-
2441
Detection method of LDoS attacks based on combination of ANN & KPCA
Published 2018-05-01“…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
Get full text
Article -
2442
BLSTM based night-time wildfire detection from video.
Published 2022-01-01“…To this end, a BLSTM based night-time wildfire event detection from a video algorithm is proposed. It is shown in the experiments that the proposed algorithm attains 95.15% of accuracy when tested against a wide variety of actual recordings of night-time wildfire incidents and 23.7 ms per frame detection time. …”
Get full text
Article -
2443
Detection of Movement and Lead-Popping Artifacts in Polysomnography EEG Data
Published 2024-10-01Get full text
Article -
2444
Detecting Keratoconus in Adolescents with Anterior Segment Optical Coherence Tomography
Published 2024-01-01“…Assessing the applicability of an algorithm developed for keratoconus detection in adolescents. …”
Get full text
Article -
2445
Moving Target Detection and Active Tracking with a Multicamera Network
Published 2014-01-01“…The proposed framework consists of low-cost static and PTZ cameras, target detection and tracking algorithms, and a low-cost PTZ camera feedback control algorithm based on target information. …”
Get full text
Article -
2446
Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks
Published 2014-04-01“…The experiments conducted in this work prove that our suggested clustering-based algorithm effectively detects various traffic attacks.…”
Get full text
Article -
2447
Improved Crack Detection and Recognition Based on Convolutional Neural Network
Published 2019-01-01“…Experimental results show that the Adam optimization algorithm and batch normalization (BN) algorithm can make the model converge faster and achieve the maximum accuracy of 99.71%.…”
Get full text
Article -
2448
Simulation of Ground Visibility Based on Atmospheric Boundary Layer Data Using K-Nearest Neighbors and Ensemble Model Algorithms
Published 2024-11-01“…This study introduces a machine learning approach for simulating visibility, utilizing the K-Nearest Neighbors algorithm and an ensemble model, which incorporate data from atmospheric boundary layer detection and conventional ground meteorological observations as simulation inputs. …”
Get full text
Article -
2449
A Study on the Impact of Rain on Object Detection for Automotive Applications
Published 2025-01-01“…Four object detection algorithms, a segmentation algorithm, and an optical character recognition algorithm are used as representative examples of typical algorithms used in ADAS. …”
Get full text
Article -
2450
PUE Attack Detection in CWSN Using Collaboration and Learning Behavior
Published 2013-06-01“…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
Get full text
Article -
2451
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01“…The ma-licious code is mapped to uncompressed gray-scale image by integrating image analysis techniques and variants of mali-cious code detection technology. The uncompressed gray-scale image is partitioned into blocks by the texture segmen-tation algorithm. …”
Get full text
Article -
2452
Wireless Sensor Networks Energy Effectively Distributed Target Detection
Published 2014-07-01“…The first algorithm presents a method of the time series discretization to solve the distance of the target detected by the first connected node. …”
Get full text
Article -
2453
On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code
Published 2020-06-01“…It is assumed that taking into account the distances between function calls will reveal shell code execution using system and / or library function calls. An algorithm and a system for detecting abnormal code execution are proposed. …”
Get full text
Article -
2454
Anomaly-Based Intrusion Detection System for the Internet of Medical Things
Published 2024-04-01“…We used a representative Anomaly Intrusion Detection System (AIDS) dataset to train six state-of-the-art Machine Learning (ML) and Deep Learning (DL) architectures, with the Synthetic Minority Oversampling Technique (SMOTE) algorithm used to handle class imbalance in the training dataset. …”
Get full text
Article -
2455
Leather Defect Detection Based on Improved YOLOv8 Model
Published 2024-12-01“…Addressing the low accuracy and slow detection speed experienced by algorithms based on deep learning for a leather defect detection task, a lightweight and improved leather defect detection algorithm, dubbed YOLOv8-AGE, has been proposed based on YOLOv8n. …”
Get full text
Article -
2456
Anxiety Detection System Based on Galvanic Skin Response Signals
Published 2024-11-01“…While the potential of machine learning (ML) algorithms to enhance the classification of anxiety based on GSR signals is promising, their effectiveness in this context remains largely underexplored. …”
Get full text
Article -
2457
Comparison of Various Feature Extractors and Classifiers in Wood Defect Detection
Published 2025-01-01“…The findings show that the most effective features in detecting defective wood are extracted by the Local Binary Pattern (LBP) method and the most effective classifier is the Random Forest Algorithm. …”
Get full text
Article -
2458
Detecting House of Spirit Attacks by Glibc Heap Information Extraction
Published 2024-02-01“…The experimental results show that this method can effectively extract the heap information in the memory of the Linux system process,and successfully detect the House of Spirit attack in the memory based on the information combined with the attack detection algorithm.…”
Get full text
Article -
2459
Detection of Obstacles in Tunnel Based on Vehicle-borne LiDAR
Published 2021-01-01“…Massive point clouds introduced by tunnel wall reflection can easily cause false alarms in LiDAR-based detection of obstacles in tunnel environment. A vehicle-borne LiDAR based obstacle-in-tunnel detection methodology is proposed in this paper. …”
Get full text
Article -
2460
An Innovative Multiparametric Sensor Design for Detecting Microplastics and Heavy Metals
Published 2025-04-01“…The proposed sensor system detects these materials and evaluates their concentrations using a trainable multilayer perceptron algorithm. …”
Get full text
Article