Showing 2,441 - 2,460 results of 12,239 for search 'algorithm detection', query time: 0.21s Refine Results
  1. 2441

    Detection method of LDoS attacks based on combination of ANN & KPCA by Zhijun WU, Liang LIU, Meng YUE

    Published 2018-05-01
    “…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
    Get full text
    Article
  2. 2442

    BLSTM based night-time wildfire detection from video. by Ahmet K Agirman, Kasim Tasdemir

    Published 2022-01-01
    “…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
    Get full text
    Article
  3. 2443
  4. 2444

    Detecting Keratoconus in Adolescents with Anterior Segment Optical Coherence Tomography by Burcu Yücekul, Anika Förster, H. Burkhard Dick, Suphi Taneri

    Published 2024-01-01
    “…Assessing the applicability of an algorithm developed for keratoconus detection in adolescents. …”
    Get full text
    Article
  5. 2445

    Moving Target Detection and Active Tracking with a Multicamera Network by Long Zhao, Li Fei Liu, Qing Yun Wang, Tie Jun Li, Jian Hua Zhou

    Published 2014-01-01
    “…The proposed framework consists of low-cost static and PTZ cameras, target detection and tracking algorithms, and a low-cost PTZ camera feedback control algorithm based on target information. …”
    Get full text
    Article
  6. 2446

    Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks by Seok-Woo Jang, Gye-Young Kim, Siwoo Byun

    Published 2014-04-01
    “…The experiments conducted in this work prove that our suggested clustering-based algorithm effectively detects various traffic attacks.…”
    Get full text
    Article
  7. 2447

    Improved Crack Detection and Recognition Based on Convolutional Neural Network by Keqin Chen, Amit Yadav, Asif Khan, Yixin Meng, Kun Zhu

    Published 2019-01-01
    “…Experimental results show that the Adam optimization algorithm and batch normalization (BN) algorithm can make the model converge faster and achieve the maximum accuracy of 99.71%.…”
    Get full text
    Article
  8. 2448

    Simulation of Ground Visibility Based on Atmospheric Boundary Layer Data Using K-Nearest Neighbors and Ensemble Model Algorithms by Ruolan Liu, Shujie Yuan, Duanyang Liu, Lin Han, Fan Zu, Hong Wu, Hongbin Wang

    Published 2024-11-01
    “…This study introduces a machine learning approach for simulating visibility, utilizing the K-Nearest Neighbors algorithm and an ensemble model, which incorporate data from atmospheric boundary layer detection and conventional ground meteorological observations as simulation inputs. …”
    Get full text
    Article
  9. 2449

    A Study on the Impact of Rain on Object Detection for Automotive Applications by Diarmaid Geever, Tim Brophy, Dara Molloy, Enda Ward, Brian Deegan, Martin Glavin, Edward Jones

    Published 2025-01-01
    “…Four object detection algorithms, a segmentation algorithm, and an optical character recognition algorithm are used as representative examples of typical algorithms used in ADAS. …”
    Get full text
    Article
  10. 2450

    PUE Attack Detection in CWSN Using Collaboration and Learning Behavior by Javier Blesa, Elena Romero, Alba Rozas, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
    Get full text
    Article
  11. 2451

    Research on malicious code variants detection based on texture fingerprint by Xiao-guang HAN, UWu Q, AOXuan-xia Y, UOChang-you G, Fang ZHOU

    Published 2014-08-01
    “…The ma-licious code is mapped to uncompressed gray-scale image by integrating image analysis techniques and variants of mali-cious code detection technology. The uncompressed gray-scale image is partitioned into blocks by the texture segmen-tation algorithm. …”
    Get full text
    Article
  12. 2452

    Wireless Sensor Networks Energy Effectively Distributed Target Detection by Xiaogang Qi, Peng Wei, Lifang Liu, Mande Xie, Guoyong Cai

    Published 2014-07-01
    “…The first algorithm presents a method of the time series discretization to solve the distance of the target detected by the first connected node. …”
    Get full text
    Article
  13. 2453

    On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code by Yury V. Kosolapov

    Published 2020-06-01
    “…It is assumed that taking into account the distances between function calls will reveal shell code execution using system and / or library function calls. An algorithm and a system for detecting abnormal code execution are proposed. …”
    Get full text
    Article
  14. 2454

    Anomaly-Based Intrusion Detection System for the Internet of Medical Things by Eichie Franklin, Bernardi Pranggono

    Published 2024-04-01
    “…We used a representative Anomaly Intrusion Detection System (AIDS) dataset to train six state-of-the-art Machine Learning (ML) and Deep Learning (DL) architectures, with the Synthetic Minority Oversampling Technique (SMOTE) algorithm used to handle class imbalance in the training dataset. …”
    Get full text
    Article
  15. 2455

    Leather Defect Detection Based on Improved YOLOv8 Model by Zirui Peng, Chen Zhang, Wei Wei

    Published 2024-12-01
    “…Addressing the low accuracy and slow detection speed experienced by algorithms based on deep learning for a leather defect detection task, a lightweight and improved leather defect detection algorithm, dubbed YOLOv8-AGE, has been proposed based on YOLOv8n. …”
    Get full text
    Article
  16. 2456

    Anxiety Detection System Based on Galvanic Skin Response Signals by Abeer Al-Nafjan, Mashael Aldayel

    Published 2024-11-01
    “…While the potential of machine learning (ML) algorithms to enhance the classification of anxiety based on GSR signals is promising, their effectiveness in this context remains largely underexplored. …”
    Get full text
    Article
  17. 2457

    Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection by Kenan Kiliç, Kazım Kiliç, İbrahim Alper Doğru, Uğur Özcan

    Published 2025-01-01
    “…The findings show that the most effective features in detecting defective wood are extracted by the Local Binary Pattern (LBP) method and the most effective classifier is the Random Forest Algorithm. …”
    Get full text
    Article
  18. 2458

    Detecting House of Spirit Attacks by Glibc Heap Information Extraction by ZHAI Jiqiang, WANG Jiaqian, HAN Xu, SUN Haixu

    Published 2024-02-01
    “…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
    Get full text
    Article
  19. 2459

    Detection of Obstacles in Tunnel Based on Vehicle-borne LiDAR by ZENG Xiang, JIANG Guotao, BAO Jiyu, LIU Bangfan, XIAO Zhihong

    Published 2021-01-01
    “…Massive point clouds introduced by tunnel wall reflection can easily cause false alarms in LiDAR-based detection of obstacles in tunnel environment. A vehicle-borne LiDAR based obstacle-in-tunnel detection methodology is proposed in this paper. …”
    Get full text
    Article
  20. 2460

    An Innovative Multiparametric Sensor Design for Detecting Microplastics and Heavy Metals by Ekrem Kursad Dal, Adem Gunes, Recai Kilic

    Published 2025-04-01
    “…The proposed sensor system detects these materials and evaluates their concentrations using a trainable multilayer perceptron algorithm. …”
    Get full text
    Article