Showing 81 - 100 results of 2,002 for search 'algorithm detection problem', query time: 0.10s Refine Results
  1. 81

    Application of Immune Complement Algorithm to NSL-KDD Intrusion Detection Dataset by Mafaz Khalil Alanezi, Najlaa Aldabagh

    Published 2012-12-01
    “…Evolutionary algorithms seem to be the most attractive approaches for this class of problems, because they are usually population based techniques that can find multiple compromise solution in a single run, and they do not require any hypotheses on the objective functions. …”
    Get full text
    Article
  2. 82
  3. 83

    University Media Content Detection and Classification Based on Information Fusion Algorithm by Shuntao Zhang, Qinglan Yu, Tianming Yang, Kai Peng

    Published 2022-01-01
    “…This essay mainly introduces the technology of university media content detection and classification based on information fusion algorithm and focuses on the application of university multimedia content detection, analysis, and understanding, to explore the image discrimination auxiliary attribute feature learning and content association prediction and classification. …”
    Get full text
    Article
  4. 84

    Stochastic algorithm for HDFS data theft detection based on MapReduce by Yuanzhao GAO, Binglong LI, Xingyuan CHEN

    Published 2018-10-01
    “…To address the problems of big data efficient analysis and insider theft detection in the data theft detection of distributed cloud computing storage,taking HDFS (hadoop distributed file system) as a case study,a stochastic algorithm for HDFS data theft detection based on MapReduce was proposed.By analyzing the MAC timestamp features of HDFS generated by folder replication,the replication behavior’s detection and measurement method was established to detect all data theft modes including insider theft.The data set which is suitable for MapReduce task partition and maintains the HDFS hierarchy was designed to achieve efficient analysis of large-volume timestamps.The experimental results show that the missed rate and the number of mislabeled folders could be kept at a low level by adopting segment detection strategy.The algorithm was proved to be efficient and had good scalability under the MapReduce framework.…”
    Get full text
    Article
  5. 85

    Workflow for effective integration of community detection algorithms in brain network analysis by Flavio Averhoff, Vladimir Aristov, Ivan Stepanyan, Chen Yunwei, Jorge Gulín González

    Published 2025-07-01
    “…This study presents a workflow utilizing network analysis based on community detection methods and functional magnetic resonance imaging (fMRI) to investigate brain connectomics problems. …”
    Get full text
    Article
  6. 86

    An Anomaly Detection Based on Data Fusion Algorithm in Wireless Sensor Networks by Xingfeng Guo, Dianhong Wang, Fenxiong Chen

    Published 2015-05-01
    “…However, energy consumption and outlier detection have been always the hot topics in WSN. In order to solve the above problems, this paper proposes a timely anomaly detection algorithm which is based on the data fusion algorithm. …”
    Get full text
    Article
  7. 87

    A Community Detection Algorithm Based on Topology Potential and Spectral Clustering by Zhixiao Wang, Zhaotong Chen, Ya Zhao, Shaoda Chen

    Published 2014-01-01
    “…In order to solve these problems, this paper puts forward a novel community detection algorithm based on topology potential and spectral clustering. …”
    Get full text
    Article
  8. 88
  9. 89

    Research on Lightweight Small Object Detection Algorithm Based on Context Representation by Li Qiang, Cui Jianghui

    Published 2025-04-01
    “…Fully utilizing contextual semantic information is of great significance for solving the problems of small object detection. This paper proposes a lightweight framework algorithm based on a contextual semantic fusion model, which is built upon the YOLOv7 model. …”
    Get full text
    Article
  10. 90

    Edge detection of aerial images using artificial bee colony algorithm by Nurdan Akhan Baykan, Elif Deniz Yelmenoglu

    Published 2022-06-01
    “…Therefore, lots of methods are used in the development and the developed studies provide a variety of solutions to problems of computer vision systems. In many studies, metaheuristic algorithms have been used for obtaining better results. …”
    Get full text
    Article
  11. 91

    An enhanced YOLOv8‐based bolt detection algorithm for transmission line by Guoxiang Hua, Huai Zhang, Chen Huang, Moji Pan, Jiyuan Yan, Haisen Zhao

    Published 2024-12-01
    “…Abstract The current bolt detection for overhead work robots used for transmission lines faces the problems of lightweight algorithms and high accuracy of target detection. …”
    Get full text
    Article
  12. 92

    Lightweight defect detection algorithm of tunnel lining based on knowledge distillation by Anfu Zhu, Jiaxiao Xie, Bin Wang, Heng Guo, Zilong Guo, Jie Wang, Lei Xu, SiXin Zhu, Zhanping Yang

    Published 2024-11-01
    “…Abstract Due to the influence of construction quality, engineering geology and hydrological environment, defects such as dehollowing and insufficient compaction can occur in tunnels. Aiming at the problems of complex detection model, poor real-time performance and low accuracy of the current tunnel lining defect detection methods, the study proposes a lightweight defect detection algorithm of tunnel lining based on knowledge distillation. …”
    Get full text
    Article
  13. 93
  14. 94

    CGDINet: A Deep Learning-Based Salient Object Detection Algorithm by Chengyu Hu, Jianxin Guo, Hanfei Xie, Qing Zhu, Baoxi Yuan, Yujie Gao, Xiangyang Ma, Jialu Chen, Juan Tian

    Published 2025-01-01
    “…To address these problems, an improved significance object detection network—CGDINet (Coordinate Attention-Group Consensus Aggregation Module-Depth Auxiliary Module-Inverse Saliency Pyramid Reconstruction Network)—is proposed. …”
    Get full text
    Article
  15. 95

    A Coevolutionary Algorithm Based on Constraints Decomposition for Constrained Multi-objective Optimization Problems by Guangpeng Li, Li Li, Guoyong Cai

    Published 2025-05-01
    “…Abstract Constrained multi-objective optimization problems (CMOPs) are challenging for evolutionary algorithms (EAs). …”
    Get full text
    Article
  16. 96
  17. 97

    Parallel Jacobian Computation Based on Distance-2 Algorithm and Its Application in Coupling Problems by LIU Lixun, ZHANG Han, PENG Xinru, DOU Qinrong, WU Yingjie, GUO Jiong, LI Fu

    Published 2024-06-01
    “…However, when solving the larger scale problem under a distributed-memory parallel environment, the parallel graph coloring algorithm is required because the Jacobian is distributed among all processors. …”
    Article
  18. 98

    Parameter Prediction for Metaheuristic Algorithms Solving Routing Problem Instances Using Machine Learning by Tomás Barros-Everett, Elizabeth Montero, Nicolás Rojas-Morales

    Published 2025-03-01
    “…Here, we evaluate our proposal on the Capacitated Vehicle Routing Problem with Time Windows (CVRPTW) using its state-of-the-art algorithm, Hybrid Genetic Search (HGS). …”
    Get full text
    Article
  19. 99

    Technologies and Algorithms for Building the Augmented Reality by I. A. Blagoveshchenskiy, N. A. Demyankov

    Published 2013-04-01
    “…In order to analyze video stream and recognize known objects in it, algorithms of the Computer Vision are used. The authors give a short description and the main characteristics only of two of them: genetic algorithms and feature detection & description. …”
    Get full text
    Article
  20. 100

    MOADA-SVR:a multivariate online anomaly detection algorithm based on SVR by QIAN Ye-kui1, CHEN Ming1

    Published 2011-01-01
    “…Network anomaly detection is critical to guarantee stabilized and effective network operation.Although PCA-based network-wide anomaly detection algorithm has good detection performance,it cannot satisfy demands of online detection.In order to solve the problem,after traffic matrix model was introduced,a normality model of traffic was constructed using SVR and the sparsification of support vector solutions.Based on these,a multivariate online anomaly detection algorithm based on SVR named MOADA-SVR was proposed.Theoretic analysis showed that MOADA-SVR had lower storage and less computing overhead compared with PCA.Analysis for traffic matrix datasets Internet showed that MOADA-SVR had also good detection performance,approximating PCA.…”
    Get full text
    Article