Showing 3,541 - 3,560 results of 12,239 for search 'algorithm detection', query time: 0.19s Refine Results
  1. 3541

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  2. 3542

    Motion Object Detection Model for Electronic Referee Scoring in Table Tennis Events. by Xiaoke Li, Lili Guo

    Published 2025-01-01
    “…Therefore, this study combines the background subtraction method and the Kalman filtering algorithm. It processes missing images in videos to propose a motion object detection and motion estimation model for table tennis events. …”
    Get full text
    Article
  3. 3543
  4. 3544

    Wireless Multimedia Sensor Network Based Subway Tunnel Crack Detection Method by Bo Shen, Wen-Yu Zhang, Da-Peng Qi, Xiao-Yang Wu

    Published 2015-06-01
    “…We also designed a fast, easy to implement fracture identification and detection image processing algorithm that can solve the image identification and detection problem. …”
    Get full text
    Article
  5. 3545

    Random walk based snapshot clustering for detecting community dynamics in temporal networks by Filip Blašković, Tim O. F. Conrad, Stefan Klus, Nataša Djurdjevac Conrad

    Published 2025-07-01
    “…To validate our approach, we develop an agent-based algorithm that generates synthetic datasets with the desired characteristic properties, enabling thorough testing and benchmarking. …”
    Get full text
    Article
  6. 3546

    Deterministic local multi-point fault detection method for industrial control topology by Ruozhou LIANG, Xibin ZHAO, Hai WAN

    Published 2021-10-01
    “…In view of the fact that the existing network fault detection algorithms cannot meet the four requirements of determination of detection time, low detection overhead, multi-point fault detection ability and topology adaptability of industrial control network at the same time, a multi-point fault detection method of time sensitive network based on Boolean network mapping was proposed.The method was divided into offline preparation phase and online detection phase.In the offline preparation phase, the detection flow generation algorithm generated a set of detection flows based on the network topology.The detection flow set covered the edges of the network topology.In the online detection phase, the detection packet was sent periodically from the source node to the controller according to the predefined path.Then, the controller inferred the failed link according to the arrival state of each detection packet.The experimental results show that, compared with the existing methods, the proposed method can accurately identify multiple failed links in a certain time, and generate fewer detection path sets to meet the above four requirements.…”
    Get full text
    Article
  7. 3547
  8. 3548

    CodeGuard: enhancing accuracy in detecting clones within java source code by Yasir Glani, Luo Ping

    Published 2024-12-01
    “…Detecting code clones remains challenging, particularly for Type-II clones, with modified identifiers, and Type-III ST and MT clones, where up to 30% and 50% of code, respectively, are added or removed from the original clone code. …”
    Get full text
    Article
  9. 3549

    Detection system of multi-track intelligent inspection robot for urban rail vehicles by WU Hongbo, QIU Weiming, WANG Jing, ZHU Linsen

    Published 2022-01-01
    “…The multi-track intelligent inspection robot detection system of urban rail vehicles realized automatic detection of the bottom and both sides of subway vehicles by adopting intelligent robot technology, SLAM (Simultaneous Localization and Mapping) technology, multi-degree-of-freedom flexible cooperative manipulator control technology, high-definition optical imaging technology and AI (Artistic Intelligence) algorithm, as well as automatic early warning of abnormal situations such as deformation, looseness, missing and foreign bodies of key components of vehicle running gear. …”
    Get full text
    Article
  10. 3550
  11. 3551

    Track line status detection system for subway based on lightweight convolutional network by LIN Jun, YUAN Hao, LIU Yue, KANG Gaoqiang, TONG Hao

    Published 2022-03-01
    “…Combined with the hard sample mining based on cloud-edge collaboration and model acceleration technologies, the algorithm can meet the detection performance of high accuracy and real-time. …”
    Get full text
    Article
  12. 3552

    Accuracy–Efficiency Trade-Off: Optimizing YOLOv8 for Structural Crack Detection by Jiahui Zhang, Zoia Vladimirovna Beliaeva, Yue Huang

    Published 2025-06-01
    “…YOLO (You Only Look Once) is a real-time object detection algorithm known for its high speed and decent accuracy. …”
    Get full text
    Article
  13. 3553

    Music Classification and Detection of Location Factors of Feature Words in Complex Noise Environment by Yulan Xu, Qiaowei Li

    Published 2021-01-01
    “…In order to solve the problem of the influence of feature word position in lyrics on music emotion classification, this paper designs a music classification and detection model in complex noise environment. Firstly, an intelligent detection algorithm for electronic music signals under complex noise scenes is proposed, which can solve the limitations existing in the current electronic music signal detection process. …”
    Get full text
    Article
  14. 3554

    Multi-Platform Detection of Melon Leaf Abnormalities Using AVGHEQ and YOLOv7 by Sahrial Ihsani Ishak, Karlisa Priandana, Sri Wahjuni

    Published 2025-05-01
    “…This research develops a multiplatform system for detecting abnormalities in melon leaves, integrating an Internet of Things (IoT) approach using Jetson Nano, a Streamlit-based website, and a mobile application for real-time monitoring. …”
    Get full text
    Article
  15. 3555

    Self-Healing of Active Distribution Networks by Accurate Fault Detection, Classification, and Location by Sally El-Tawab, Hassan S. Mohamed, Amr Refky, A. M. Abdel-Aziz

    Published 2022-01-01
    “…The proposed algorithm utilized a discrete wavelet transform (DWT) to decompose the measured current and zero sequence current component of only one terminal (substation) to detect and classify all fault types with the identification of the faulted phase (s). …”
    Get full text
    Article
  16. 3556

    Proposing Smart System for Detecting and Monitoring Vehicle Using Multiobject Multicamera Tracking by Phat Nguyen Huu, Bang Nguyen Anh, Quang Tran Minh

    Published 2024-01-01
    “…Our system leverages data collected from traffic surveillance cameras and harnesses the power of deep learning technology to detect and track vehicles smoothly. To achieve this, we use the YOLO model for detection in conjunction with the DeepSORT algorithm for precise vehicle tracking on each camera. …”
    Get full text
    Article
  17. 3557

    Whispers in the air: Designing acoustic classifiers to detect fruit flies from afar by Alia Khalid, Muhammad Latif Anjum, Salman Naveed, Wajahat Hussain

    Published 2025-03-01
    “…Our proposed method generalizes over different classifiers and features. Our algorithm provides robust detection and classification of multiple bugs, over longest ranges reported, using simple microphones. …”
    Get full text
    Article
  18. 3558

    Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network by Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Pragma Kar

    Published 2016-01-01
    “…Finally, a verification phase is used to remove falsely accused nodes and identify real adversaries. The novelty of our algorithm is that it can detect both short path and long path wormhole links. …”
    Get full text
    Article
  19. 3559

    ATBHC-YOLO: aggregate transformer and bidirectional hybrid convolution for small object detection by Dandan Liao, Jianxun Zhang, Ye Tao, Xie Jin

    Published 2024-11-01
    “…However, many methods are ineffective for challenging UAV images that feature uneven object scales, sparse spatial distribution, and dense occlusions. We propose a new algorithm for detecting small objects in UAV images, called ATBHC-YOLO. …”
    Get full text
    Article
  20. 3560

    ML-based Plant Stress Detection from IoT-sensed Reduced Electromes by Marcos De Oliveira Jr, Gregory Sedrez, Gerson Geraldo H. Cavalheiro

    Published 2023-05-01
    “…The results validated the proposed approach, with the best performance obtained with the PAA+SAX techniques combined with the SVM algorithm, achieving good data reduction and improving stress detection, without compromising data quality. …”
    Get full text
    Article