Showing 1,401 - 1,420 results of 2,002 for search 'algorithm detection problem', query time: 0.15s Refine Results
  1. 1401

    Multiple People Tracking Using Camera Networks with Overlapping Views by Wan Jiuqing, Li Achuan

    Published 2015-01-01
    “…We present a novel framework for multiple pedestrian tracking using overlapping cameras in which the problems of object detection and data association are solved alternately. …”
    Get full text
    Article
  2. 1402

    High-precision Pupil Center Positioning Method Based on Near-eye Infrared Image by WANG Peng, WEN Hong-tao, WANG Shi-long

    Published 2022-10-01
    “…Finally, an improved ellipse fitting algorithm is designed to locate the pupil center. Experimental results show that the algorithm can accurately locate the center of the pupil when the pupil is disturbed by the reflected light spot or partially occluded, with an overall accuracy of 98.2%. …”
    Get full text
    Article
  3. 1403

    A Bionic Social Learning Strategy Pigeon-Inspired Optimization for Multi-Unmanned Aerial Vehicle Cooperative Path Planning by Yankai Shen, Xinan Liu, Xiao Ma, Hong Du, Long Xin

    Published 2025-01-01
    “…This paper proposes a bionic social learning strategy pigeon-inspired optimization (BSLSPIO) algorithm to tackle cooperative path planning for multiple unmanned aerial vehicles (UAVs) with cooperative detection. …”
    Get full text
    Article
  4. 1404

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  5. 1405

    RECOGNITION OF PROPELLER-DRIVEN AIRCRAFT IN A PASSIVE BISTATIC RADAR by E. N. Vorobev, V. I. Veremyev, D. V. Kholodnyak

    Published 2018-12-01
    “…Nowadays passive bistatic radars (PBR) allow for detection, determination of coordinates and tracking of moving objects. …”
    Get full text
    Article
  6. 1406

    Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head by Wei-wei ZHOU, Bin YU

    Published 2017-11-01
    “…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
    Get full text
    Article
  7. 1407

    Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks by Yong-feng HUANG, Yong-qiang DONG, San-feng ZHANG, Guo-xin WU

    Published 2015-03-01
    “…To avoid monster community problem which suffered by distributed k-clique community detection, τ-window community detection was proposed. …”
    Get full text
    Article
  8. 1408

    A Velocity Dealiasing Scheme Based on Minimization of Velocity Differences between Regions by Yue Yuan, Ping Wang, Di Wang, Junzhi Shi

    Published 2020-01-01
    “…The noise data, strong wind shear, and isolated echo region in the Doppler radar radial velocity data severely interfere with the velocity dealiasing algorithm. This paper proposes a two-step velocity dealiasing algorithm based on the minimization of velocity differences between regions to solve this problem. …”
    Get full text
    Article
  9. 1409

    Identification of line status changes using phasor measurements through deep learning networks by N. E. Gotman, G. P. Shumilova

    Published 2021-03-01
    “…THE PURPOSE. To consider the problem of detecting changes in a power grid topology that occurs as a result of the power line outage / turning on. …”
    Get full text
    Article
  10. 1410

    Application of the Variable Precision Rough Sets Model to Estimate the Outlier Probability of Each Element by Francisco Maciá Pérez, Jose Vicente Berna Martienz, Alberto Fernández Oliva, Miguel Abreu Ortega

    Published 2018-01-01
    “…The experiments conducted demonstrate the feasibility of the proposed algorithm, whose usefulness is contextualised by comparison to different algorithms analysed in the literature.…”
    Get full text
    Article
  11. 1411

    Effective and fair cognitive terminal assignment scheme for cooperative spectrum sensing by WU Zhiqiang, LIU Qianli, LIU Jiabin, FENG Qing, XIAO Shanpeng, LIU Shang

    Published 2024-06-01
    “…For the perceived fairness among different sub-bands, two allocation algorithms were proposed: the arcuate allocation algorithm and the class division allocation algorithm. …”
    Get full text
    Article
  12. 1412

    Closed-Loop Fault Diagnosis of SDR Using Gap Metric, PCA, and Kalman’s Principle by Hongfu Wang, Qinghua Zeng, An Wang, Zongyu Zhang, Weide Liu

    Published 2023-01-01
    “…Compared with the MWPCA algorithm, it was shown that our proposed algorithm was more accurate in fault diagnosis and could avoid the problem of missing alarm when two sensors had consistent faults, which would provide strong support for the safe operation of the SDR and could further promote its application in long-endurance aircrafts.…”
    Get full text
    Article
  13. 1413

    Computerized Interactive Gaming via Supporting Vector Machines by Y. Jiang, J. Jiang, I. J. Palmer

    Published 2008-01-01
    “…This paper describes a supporting vector machine-based artificial intelligence algorithm as one of the possible solutions to the problem of random data processing and the provision of interactive indication for further actions. …”
    Get full text
    Article
  14. 1414

    Energy efficiency optimization study of sub-connected ARIS-assisted ISAC system over millimeter wave channels by WU Xiangkai, YUE Dianwu, YUAN Meng, XU Miao, YANG Jianing

    Published 2025-06-01
    “…The system energy efficiency was maximized by optimizing the beamform for dual-function base station, the phase shift matrix of sub-connected ARIS and the vector of amplification factors for sub-connected ARIS under the user’s minimum signal to interference plus noise ratio and the constraint of radar detection power. An algorithm based on fractional programming (FP) theory, alternating optimization (AO) technique, and successive convex approximation (SCA) technique was proposed to deal with the non-convex problem. …”
    Get full text
    Article
  15. 1415

    Mechanism of situation element acquisition based on deep auto-encoder network in wireless sensor networks by Jiang Zhu, Yue Ming, Yonghui Song, Sen Wang

    Published 2017-03-01
    “…In hierarchical training of the auto-encoder, a training method based on cross-entropy loss function and back-propagation algorithm is proposed to overcome the problem of weights updating too slow by the traditional variance cost function, and the momentum factors are added to improve the convergence performance. …”
    Get full text
    Article
  16. 1416

    Rapid acquisition and surface defects recognition based on panoramic image of small-section hydraulic tunnel by Haoyu Wang, Jichen Xie, Jinyang Fu, Cong Zhang, Dingping Chen, Zhiheng Zhu, Xuesen Zhang

    Published 2025-04-01
    “…In addition, to improve the speed and accuracy of traditional algorithms for tunnel surface defects detection, this paper proposes an improved YOLOv5s-DECA model. …”
    Get full text
    Article
  17. 1417

    A Polarity Reversion Elimination Method for LTE-Advanced Frequency Offset Estimation by Guoqing Jia, Shanji Chen, Chao Chen, Xiaohong Ji, Weidong Fang

    Published 2015-08-01
    “…Traditional fractional frequency offset(FFO)estimation algorithm pay less attention to FFO polarity estimation.Noise and channel fading induced FFO estimation polarity reversion degrades the frequency synchronization performance inevitably.An efficient FFO polarity detection method was proposed in LTE-Advanced system to solve the problem,which utilized the mirror symmetry property of time-domain primary synchronization signal(PSS).Numerical results show that the proposed method can depress FFO polarity reversion efficiently.…”
    Get full text
    Article
  18. 1418

    Real-time Diagnosis and Fault-tolerant Control of Grid-side Current Signal Anomaly in AC Traction System by YUAN Jing, LI Xueming

    Published 2023-04-01
    “…Secondly, based on the two redundant grid-side current signals of the traction drive system and the estimated value of the grid-side current, residual and detection statistics were designed, and the effective fault detection and decision-making of the two grid-side current signal anomalies are achieved by combining the CUSUM algorithm. …”
    Get full text
    Article
  19. 1419

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  20. 1420

    Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion by Zhenwan Zou, Bin Wang, Tao Chen, Jia Chen

    Published 2025-06-01
    “…By using Particle Swarm Optimization-Genetic Algorithm (PSO-GA) for optimal architecture search and combining the dynamic adaptability of Deep Q-Network (DQN) algorithm, this method can automatically identify the most suitable GNN architecture for power data monitoring, thereby improving the adaptive detection and defense efficiency of the system. …”
    Get full text
    Article