Showing 2,161 - 2,180 results of 12,239 for search 'algorithm detection', query time: 0.21s Refine Results
  1. 2161

    Detection and Quantification of Fluorescent Cell Clusters in Cryo-Imaging by Grant J. Steyer, Feng Dong, Lehar Kanodia, Debashish Roy, Marc Penn, David L. Wilson

    Published 2012-01-01
    “…We developed and evaluated an algorithm for enumerating fluorescently labeled cells (e.g., stem and cancer cells) in mouse-sized, microscopic-resolution, cryo-image volumes. …”
    Get full text
    Article
  2. 2162

    Time synchronization attack detection for industrial wireless network by Sichao ZHANG, Wei LIANG, Xudong YUAN, Yinlong ZHANG, Meng ZHENG

    Published 2023-06-01
    “…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
    Get full text
    Article
  3. 2163

    Detection of Montage in Lossy Compressed Digital Audio Recordings by Rafał KORYCKI

    Published 2014-12-01
    “…The influence of compression algorithms’ parameters on detection of forgeries is presented by applying AAC and Ogg Vorbis encoders as examples. …”
    Get full text
    Article
  4. 2164

    Improvement of signal detection based on using machine learning by Bassam Abd

    Published 2025-02-01
    “…The deep learning algorithm has become a very attractive tool for distinguishing between signal and noise. …”
    Get full text
    Article
  5. 2165

    Visual detection of screen defects in occlusion and missing scenes by YIN Dongfu, DU Mingchen, HU Tianhao, LI Youming, ZHANG Xiaohong, YU Fei Richard

    Published 2023-11-01
    “…The application of proposed algorithm can effectively reduce labor costs and improve detection efficiency. …”
    Get full text
    Article
  6. 2166
  7. 2167

    Automatic Fall Risk Detection Based on Imbalanced Data by Yen-Hung Liu, Patrick C. K. Hung, Farkhund Iqbal, Benjamin C. M. Fung

    Published 2021-01-01
    “…In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. …”
    Get full text
    Article
  8. 2168

    Improved printed circuit board defect detection scheme by Lufeng Bai, Wen Hao Xu

    Published 2025-01-01
    “…Compared to the original YOLOv8 algorithm, this algorithm improves the average accuracy on small targets by $$5.5\%$$ for mAP50.…”
    Get full text
    Article
  9. 2169

    Improved UAV Target Detection Model for RT-DETR by Yong He, Yufan Pang, Guolin Ou, Renfeng Xiao, Yifan Tang

    Published 2025-01-01
    “…In light of the shortcomings pertaining to UAV small target detection, the detection of complex scenes, and the detection of multi-scale targets, a time-frequency dual-domain feature extraction algorithm, TF-DETR, has been proposed. …”
    Get full text
    Article
  10. 2170

    Lightweight UAV Detection Method Based on IASL-YOLO by Huaiyu Yang, Bo Liang, Song Feng, Ji Jiang, Ao Fang, Chunyun Li

    Published 2025-04-01
    “…To address this, we propose the IASL-YOLO algorithm, which optimizes the YOLOv8s model to enhance detection accuracy and lightweight efficiency. …”
    Get full text
    Article
  11. 2171

    Singular-Value-Based Cluster Number Detection Method by Yating Li, Jianghui Cai, Haifeng Yang, Jie Wang, Chenhui Shi, Bo Liang, Xujun Zhao, Yaling Xun

    Published 2025-02-01
    “…Based on this, a singular-value-based cluster number detection method is proposed. First, the transferred K-nearest neighbors (TKNN) density formula is proposed to address the limitation of the DPC algorithm in failing to identify centroids in sparse clusters of unbalanced datasets. …”
    Get full text
    Article
  12. 2172

    Artificial Intelligence for Fault Detection of Automotive Electric Motors by Federico Soresini, Dario Barri, Ivan Cazzaniga, Federico Maria Ballo, Gianpiero Mastinu, Massimiliano Gobbi

    Published 2025-05-01
    “…The model is integrated into an algorithm for semi-real-time fault monitoring. The algorithm effectively detects potential motor failures in real-world scenarios, including bearing faults, mechanical misalignments, and progressive wear of components, thereby proactively preventing damage and halving test bench downtime.…”
    Get full text
    Article
  13. 2173
  14. 2174

    Android malware detection based on improved random forest by Hong-yu YANG, Jin XU

    Published 2017-04-01
    “…Aiming at the defect of vote principle in random forest algorithm which is incapable of distinguishing the differences between strong classifier and weak classifier,a weighted voting improved method was proposed,and an improved random forest classification (IRFCM) was proposed to detect Android malware on the basis of this method.The IRFCM chose Permission information and Intent information as attribute features from AndroidManifest.xml files and optimized them,then applied the model to classify the final feature vectors.The experimental results in Weka environment show that IRFCM has better classification accuracy and classification efficiency.…”
    Get full text
    Article
  15. 2175

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…Taking advantage of the idea of SDN, a central security center was built which collected traffic from the SDN data plane entity for analyzing. The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. …”
    Get full text
    Article
  16. 2176

    3D Printing Errors Detection During the Process by Florin-Bogdan MARIN, Mihaela MARIN

    Published 2024-06-01
    “…A widely used solution for monitoring the printing process involves employing a webcam to observe the process in real time, either alerting the operator or halting the print if an issue is detected. In this paper, a computer vision algorithm able to detect specific errors is proposed.…”
    Get full text
    Article
  17. 2177

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…Taking advantage of the idea of SDN, a central security center was built which collected traffic from the SDN data plane entity for analyzing. The attacks can be detected based on the entropy variation of the identifier and locate the type of attack with the classification algorithm. …”
    Get full text
    Article
  18. 2178
  19. 2179

    Partition detection for large scale ad hoc networks by LI Jian-dong, TIAN Ye, SHENG Min, ZHANG Yan, YAO Jun-liang

    Published 2008-01-01
    “…As the failure of a critical node will directly partition a network,a theorem for critical node identification was proved,which indicates that node degree Ni and elementary loop degree Mi of node i are two decisive factors for the exis-tence of a critical node and shows that Ni-Mi≥ 2 is the necessary and sufficient condition for node i being critical.Based on the theorem,a distributed topology partition detection algorithm(distributed partition detection protocol,DPDP) was presented for large scale networks,which achieves the goal of partition detection efficiently by detecting critical nodes in a local area.Theoretic analysis and experiment results show that DPDP has the advantages of low complexity,high accuracy,low cost as well as good scalability,and is superior to other algorithms.…”
    Get full text
    Article
  20. 2180

    ENHANCING NETWORK PERFORMANCE WITH IMPROVED RANDOM EARLY DETECTION by Vu Van Dien

    Published 2025-03-01
    “…Active Queue Management (AQM) algorithms are crucial in ensuring network stability. …”
    Get full text
    Article