-
1501
Detecting malware based on expired command-and-control traffic
Published 2017-07-01“…In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. …”
Get full text
Article -
1502
exoALMA. IX. Regularized Maximum Likelihood Imaging of Non-Keplerian Features
Published 2025-01-01“…\limits^{^{\prime\prime} }15$ angular resolution and ∼100 m s ^−1 spectral resolution, characterizing disk structures and kinematics in enough detail to detect non-Keplerian features (NKFs) in the gas emission. …”
Get full text
Article -
1503
Railway safety monitoring algorithm based on distributed optical fiber vibration sensor
Published 2020-09-01“…Aiming at the monitoring problem of the human climbing behaviour existing along the railway,a railway safety detection algorithm based on distributed optical fiber vibration sensors was proposed by combining the distributed optical fiber sensing technology and signal analysis technology.The surrounding vibration was sensed and transmitted through the optical cables laid along the fence network of the railway,and then the Internet of things (IoT) connection between the railway and monitoring algorithm was built to realize the intelligent monitoring of the climbing behavior.In view of the complicated surrounding environment of the railway and more interference,the Hamming window and wavelet threshold denoising method were used to filter the signal of each frame to improve the signal-to-noise ratio of the vibration signal.In the selection of features,the power spectrum and short-time over-level rate of the signal were extracted from the time domain and frequency domain respectively as a joint feature to determine whether there was climbing or creeping behavior.Since that the climbing behavior was spatially continuous,the minimum alarm range was set to filter out alarms with a too small range,which improved the accuracy of the monitoring system.…”
Get full text
Article -
1504
Obfuscated malicious traffic detection based on data enhancement
Published 2025-07-01“…Although existing methods combine unencrypted statistical features, e.g., average packet length, with machine learning algorithms to achieve encrypted malicious traffic detection, it is difficult to escape the influence of artificially forged noise, e.g., adding dummy packets. …”
Get full text
Article -
1505
Review on Sound-Based Industrial Predictive Maintenance: From Feature Engineering to Deep Learning
Published 2025-05-01“…However, existing reviews focus more on the structures and results of the detection model, while neglecting the impact of the differences in feature engineering on subsequent detection models. …”
Get full text
Article -
1506
Detection and tracking of mask wearing based on deep learning
Published 2022-05-01“…The tracking module adopts the multiple object tracking algorithm Deep SORT to track the detected objects in actual time, which can effectively avoid repeated detection and better the tracking effect of the occluded targets. …”
Get full text
Article -
1507
An optimization model of computer network security based on GABP neural network algorithm
Published 2025-04-01“…Independent component analysis (ICA) was employed for feature extraction to improve the model’s efficiency. …”
Get full text
Article -
1508
Vehicle Detection and Shape Refinement Based on LiDAR
Published 2022-12-01“…In order to solve this problem, this paper proposes a vehicle shape optimization algorithm based on point cloud cluster features, the proposed algorithm outputs vehicle detection results with PointPillars target detection algorithm. …”
Get full text
Article -
1509
On the effect of sampling frequency on the electricity theft detection performance
Published 2022-12-01“…However, based on technological and operational limitations, the rate of metre reading is too low in many countries, which can affect detection performance. To investigate the effect of sampling frequency on the performance of detection methods, we designed a processing framework to evaluate different classification algorithms on versions of a challenging dataset obtained by down‐sampling the original data at various rates. …”
Get full text
Article -
1510
Keypoint Detection Based on Curvature Grouping and Adaptive Sampling
Published 2025-01-01“…In the keypoint detection algorithm, the farthest point sampling methods and random sampling methods are usually used to select candidate points, then keypoints are screened out from the neighborhood of the candidate points. …”
Get full text
Article -
1511
Automated detection of complex zebrafish seizure behavior at scale
Published 2025-06-01“…Abstract Convulsive seizure behaviors are a hallmark feature of epilepsy, but automated detection of these events in freely moving animals is difficult. …”
Get full text
Article -
1512
Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology
Published 2022-01-01“…The modeling and prediction sets are divided by 3 : 1 by class. The feature information of models is extracted by elimination of uninformative variable (UVE) method and successive projection algorithm (SPA); combining with back propagation neural network (BPNN), the UVE-BPNN and SPA-BPNN qualitative models are established, respectively. …”
Get full text
Article -
1513
Effective Detection of Malicious Uniform Resource Locator (URLs) Using Deep-Learning Techniques
Published 2025-06-01“…By effectively extracting and utilizing informative features, the model accurately classified URLs into benign and malicious categories, thereby improving detection capabilities. …”
Get full text
Article -
1514
Strawberry Disease Detection Using Multispectral UAV Imagery
Published 2025-07-01“…A disease detection model developed using the Random Forest algorithm, achieved a classification accuracy of 77%. …”
Get full text
Article -
1515
Circulating Tumor Cells Count and Morphological Features in Breast, Colorectal and Prostate Cancer.
Published 2013-01-01“…In one patient with benign tumor 2 and another 9 aCTC were detected.<h4>Significance of the study</h4>CTC can be identified and morphological features extracted by an algorithm on images stored by the CellSearch system and strongly correlate with clinical outcome in metastatic breast, colorectal and prostate cancer.…”
Get full text
Article -
1516
Back pain: from pathophysiological mechanisms and clinical features to modern approaches to therapy
Published 2025-06-01“…Signs of inflammatory pain may be detected in patients with nonspecific low back pain due to the development of osteoarthritis in facet joints, sacroiliac joints, as well as vertebral osteitis. …”
Get full text
Article -
1517
Enhancement of Underwater Images through Parallel Fusion of Transformer and CNN
Published 2024-08-01“…Finally, the image’s high and low frequency information are utilized to fuse different features. To demonstrate the algorithm’s effectiveness, underwater images with various levels of color distortion are selected for both qualitative and quantitative analyses. …”
Get full text
Article -
1518
An edge awareness-enhanced visual SLAM method for underground coal mines
Published 2025-03-01“…Specifically, line features were extracted using the EDLines algorithm, while point features were extracted using the Oriented FAST and Rotated BRIEF (ORB) algorithms. …”
Get full text
Article -
1519
Improving Mountainous DSM Accuracy Through an Innovative Opposite-Side Radargrammetry Algorithm
Published 2025-01-01“…Second, a triangle affine matching algorithm is developed to match the simulated SAR and real SAR images based on feature points. …”
Get full text
Article -
1520
YOLO-DLHS-P: A Lightweight Behavior Recognition Algorithm for Captive Pigs
Published 2024-01-01“…Firstly, the C2f-DRB structure is introduced at the Backbone position, and the sizeable convolutional kernel is used to extend the receptive field to enhance the spatial perception ability of the model, and to enhance the network’s ability to capture spatial information while maintaining the number of learnable parameters and computational efficiency; The LSKA attention mechanism is then introduced to be integrated into the SPPF module to construct the SPPF-LSKA structure, which significantly improves the ability of the SPPF module to aggregate features at multiple scales; Then, the downsampling at the Neck position is optimised to the HWD algorithm, which reduces the spatial resolution of the feature map while retaining more useful information and reduces the uncertainty of the information compared with the downsampling method of the baseline model; finally, the Shape-IoU is used to replace the original CIoU, which significantly improves the detection efficiency and accuracy of the model without increasing the extra computational burden. …”
Get full text
Article