods,our approach significantly enhances the accuracy and robustness of two-wheeled vehicle identification while ensuring real-time performance. 展开更多
关键词 Two wheeled vehicles illegal behavior detection object detection semi supervised learning deep learning TRANSFORMER convolutional neural network
在线阅读 下载PDF
Fuzzy Logic Based UAV Suspicious Behavior Detection
18
作者 Sun Rui Zhang Yucheng Hu Minghua 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2016年第6期-,共5页
In recent years,unmanned air vehicles(UAVs)are widely used in many military and civilian applications.With the big amount of UAVs operation in air space,the potential security and privacy problems are arising.This can... In recent years,unmanned air vehicles(UAVs)are widely used in many military and civilian applications.With the big amount of UAVs operation in air space,the potential security and privacy problems are arising.This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes.Therefore,it is crucial to promptly identify the suspicious behaviors from the surrounding UAVs for some important regions.In this paper,a novel fuzzy logic based UAV behavior detection system has been presented to detect the different levels of risky behaviors of the incoming UAVs.The heading velocity and region type are two input indicators proposed for the risk indicator output in the designed fuzzy logic based system.The simulation has shown the effective and feasible of the proposed algorithm in terms of recall and precision of the detection.Especially,the suspicious behavior detection algorithm can provide a recall of 0.89 and a precision of 0.95 for the high risk scenario in the simulation. 展开更多
关键词 UAV suspicious behavior detection fuzzy logic decision making
在线阅读 下载PDF
Image sequence-based risk behavior detection of power operation inspection personnel
19
作者 Changyu Cai Jianglong Nie +3 位作者 Wenhao Mo Zhouqiang He Yuanpeng Tan Zhao Chen 《Global Energy Interconnection》 EI CAS CSCD 2022年第6期618-626,共9页
A novel image sequence-based risk behavior detection method to achieve high-precision risk behavior detection for power maintenance personnel is proposed in this paper.In this method,the original image sequence data i... A novel image sequence-based risk behavior detection method to achieve high-precision risk behavior detection for power maintenance personnel is proposed in this paper.In this method,the original image sequence data is first separated from the foreground and background.Then,the free anchor frame detection method is used in the foreground image to detect the personnel and correct their direction.Finally,human posture nodes are extracted from each frame of the image sequence,which are then used to identify the abnormal behavior of the human.Simulation experiment results demonstrate that the proposed algorithm has significant advantages in terms of the accuracy of human posture node detection and risk behavior identification. 展开更多
关键词 Human posture node detection Risk behavior detection Image sequence Anchor-free detection Power maintenance personnel
在线阅读 下载PDF
Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles
20
作者 Pengshou Xie Guoqiang Ma +2 位作者 Tao Feng Yan Yan Xueming Han 《Computers, Materials & Continua》 SCIE EI 2020年第8期1127-1137,共11页
Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculatin... Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced. 展开更多
关键词 IoV behavioral feature double layer detection feature correlation analysis correlative detection model
在线阅读 下载PDF
上一页 1 2 76 下一页 到第
使用帮助 返回顶部