Search alternatives:
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
resource » source (Expand Search)
resources » sources (Expand Search)
functions » function (Expand Search)
-
381
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01“…As it ignored the detection of ramp-up and pulsing type of application layer DDoS (App-DDoS) attacks in existing flow-based App-DDoS detection methods,an effective detection method for multi-type App-DDoS was proposed.Firstly,in order to fast count the number of HTTP GET for users and further support the calculation of feature parameters applied in detection method,the indexes of source IP address in multiple time windows were constructed by the approach of Hash function.Then the feature parameters by combining SVM classifiers with the structure of partial binary tree were trained hierarchically,and the App-DDoS detection method was proposed with the idea of traversing binary tree and feedback learning to distinguish non-burst normal flow,burst normal flow and multi-type App-DDoS flows.The experimental results show that compared with the conventional SVM-based and naïve-Bayes-based detection methods,the proposed method has more excellent detection performance and can distinguish specific App-DDoS types through subdividing attack types and training detection model layer by layer.…”
Get full text
Article -
382
-
383
Self-Powered Microsystem for Ultra-Fast Crash Detection via Prestressed Triboelectric Sensing
Published 2025-01-01“…We further developed a self-powered, compact (<4.5 cm3) microsystem that integrates the shock sensor, a signal processing module, airbag triggering circuitry, and a high-g-resistant supercapacitor as a backup power source. The microsystem achieves ultra-fast shock detection and airbag activation with a delay of less than 0.2 ms. …”
Get full text
Article -
384
-
385
YOLOv9-GDV: A Power Pylon Detection Model for Remote Sensing Images
Published 2025-06-01“…Finally, the Variable Minimum Point Distance Intersection over Union (VMPDIoU) loss is proposed to optimize the model’s loss function. This method employs variable input parameters to directly calculate key point distances between predicted and ground-truth boxes, more accurately reflecting positional differences between detection results and reference targets, thus effectively improving the model’s mean Average Precision (mAP). …”
Get full text
Article -
386
GSF-YOLOv8: A Novel Approach for Fire Detection Using Gather-Distribute Mechanism and SimAM Attention
Published 2025-01-01“…To address the current challenges in fire detection algorithms, including insufficient feature extraction, high computational complexity, limited deployment on resource-constrained devices, missed detections, false detections, and low accuracy, we developed a high-precision algorithm named GSF-YOLOv8. …”
Get full text
Article -
387
A diagnosis method based on graph neural networks embedded with multirelationships of intrinsic mode functions for multiple mechanical faults
Published 2025-08-01“…Additionally, a graph-level based fault diagnosis network model is designed to enhance feature learning capabilities for graph samples and enable flexible application across diverse signal sources and devices. Experimental validation with datasets including independent vibration signals for gear fault detection, mixed vibration signals for concurrent gear and bearing faults, and pressure signals for hydraulic cylinder leakage characterization demonstrates the model's adaptability and superior diagnostic accuracy across various types of signals and mechanical systems.…”
Get full text
Article -
388
Development and validation of microwave-assisted extraction for phenolic compound profiling in diverse oyster mushrooms (Pleurotus spp.) sourced from various geographical regions
Published 2025-04-01“…Seven phenolic compounds—p-coumaric acid, t-cinnamic acid, p-hydroxybenzaldehyde, p-hydroxybenzoic acid, quercetin-3-glucoside, gallic acid, and vanillic acid—were effectively extracted and quantified using ultra-performance liquid chromatography with photodiode array detection. Application of this method across oyster mushroom samples from different geographical sources revealed significant variation in phenolic compound concentrations, with Pleurotus pulmonarius exhibiting the highest level of gallic acid at 433.90 ± 7.77 μg g−1 (DM) and Pleurotus ostreatus var. …”
Get full text
Article -
389
Two-photon excitation fluorescence in ophthalmology: safety and improved imaging for functional diagnostics
Published 2024-01-01“…Recent advances in laser-source manufacturing have made it possible to minimize the exposure of in vivo measurements within safety, while achieving sufficient signals to detect for functional images, making TPEF a viable option for human application. …”
Get full text
Article -
390
Analysis of physicochemical, functional, and antioxidant properties of four different Indian seaweed species
Published 2024-12-01“…Thus, the selected four marine seaweeds act as a good source of functional components and can be utilized for the development of functional food products such as bread, biscuits, cookies, tea, snacks, soups and beverages.…”
Get full text
Article -
391
Evaluation of the retinal morphological and functional findings in optic neuritis related to multiple sclerosis
Published 2023-01-01“…The aim of the study was to determine the diagnostic and prognostic value of structural and functional examination using novel ‘swept-source’ optical coherence tomography (SS-OCT) and OCT angiography (OCTA) techniques in patients with MS who experienced RBN. …”
Get full text
Article -
392
Conscious and unconscious perception of pitch shifts in auditory feedback during vocalization: Behavioral functions and event-related potential correlates
Published 2025-07-01“…Source localization of the ERPs suggested that conscious pitch shift detection was associated with increased neural activity within the temporal, frontal and parietal cortical networks known to be involved in speech motor control. …”
Get full text
Article -
393
The Advanced Role of Carbon Quantum Dots in Nano-Food Science: Applications, Bibliographic Analysis, Safety Concerns, and Perspectives
Published 2024-12-01“…This article discussed the sources, fabrication methods, advantages, and limitations of CQDs as a sensing for the detection of food contaminants. …”
Get full text
Article -
394
-
395
Energy-Efficiency using Critical Nodes Detection Problem in Industrial Wireless Sensor Networks (IWSNs)
Published 2025-03-01“…Experiments simulation validates our proposed approach, approving its efficiency in reducing significant energy consumption while preserving connectivity and functionality for industrial systems. Furthermore, the results highlight the potential of using critical node analysis to support sustainable and efficient operations in resource-constrained industrial environments. …”
Get full text
Article -
396
A Method for Extracting Features of the Intrinsic Mode Function’s Energy Arrangement Entropy in the Shaft Frequency Electric Field of Vessels
Published 2025-05-01“…To address the challenge of detecting low-frequency electric field signals from vessels in complex marine environments, a vessel shaft frequency electric field feature extraction method based on intrinsic mode function energy arrangement entropy values is proposed, building upon a scaled model. …”
Get full text
Article -
397
-
398
Enhanced Intrusion Detection in In-Vehicle Networks Using Advanced Feature Fusion and Stacking-Enriched Learning
Published 2024-01-01“…To address this problem, machine learning (ML) based intrusion detection systems (IDSs) have been proposed. However, existing IDSs suffer from low detection accuracy, limited real-time response, and high resource requirements. …”
Get full text
Article -
399
Thermonuclear Superburst of MAXI J1752−457 Observed with NinjaSat and MAXI
Published 2025-01-01“…An uncatalogued bright X-ray transient was detected with MAXI on 2024 November 9, named MAXI J1752−457. …”
Get full text
Article -
400
Securing Industrial IoT Environments: A Fuzzy Graph Attention Network for Robust Intrusion Detection
Published 2025-01-01“…The Industrial Internet of Things (IIoT) faces significant cybersecurity threats due to its ever-changing network structures, diverse data sources, and inherent uncertainties, making robust intrusion detection crucial. …”
Get full text
Article