Showing 1,681 - 1,700 results of 2,002 for search 'algorithm detection problem', query time: 0.16s Refine Results
  1. 1681

    Nanosecond level time synchronization in datacenter network based on Telemetry architecture by Qianli ZHANG, Chaofan ZHANG, Jilong WANG, Xiangyu TANG, Zhengchen SHEN, Hui WANG

    Published 2021-10-01
    “…To solve the problems of the traditional local time synchronization architecture being disconnected from centralized management, requiring extra interaction overhead, meanwhile with less time data susceptible to outliers, the nanosecond level time synchronization system was proposed based on Telemetry for the high-precision time synchronization requirements of data center networks.Combined with the outlier factor detection algorithm, timestamp information within the background traffic of the data center was collected, the large amount of time information reported was processed and analyzed, and a centralized automatic synchronization with nanosecond level precision was eventually achieved, which was convenient for subsequent global network scheduling.The proposed system was implemented and evaluated on the programmable switch.Experimental results show that between multiple hops and at different link rates, the nodes can achieve high-precision time synchronization at the nanosecond level.…”
    Get full text
    Article
  2. 1682

    Method to improve edge coverage in fuzzing by Chunfu JIA, Shengbo YAN, Zhi WANG, Chenlu WU, Hang LI

    Published 2019-11-01
    “…Aiming at the problems of incomplete edge coverage,insufficient uses of edge coverage information and valid bytes information in AFL (American fuzz lop),a novel method was proposed.Firstly,a new seed selection algorithm was introduced,which could completely cover all edges discovered in one cycle.Secondly,the paths were scored according to the frequency of edges,to adjust the number of tests for each seed.Finally,more mutations were crafted on the valid bytes of AFL.Based on the method above,a new fuzzing tool named efuzz was implemented.Experiment results demonstrate that efuzz outperforms AFL and AFLFast in the edge coverage,with the increases of 5% and 9% respectively.In the LAVA-M dataset,efuzz found more vulnerabilities than AFL.Moreever,in real world applications efuzz has found three new security bugs with CVEs assigned.The method can effectively improve the edge coverage and vulnerability detection ability of fuzzer.…”
    Get full text
    Article
  3. 1683

    Cloud native intelligent operation and maintenance technology by Long XUE, Gang LU, Qi ZHOU, Huiyan ZHANG, Tingjun WAN

    Published 2020-12-01
    “…Relying on the advantages of simple and fast applications,easy deployment of applications,and on-demand scaling of running applications,cloud native technology has been rapidly promoted.However,with the application of cloud native,the system architecture has become more complex and the scale of resources has become larger,and there is an urgent need for more intelligent operation and maintenance.Using intelligent operation and maintenance can better assist cloud-native application development,reduce operation and maintenance costs,and improve service quality.The application scenarios,key points,classic practices and existing problems of intelligent operation and maintenance were analyzed,and a cloud-native intelligent operation and maintenance architecture were proposed,and the main principles of the three scenarios:the trend prediction,data anomaly detection and fault location diagnosing in the core service algorithm platform were introduced in detail,and finally the future of intelligent operation and maintenance were looked forward.…”
    Get full text
    Article
  4. 1684

    Research on the evaluation method of cooperative jamming effectiveness based on IPSO-ELM by A. Tianjian Yang, B. Xing Wang, C. Siyi Cheng, D. You Chen, E. Xi Zhang

    Published 2025-01-01
    “…Finally, the IPSO-ELM algorithm is subjected to rigorous assessment via simulation, confirming its performance of accuracy and efficiency. …”
    Get full text
    Article
  5. 1685

    Vehicle Trajectory Reconstruction on Urban Traffic Network Using Automatic License Plate Recognition Data by Xinyi Qi, Yanjie Ji, Wenhao Li, Shuichao Zhang

    Published 2021-01-01
    “…This paper deals with the problem of sparse trajectory reconstruction based on ALPR data. …”
    Get full text
    Article
  6. 1686
  7. 1687

    Deceptive Cyber-Resilience in PV Grids: Digital Twin-Assisted Optimization Against Cyber-Physical Attacks by Bo Li, Xin Jin, Tingjie Ba, Tingzhe Pan, En Wang, Zhiming Gu

    Published 2025-06-01
    “…A non-dominated sorting genetic algorithm (NSGA-III) is employed to achieve Pareto-optimal solutions, ensuring high system resilience while minimizing computational burdens. …”
    Get full text
    Article
  8. 1688

    DIFFERENTIAL DIAGNOSIS OF TEMPOROMANDIBULAR DISORDERS WITH THE USE OF DEVELOPED COMPUTER PROGRAM TO DEFINE THE INDIVIDUAL RISK OF THEIR DEVELOPMENT by A.D. Telishevska

    Published 2018-03-01
    “… Urgency of an issue. Problem of diagnosis and treatment of patients with diseases of temporomandibular joint (TMJ) over the years remains relevant, due to lack of consensus on the origin, pathogenesis, differential diagnosis methods, different clinical disorders similarity. …”
    Get full text
    Article
  9. 1689

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  10. 1690

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  11. 1691

    Automated sample tracking and parameter adaption for scanning laser optical tomography. by Hannes Benecke, Firas Almadani, Johannes Heske, Tobias May, Ludger Overmeyer, Sonja Johannsmeier, Tammo Ripken

    Published 2025-01-01
    “…The sample is not physically aligned, but digitally detected and tracked during the acquisition. Residual motion artifacts that interfere with tomographic reconstruction are corrected using a second automation algorithm. …”
    Get full text
    Article
  12. 1692

    Ground Based Cloud Recognition with an Anchor Free Method by LI Yichao, GUO Rui, ZHANG Shaodi, SHOU Zefeng, CHEN Jing, LIU Yifei

    Published 2023-04-01
    “…In order to solve the problems of cloud type recognition of the ground-based cloud such as complex target candidate box selection and slow detection speed, a recognition method of cloud types in ground-based cloud map based on anchor free is proposed.First, the paper takes Center Net as the basic architecture of cloud type recognition.Based on thermodynamic diagrams prediction, key point prediction, center point prediction and candidate box prediction, a anchor free ground-based cloud type detection process is constructed.And then, the main network, loss function and candidate box prediction method of cloud type recognition model are designed.Finally, take CenterNet Resdcn101 as the model, compared the algorithm recognition accuracy, candidate boxes predict confidence and identify speed with mainstream target recognition methods and cloud type recognition method The results showed that the cloud type recognition method of the paper has higher recognition accuracy and faster recognition speed.…”
    Get full text
    Article
  13. 1693

    Postulates of oncology alertness for an outpatient therapist: let’s look at the example of lung cancer by A. L. Vertkin, M. A. Rudnitskaya, Yu. V. Vakhabova, G. Yu. Knorring

    Published 2024-10-01
    “…The solution to this serious medical and social problem is seen in increasing the effectiveness of detecting early stages of cancer at an early stage, including at the outpatient stage of medical care. …”
    Get full text
    Article
  14. 1694

    A method based on clustering fast search for bearing performance degradation assessment by ShengWen Zhou, Li Zhang, Xiaoming Yang, Fan Xu, BaiGang Du, RuiPing Luo, Wenhui Zeng

    Published 2025-05-01
    “…Abstract To address the problem of relying on manual experience to determine the number of cluster centers, this paper introduces an approach for evaluating the performance degradation of rolling bearings using the clustering by fast search (CFS) algorithm. …”
    Get full text
    Article
  15. 1695

    Multipath Suppression and High-precision Angle Measurement Method Based on Feature Game Preprocessing by Houhong XIANG, Yongliang WANG, Yuxi LI, Yufeng CHEN, Fengyu WANG, Xiaolu ZENG

    Published 2025-04-01
    “…The meter-wave radar, known for its wide beamwidth, often faces challenges in detecting low-elevation targets due to interference from multipath signals. …”
    Get full text
    Article
  16. 1696

    PROLONGED AIR LEAK AFTER LOBECTOMY IN LUNG CANCER PATIENTS by E. A. Toneev, D. V. Bazarov, O. V. Pikin, A. L. Charyshkin, A. A. Martynov, R. I. Lisyutin, A. Sh. Zulkarnyaev, E. P. Anokhina

    Published 2020-03-01
    “…The prolonged air-leak (PAL) is a serious problem if it lasts more than 5 days after lung surgery with the reported incidence of 15 %. …”
    Get full text
    Article
  17. 1697

    Mapping Landslide Sensitivity Based on Machine Learning: A Case Study in Ankang City, Shaanxi Province, China by Baoxin Zhao, Jingzhong Zhu, Youbiao Hu, Qimeng Liu, Yu Liu

    Published 2022-01-01
    “…The 15 landslide influencing factors are selected as follows: slope aspect, slope degree, elevation, terrain curvature, plane curvature, profile curvature, surface roughness, distance to faults, distance to roads, landform, lithology, distance to rivers, rainfall, stream power index (SPI), and normalized difference vegetation index (NDVI), and the potential multicollinearity problem among these factors is detected by Pearson correlation coefficient (PCC), variance inflation factor (VIF), and tolerance (TOL). …”
    Get full text
    Article
  18. 1698

    A MACHINE LEARNING DISTRACTED DRIVING PREDICTION MODEL by Samira AHANGARI, Mansoureh JEIHANI, Abdollah DEHZANGI

    Published 2021-07-01
    “…To find the best strategies to overcome this problem, we developed a Bayesian Network (BN) distracted driving prediction model using a driving simulator. …”
    Get full text
    Article
  19. 1699

    Recovering Pulsar Periodicity from Time-of-arrival Data by Finding the Shortest Vector in a Lattice by Dotan Gazith, Aaron B. Pearlman, Barak Zackay

    Published 2025-01-01
    “…Identifying such a periodicity from a discrete set of arrival times is a difficult algorithmic problem, In particular when the pulsar is in a binary system. …”
    Get full text
    Article
  20. 1700

    LCD-Based Angle-of-Arrival Estimation of Multiple Light Sources: Paving the Road to Multiuser VLC by Andrej Harlakin, Peter A. Hoeher

    Published 2024-01-01
    “…It is identified that target separation gets increasingly challenging with decreasing distance between LSs, and AoA estimation developed for a single LS leads to ambiguities in scenarios with multiple LSs. These problems are solved by a novel angular separation algorithm and dedicated intensity measurements. …”
    Get full text
    Article