-
2501
Damage Detection in Plates with the Use of Laser-Measured Mode Shapes
Published 2020-01-01“…This paper presents the use of laser vibrometer measurements to detect and locate damage in a metal plate. An algorithm based on local spatial filters was selected, and for the purpose of comparison, the fault location was also determined based on the wavelet analysis of mode shapes. …”
Get full text
Article -
2502
Application of Artificial Neural Networks for Defect Detection in Ceramic Materials
Published 2013-10-01“…This ANN model was developed to detect whether the plates under test are cracked or not, when four plates have been selected randomly from among a total of 18 ones. …”
Get full text
Article -
2503
Object detection and tracking in video sequences: formalization, metrics and results
Published 2021-03-01“…Based on the considered generalization, an algorithm for tracking people has been developed that uses the tracking through detection method and convolutional neural networks to detect people and form features. …”
Get full text
Article -
2504
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
2505
Utilizing Calibration Model for Water Distribution Network Leakage Detection
Published 2024-09-01“…The proposed model comprises two distinct algorithms: (1) PRC estimation using MCMC and (2) a leakage detection algorithm employing a Kolmogorov–Smirnov test. …”
Get full text
Article -
2506
Adversarial training driven malicious code detection enhancement method
Published 2022-09-01“…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
Get full text
Article -
2507
Farsi License Plate Detection and Recognition Based on Characters Features
Published 2024-02-01“…In this paper a license plate detection and recognition system for Iranian private cars is implemented. …”
Get full text
Article -
2508
XGBoost-Based Detection of DDoS Attacks in Named Data Networking
Published 2025-05-01“…Through experiments, the performance of the new attacks and the efficacy of the detection algorithm are analyzed. In comparison with other algorithms, the proposed method is demonstrated to have advantages in terms of the advanced nature of the proposed classifier, which is confirmed by the AUC-score.…”
Get full text
Article -
2509
Saliency Detection via Fusing Color Contrast and Hash Fingerprint
Published 2022-01-01“…Saliency detection is a technique for automatically extracting regions of interest from the background and has been widely used in the computer vision field. …”
Get full text
Article -
2510
Robust Symbol Detection in Large-Scale Overloaded NOMA Systems
Published 2021-01-01“…It is also shown via simulations that the technique can be integrated with existing iterative detection-and-decoding (IDD) methods, resulting in accelerated convergence.…”
Get full text
Article -
2511
Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment
Published 2025-03-01“…This paper presents an algorithm for detecting DDoS attacks earlier from the network using the entropy method and mitigating the attacks earlier using stochastic techniques. …”
Get full text
Article -
2512
Wavelet neural network algorithm for hybrid GA in infrared CO2 gas sensor
Published 2024-12-01“…Especially at an ambient temperature of 49 °C, for a true CO2 concentration of 2000 ppm, the detection value processed by the GA-WNN algorithm was 2046 ppm, with a relative error of only 2.3 %, far lower than the 9.8 % of Faster RCNN algorithm and 11.5 % of WNN algorithm. …”
Get full text
Article -
2513
Accurate detection of selective forwarding attack in wireless sensor networks
Published 2019-01-01“…Moreover, to prevent collaborative selective forwarding attack, E-watchdog uses reports from more than one detection agents. Fake reports from attackers are filtered out through an election algorithm. …”
Get full text
Article -
2514
An attack detection method based on deep learning for internet of things
Published 2025-08-01“…Additionally, feature redundancy and class imbalance in IoT traffic datasets also constrain detection performance. To address these issues, this paper proposes an attack detection method based on deep learning for IoT. …”
Get full text
Article -
2515
Comparative Study of Machine Learning Techniques for Insurance Fraud Detection
Published 2024-08-01Get full text
Article -
2516
ECG Paper Digitization and R Peaks Detection Using FFT
Published 2022-01-01“…One of the most essential tools for detecting heart problems is the electrocardiogram (ECG). …”
Get full text
Article -
2517
Ambulance Siren Detection using Artificial Intelligence in Urban Scenarios
Published 2022-06-01“…With this validated algorithm, researchers can develop a real-time hardware-based model to detect emergency vehicles and make them arrive at the hospital as soon as possible. …”
Get full text
Article -
2518
An automated platform to detect, assess, and quantify deterioration in concrete structures
Published 2025-10-01“…This study was motivated by the critical need for accurate and fast damage detection in concrete structures, benefiting from significant advantages offered by automated condition assessment strategies compared to manual ones. …”
Get full text
Article -
2519
Development of an Automatic System to Detect and Spray Herbicides in Corn Fields
Published 2020-06-01“…In this study, a patch spraying system was developed to automatically detect and spray herbicides on weeds in the corn field based on weed density. …”
Get full text
Article -
2520
Rice Plant Disease Detection using Convolutional Neural Networks
Published 2025-05-01Get full text
Article