-
221
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…Therefore, there is an urgent need for fast and accurate anomaly detection capabilities. However, the existing microservice anomaly detection methods do not pay attention to the multi-source data of the microservice system and thus have low accuracy. …”
Get full text
Article -
222
Evaluation of a coastal acoustic buoy for cetacean detections, bearing accuracy and exclusion zone monitoring
Published 2022-11-01“…Field trials indicated maximum detection ranges from 4–7.3 km depending on source and ambient noise levels. …”
Get full text
Article -
223
Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability
Published 2025-05-01“…Machine Learning (ML)-based Intrusion Detection Systems (IDS) are integral to securing modern IoT networks but often suffer from a lack of transparency, functioning as “black boxes” with opaque decision-making processes. …”
Get full text
Article -
224
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01Get full text
Article -
225
Multimodal imaging analysis and structure-function correlation in patients exposed to pentosan polysulfate sodium
Published 2025-07-01“…Purpose: To study the anatomic and functional retinal changes in patients exposed to pentosan polysulfate (PPS) using multimodal imaging and mesopic microperimetry. …”
Get full text
Article -
226
Source Process Estimation for the 2024 Mw 7.1 Hyuganada, Japan, Earthquake and Forward Modeling Using N‐net Ocean Bottom Seismometer Data
Published 2025-05-01“…The N‐net seafloor seismograms of the mainshock with a frequency of ∼0.05 Hz recorded east of the source area were reproduced for several stations using the empirical Green's function approach based on the estimated source process data.…”
Get full text
Article -
227
-
228
-
229
Intelligent Firefighting Technology for Drone Swarms with Multi-Sensor Integrated Path Planning: YOLOv8 Algorithm-Driven Fire Source Identification and Precision Deployment Strateg...
Published 2025-05-01“…This study aims to improve the accuracy of fire source detection, the efficiency of path planning, and the precision of firefighting operations in drone swarms during fire emergencies. …”
Get full text
Article -
230
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
231
Ibai mag blinds blindana tiuhan? (Luke 6,39). Pragmatic functions and syntactic strategies in the Gothic left sentence periphery
Published 2025-01-01“…The interference role of the Greek and Latin source texts will also be taken into consideration, mainly in order to ascertain whether the grammaticalization processes which those elements underwent were either induced or implemented by the models. …”
Get full text
Article -
232
SOFTWARE COMPONENT DEVELOPMENT FOR PARALLEL GATEWAYS DETECTION AND QUALITY ASSESSMENT IN BPMN MODELS USING FUZZY LOGIC
Published 2025-07-01“…This features are evaluated using “soft” modeling rules based on fuzzy membership functions. Additionally, an activation function with the 0.5 threshold is used to generate binary quality indicators and calculate an integral quality assessment measure. …”
Get full text
Article -
233
A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection
Published 2025-03-01“…Multi-source track-to-track association (TTTA), which identifies trajectories from multiple sensors or data sources of the same dynamic vehicle, is an important data fusion technique widely applied to vehicle detection in the fields of road, marine, and aviation transportation. …”
Get full text
Article -
234
PFW-YOLO Lightweight Helmet Detection Algorithm
Published 2025-01-01“…However, due to the limited arithmetic and storage resources of edge-end devices, and the traditional detection algorithms have problems such as the number of parameters and large computational volume, the detection algorithms are difficult to be deployed practically. …”
Get full text
Article -
235
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
236
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. …”
Get full text
Article -
237
-
238
-
239
Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection
Published 2025-03-01“…The strength of DNNs is derived from their ability to model complex functions and to improve detection engines through deeper architecture. …”
Get full text
Article -
240