Search alternatives:
flow » low (Expand Search)
Showing 321 - 340 results of 455 for search 'flow detection algorithm', query time: 0.11s Refine Results
  1. 321

    Fault-Tolerance Distributed Control Plane for Software Defined Networks by Vasily N. Pashkov

    Published 2019-03-01
    “…The architecture of the high availability distributed control plane for SDN/OpenFlow networks are considered. High availability is achieved by redundancy of controller instances, active switch-controller communications, computing resources and tools for a controller instance failure and overloading detection and recovery. …”
    Get full text
    Article
  2. 322

    Multiple People Tracking Using Camera Networks with Overlapping Views by Wan Jiuqing, Li Achuan

    Published 2015-01-01
    “…In each round of our algorithm, the people are detected by inference on a factor graph model at each time slice. …”
    Get full text
    Article
  3. 323

    Machine learning with hyperparameter optimization applied in facies-supported permeability modeling in carbonate oil reservoirs by Watheq J. Al-Mudhafar, Alqassim A. Hasan, Mohammed A. Abbas, David A. Wood

    Published 2025-04-01
    “…Results showed that the XGBoost algorithm with configuration of (RS as search algorithm, Box Cox as the normalization method, Z-score for outlier detection, without scale correction, old parameter space) delivered the best prediction performance for permeability with RMSE values of 6.9 md and 9.78 md for training and testing, respectively.…”
    Get full text
    Article
  4. 324

    Research on Air Quality Monitoring System and Evaluation Method in Closed Environment by LI Bo-chen, DING Xi-bo, CAI Qing-yao

    Published 2019-02-01
    “…A modular design method is used to design a closed air quality monitoring system, The air quality monitoring system is composed of a main board and detection modules. When the measured closed environment is changed, it is only necessary to add or reduce the corresponding detection module, which increases the flexibility of the system and the convenience of later maintenance, and evaluation algorithm based on fuzzy mathematics is established. …”
    Get full text
    Article
  5. 325

    Fault Diagnosis and Prognosis With Inferential Sensors: A Hybrid Approach Integrating Symbolic Regression and Information Theory by Efi Safikou, Krishna R. Pattipati, George M. Bollas

    Published 2025-01-01
    “…We propose a fault diagnosis approach that integrates symbolic regression and information theory to optimize inferential sensors, which, along with traditional detection techniques and hard sensors, contribute to a comprehensive fault detection and diagnosis algorithm. …”
    Get full text
    Article
  6. 326

    Autonomous vehicle surveillance through fuzzy C-means segmentation and DeepSORT on aerial images by Asifa Mehmood Qureshi, Moneerah Alotaibi, Sultan Refa Alotaibi, Dina Abdulaziz AlHammadi, Muhammad Asif Jamal, Ahmad Jalal, Bumshik Lee

    Published 2025-05-01
    “…After segmentation, we employed the YOLOv4 deep learning algorithm, which is efficient in detecting small-sized objects in vehicle detection. …”
    Get full text
    Article
  7. 327

    Closed-Loop Fault Diagnosis of SDR Using Gap Metric, PCA, and Kalman’s Principle by Hongfu Wang, Qinghua Zeng, An Wang, Zongyu Zhang, Weide Liu

    Published 2023-01-01
    “…The measurement of the pressure in the gas generator (GG) plays a decisive role in the closed-loop regulation of the gas flow in a solid ducted rocket ramjet (SDR). Therefore, the fault detection and isolation (FDI) of the pressure sensors is particularly significant. …”
    Get full text
    Article
  8. 328

    Research on the method of discovering specific organization structure in bank account transaction network by Fang LYU, Xijing LU, Wei WANG, Junheng HUANG, Bailing WANG

    Published 2020-02-01
    “…In recent years,stakeholder economic crime behaviors such as illegal pyramid schemes,illegal fund raising and money laundering despite repeated prohibitions,makes the research of anomaly detection in financial transaction network has gradually attracted the attention of researchers.The way how to fund flow between bank accounts in an illegal organization implies the relationship structure of their members.Firstly,a directed weighted transaction network model was built on the basis of the transaction characteristics.Then,combining with the localtopology structure of the built transaction network of the accounts,two kinds of core nodes of the organization,including black hole nodes and star nodes,were defined.By analyzing the relationship between those two kinds nodes,an organization discovery algorithm of combining “black hole and star nodes” based on spanning subgraph was proposed.Experiments on real bank accounts transaction network containing illegal pyramid scheme organizations show the effectiveness of the algorithm in discovering the specific tree organization structure.…”
    Get full text
    Article
  9. 329

    At the Traffic Intersection, Stopping, or Walking? Pedestrian Path Prediction Based on KPOF-GPDM for Driving Assistance by Xudong Long, Weiwei Zhang, Bo Zhao, Shaoxing Mo

    Published 2021-01-01
    “…When the vehicle encounters a blocked pedestrian at a traffic intersection, we used self-flow to estimate the global optical flow in the image sequence and then proposed a White Edge Cutting (WEC) algorithm to remove obstructions and simply modified the generative adversarial network to initialize pedestrians behind the obstructions. …”
    Get full text
    Article
  10. 330

    RF-Based Sensing and AI Decision Support for Stroke Patient Monitoring: A Digital Twin Approach by Sagheer Khan, Usman Anwar, Aftab Khan, Tughrul Arslan

    Published 2025-01-01
    “…Stroke occurs when the blood flow to a certain region of the brain is disrupted. …”
    Get full text
    Article
  11. 331

    Multiple UAV Swarms Collaborative Firefighting Strategy Considering Forest Fire Spread and Resource Constraints by Pei Zhu, Rui Song, Jiangao Zhang, Ziheng Xu, Yaqi Gou, Zhi Sun, Quan Shao

    Published 2024-12-01
    “…A temperature change-driven adaptive step-length search strategy is proposed to improve the accuracy of the search and detection of fire spots. The critical water flow rate required for fire suppression is calculated to evaluate the firefight performance, and an emergency bidding algorithm is applied to enable multiple UAV swarms collaborative firefighting under limited resources, including different payloads per UAV and swarm number. …”
    Get full text
    Article
  12. 332

    Experimental investigation of vibrational signal in a fault induced Francis runner by Prajwal Sapkota, Subarna Paudel, Ravi Poudel, Sailesh Chitrakar, Hari Prasad Neopane, Bhola Thapa

    Published 2025-03-01
    “…Hydro turbines are prone to failure and the detection of fault in turbine is essential to ensure the reliability of power plant. …”
    Get full text
    Article
  13. 333

    Graph cut-based segmentation for intervertebral disc in human MRI by Leena Silvoster, R. Mathusoothan S. Kumar

    Published 2025-12-01
    “…This method effectively detects degenerated and healthy IVDs by applying the s-t max-flow/min-cut algorithm within a directed graph. …”
    Get full text
    Article
  14. 334

    Intelligent Recognition Technology for the Segmentation of Traffic Indication Images Concerning Different Pavement Materials by Juanhong Xie, Guojian Shi, Weizhi Zhu

    Published 2022-01-01
    “…Traffic indication is an important part of the road environment, providing information about road conditions, restrictions, prohibitions, warnings, and the current status related to the flow of the traffic and other navigational aspects. …”
    Get full text
    Article
  15. 335

    Intelligent recognition technology of high speed moving target contour in dynamic visual scene by Min Qiu

    Published 2025-03-01
    “…Optimize the brightness of continuous dynamic visual scene images and, based on the optimization results, use a joint target area extraction algorithm to extract high-speed moving target areas; based on the setting of snake curves in the motion target area, a gradient vector flow snake model is constructed to complete the extraction of the edge contour of the motion target. …”
    Get full text
    Article
  16. 336

    A Novel Sparse False Data Injection Attack Method in Smart Grids with Incomplete Power Network Information by Huixin Zhong, Dajun Du, Chuanjiang Li, Xue Li

    Published 2018-01-01
    “…Firstly, according to the obtained measurements and power network information, some incomplete power network information is compensated by using the power flow equation approach. Then, the fault tolerance range of bad data detection (BDD) for the attack residual increment is estimated by calculating the detection threshold of the residual L2-norm test. …”
    Get full text
    Article
  17. 337

    Research on an intelligent coagulant dosing system based on alum floc image recognition by FU Yuan, LEI Zhifeng, CUI Dongfeng, GUO Zhongquan, CAI Bohan, XIAO Yan, ZHOU Aijiao*

    Published 2023-08-01
    “…The system combines the YOLOv5 alum floc recognition algorithm and the Linear Regression dosing decision algorithm. …”
    Get full text
    Article
  18. 338

    Integration of acoustic, optical, and electrical methods in picoliter droplet microfluidics for rare particles enrichment by Huasheng Zhuo, Chunhua He, Canfeng Yang, Xian Jiang, Fan Li, Xiangliang Yang, Hai Yang, Tuying Yong, Zhiyong Liu, Yan Ma, Lei Nie, Guanglan Liao, Tielin Shi

    Published 2025-05-01
    “…The cooperative dynamics of acoustic and flow focusing are explored. The optical fibers with an enhanced detection algorithm greatly boost optical detection sensitivity. …”
    Get full text
    Article
  19. 339

    Development of the intelligent traffic light system based on image processing and fuzzy control techniques by Hoang Dung Nguyen, Hoang-Dang Le, Van Khanh Nguyen, Hung Minh Lam

    Published 2024-11-01
    “…The study uses an object recognition algorithm to identify, classify, and count vehicles. …”
    Get full text
    Article
  20. 340

    MambaPose: A Human Pose Estimation Based on Gated Feedforward Network and Mamba by Jianqiang Zhang, Jing Hou, Qiusheng He, Zhengwei Yuan, Hao Xue

    Published 2024-12-01
    “…Compared with the typical algorithm, it was improved by 1.1% on AP50. The proposed method can effectively detect the keypoints of the human body, and provides stronger robustness and accuracy for the estimation of human posture in complex scenes.…”
    Get full text
    Article