-
2141
Detection of Face Direction by Implementing Face Edge Patterns
Published 2009-07-01“…The face patterns are produced by applying Canny’s edge detection algorithm on some face files. The direction of the input face is found by first applying the above algorithm on the input file and comparing it with the five face patterns. …”
Get full text
Article -
2142
Foodborne diseases event detection based on short text
Published 2016-03-01“…To the end, a dynamic context window algorithm was proposed, improved the efficiency and precision of event detection of foodborne diseases based on MicroBlog. …”
Get full text
Article -
2143
Android malware detection method based on SimHash
Published 2017-11-01“…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
Get full text
Article -
2144
Drowsiness Detection in Drivers Using Facial Feature Analysis
Published 2024-12-01“…Despite considerable research in this area, this paper aims to improve the precision of drowsiness detection specifically for long-haul travel by employing the Dlib-based facial feature detection algorithm. …”
Get full text
Article -
2145
A System for Real-Time Detection of Abandoned Luggage
Published 2025-05-01“…The abandoned luggage detection algorithm was tested in various scenarios where luggage may be left behind and in situations that may be potentially suspicious and showed promising results.…”
Get full text
Article -
2146
Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology
Published 2022-01-01“…Then, the least square support vector machine (LS-SVM) algorithm and partial least square (PLS) algorithm are used to establish the quantitative analysis model. …”
Get full text
Article -
2147
Multi-scale structural similarity index for motion detection
Published 2017-07-01“…This paper presents a novel algorithm based on the multi-scale structural similarity index for motion detection (MS-SSIM) in videos. …”
Get full text
Article -
2148
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
Get full text
Article -
2149
A Multistep Framework for Vision Based Vehicle Detection
Published 2014-01-01“…On road experimental results demonstrate that the algorithm performs better than state-of-the-art vehicle detection algorithm in testing data sets.…”
Get full text
Article -
2150
Good Apples / Bad Apples: Detection and classification of damage
Published 2024-05-01“…Parameters of the segment anything algorithm are evaluated for this problem domain and appropriateness of algorithm features is discussed for the real problem, obtaining directions for algorithmic improvement.…”
Get full text
Article -
2151
Performance of quantum approximate optimization with quantum error detection
Published 2025-05-01“…To the best of our knowledge, our results demonstrate the largest universal quantum computing algorithm protected by partially fault-tolerant quantum error detection on practical applications to date.…”
Get full text
Article -
2152
Detecting malware based on expired command-and-control traffic
Published 2017-07-01“…In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. …”
Get full text
Article -
2153
QoS-Aware Fault Detection in Wireless Sensor Networks
Published 2013-09-01“…This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. …”
Get full text
Article -
2154
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
Get full text
Article -
2155
Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Published 2020-01-01“…In particular, an adaptive anomaly detection framework model was developed using deep and machine learning algorithms to manage automatically-configured application-level firewalls. …”
Get full text
Article -
2156
Prevention and Detection Methods for Enhancing Security in an RFID System
Published 2012-08-01“…The received power of tag is used as a unique electronic fingerprint to detect cloning tags. t -test algorithm is used to analyze received power of tag at single-frequency band to distinguish between legitimate and counterfeit tag. …”
Get full text
Article -
2157
Deterministic Aided STAP for Target Detection in Heterogeneous Situations
Published 2013-01-01“…Indeed, in this case, representative target free data are no longer available. Single dataset algorithms, such as the MLED algorithm, have proved their efficiency in overcoming this problem by only working on primary data. …”
Get full text
Article -
2158
ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION
Published 2020-06-01“…The experimental results show that the algorithm detects optimally the abnormal routes using historical data as a base. …”
Get full text
Article -
2159
Detection and tracking of mask wearing based on deep learning
Published 2022-05-01“…The tracking module adopts the multiple object tracking algorithm Deep SORT to track the detected objects in actual time, which can effectively avoid repeated detection and better the tracking effect of the occluded targets. …”
Get full text
Article -
2160
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article