Showing 2,141 - 2,160 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 2141

    Detection of Face Direction by Implementing Face Edge Patterns by Jarjees Khidir

    Published 2009-07-01
    “…The face patterns are produced by applying Canny’s edge detection algorithm on some face files. The direction of the input face is found by first applying the above algorithm on the input file and comparing it with the five face patterns. …”
    Get full text
    Article
  2. 2142

    Foodborne diseases event detection based on short text by Tiangang ZHU, Danhuai GUO, Xuezhi WANG, Jianhui LI, Yuanchun ZHOU

    Published 2016-03-01
    “…To the end, a dynamic context window algorithm was proposed, improved the efficiency and precision of event detection of foodborne diseases based on MicroBlog. …”
    Get full text
    Article
  3. 2143

    Android malware detection method based on SimHash by Bo CHEN, Yong-tao PAN, Tie-ming CHEN

    Published 2017-11-01
    “…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
    Get full text
    Article
  4. 2144

    Drowsiness Detection in Drivers Using Facial Feature Analysis by Ebenezer Essel, Fred Lacy, Fatema Albalooshi, Wael Elmedany, Yasser Ismail

    Published 2024-12-01
    “…Despite considerable research in this area, this paper aims to improve the precision of drowsiness detection specifically for long-haul travel by employing the Dlib-based facial feature detection algorithm. …”
    Get full text
    Article
  5. 2145

    A System for Real-Time Detection of Abandoned Luggage by Ivan Vrsalovic, Jonatan Lerga, Marina Ivasic-Kos

    Published 2025-05-01
    “…The abandoned luggage detection algorithm was tested in various scenarios where luggage may be left behind and in situations that may be potentially suspicious and showed promising results.…”
    Get full text
    Article
  6. 2146

    Detection of Adulteration of Panax Notoginseng Powder by Terahertz Technology by Bin Li, Hai Yin, A-kun Yang, Ai-guo Ouyang

    Published 2022-01-01
    “…Then, the least square support vector machine (LS-SVM) algorithm and partial least square (PLS) algorithm are used to establish the quantitative analysis model. …”
    Get full text
    Article
  7. 2147

    Multi-scale structural similarity index for motion detection by M. Abdel-Salam Nasr, Mohammed F. AlRahmawy, A.S. Tolba

    Published 2017-07-01
    “…This paper presents a novel algorithm based on the multi-scale structural similarity index for motion detection (MS-SSIM) in videos. …”
    Get full text
    Article
  8. 2148

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article
  9. 2149

    A Multistep Framework for Vision Based Vehicle Detection by Hai Wang, Yingfeng Cai

    Published 2014-01-01
    “…On road experimental results demonstrate that the algorithm performs better than state-of-the-art vehicle detection algorithm in testing data sets.…”
    Get full text
    Article
  10. 2150

    Good Apples / Bad Apples: Detection and classification of damage by Angel Star, Conor Pommer, Marius Silaghi

    Published 2024-05-01
    “…Parameters of the segment anything algorithm are evaluated for this problem domain and appropriateness of algorithm features is discussed for the real problem, obtaining directions for algorithmic improvement.…”
    Get full text
    Article
  11. 2151

    Performance of quantum approximate optimization with quantum error detection by Zichang He, David Amaro, Ruslan Shaydulin, Marco Pistoia

    Published 2025-05-01
    “…To the best of our knowledge, our results demonstrate the largest universal quantum computing algorithm protected by partially fault-tolerant quantum error detection on practical applications to date.…”
    Get full text
    Article
  12. 2152

    Detecting malware based on expired command-and-control traffic by Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li

    Published 2017-07-01
    “…In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. …”
    Get full text
    Article
  13. 2153

    QoS-Aware Fault Detection in Wireless Sensor Networks by Alessandra De Paola, Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani

    Published 2013-09-01
    “…This issue is usually addressed through “fault detectionalgorithms that classify readings by exploiting temporal and spatial correlations. …”
    Get full text
    Article
  14. 2154

    Research and realization of the Trojan detection engine based on Android by Bin XIA, Feng QIU

    Published 2016-10-01
    “…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
    Get full text
    Article
  15. 2155

    Adaptive Anomaly Detection Framework Model Objects in Cyberspace by Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al-Yaari

    Published 2020-01-01
    “…In particular, an adaptive anomaly detection framework model was developed using deep and machine learning algorithms to manage automatically-configured application-level firewalls. …”
    Get full text
    Article
  16. 2156

    Prevention and Detection Methods for Enhancing Security in an RFID System by Jing Huey Khor, Widad Ismail, Mohammad Ghulam Rahman

    Published 2012-08-01
    “…The received power of tag is used as a unique electronic fingerprint to detect cloning tags. t -test algorithm is used to analyze received power of tag at single-frequency band to distinguish between legitimate and counterfeit tag. …”
    Get full text
    Article
  17. 2157

    Deterministic Aided STAP for Target Detection in Heterogeneous Situations by J.-F. Degurse, L. Savy, S. Marcos, J.-Ph. Molinié

    Published 2013-01-01
    “…Indeed, in this case, representative target free data are no longer available. Single dataset algorithms, such as the MLED algorithm, have proved their efficiency in overcoming this problem by only working on primary data. …”
    Get full text
    Article
  18. 2158

    ANALYTICS AND DATA SCIENCE APPLIED TO THE TRAJECTORY OUTLIER DETECTION by Alexis J. LOPEZ, Perfecto M. QUINTERO, Ana K. HERNANDEZ

    Published 2020-06-01
    “…The experimental results show that the algorithm detects optimally the abnormal routes using historical data as a base. …”
    Get full text
    Article
  19. 2159

    Detection and tracking of mask wearing based on deep learning by Wang Lin, Nan Gaigai

    Published 2022-05-01
    “…The tracking module adopts the multiple object tracking algorithm Deep SORT to track the detected objects in actual time, which can effectively avoid repeated detection and better the tracking effect of the occluded targets. …”
    Get full text
    Article
  20. 2160

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article