Search alternatives:
flow » low (Expand Search)
Showing 121 - 140 results of 455 for search 'flow detection algorithm', query time: 0.12s Refine Results
  1. 121

    An Improved Kernelized Correlation Filter for Extracting Traffic Flow in Satellite Videos by Dudu Guo, Hongbo Shuai, Jie Zhang, Yang Wang, Miao Sun

    Published 2025-01-01
    “…Finally, the virtual detection line method was used to extract the traffic flow. …”
    Get full text
    Article
  2. 122

    Location of the Voltage Sag Source Based on Negative Sequence Power Flow by WEN Lei

    Published 2015-01-01
    “…Voltage sag source location is the important basis for detecting weak part and solving the responsibility’s problems between customers and suppliers. …”
    Get full text
    Article
  3. 123

    A flexible generative algorithm for growing in silico placentas. by Diana C de Oliveira, Hani Cheikh Sleiman, Kelly Payette, Jana Hutter, Lisa Story, Joseph V Hajnal, Daniel C Alexander, Rebecca J Shipley, Paddy J Slator

    Published 2024-10-01
    “…Complications like fetal growth restriction and pre-eclampsia are linked to placental vascular structure abnormalities, highlighting the need for early detection of placental health issues. Computational modelling offers insights into how vascular architecture correlates with flow and oxygenation in both healthy and dysfunctional placentas. …”
    Get full text
    Article
  4. 124

    Network-based malcode detection technology by WU Bing1, YUN Xiao-chun2, GAO Qi1

    Published 2007-01-01
    “…Following the analysis for traditional distributed IDS,disadvantages that applying structure of multiple engine and small rules set to detect network-level malcode were pointed out,which is based on detailed protocol decoding.Detection model and anti-malcode markup language of network-level malcode were designed for single engine and big rules set.The characteristics of network data flow were analyzed.By optimization of patterns,frequent collisions between suffix with data flow and unbalanced branched of chained list were avoided.The efficiency by using WM algorithm to detect malcode on network level can be remarkably increased.…”
    Get full text
    Article
  5. 125

    Online Spectroscopic Study on the Positive and the Negative Electrolytes in Vanadium Redox Flow Batteries by Le Liu, Jingyu Xi, Zenghua Wu, Wenguang Zhang, Haipeng Zhou, Weibin Li, Yonghong He

    Published 2013-01-01
    “…Traditional spectroscopic analysis based on the Beer-Lambert law cannot analyze the analyte with high concentration and interference between different compositions, such as the electrolyte in vanadium redox flow batteries (VRBs). Here we propose a new method for online detection of such analytes. …”
    Get full text
    Article
  6. 126

    Networked Sensor-Based Adaptive Traffic Signal Control for Dynamic Flow Optimization by Xinhai Wang, Wenhua Shao

    Published 2025-06-01
    “…This can effectively detect changes in road traffic flow and provide early warnings for possible accidents. …”
    Get full text
    Article
  7. 127

    Flow cytometry in the diagnosis of plasma cell tumors and assessment of minimal residual disease by L. Yu. Grivtsova, T. Yu. Mushkarina, V. V. Lunin, P. A. Zeynalova

    Published 2021-09-01
    “…Standardized flow cytometric protocols (the Euro-Flow conception) and algorithms for both the diagnosis of plasma cell tumors and the detection of minimal residual disease in plasma cell myeloma are described.…”
    Get full text
    Article
  8. 128
  9. 129

    Development of a novel quantitative lateral flow assay for vancomycin for therapeutic drug monitoring by Alaa Riezk, Vasin Vasikasin, Richard C. Wilson, Timothy M. Rawson, Anthony E. G. Cass, Alison H. Holmes

    Published 2025-07-01
    “…Signal ratios from smartphone-acquired images were quantified using an automated image analysis algorithm. Applied to vancomycin in serum, the LFA demonstrated a quantitative detection range of 2.88 to 45,000 ng/mL, with good accuracy, reproducibility, and high recovery in spiked samples. …”
    Get full text
    Article
  10. 130

    Leveraging Bluetooth and GPS Sensors for Route-Level Passenger Origin–Destination Flow Estimation by Junming Xu, Zhenxing Pan, Cheng Zhang, Xiaoguang Yang

    Published 2025-04-01
    “…A Fuzzy C-Means clustering algorithm was employed to differentiate passenger and non-passenger devices based on detected indicators, such as detection frequency, signal strength, vehicular mobility, etc. …”
    Get full text
    Article
  11. 131

    An experimental method for detecting objects in an aqueous environment by Kuzmin Yuri, Proshkin Stanislav

    Published 2025-01-01
    “…To facilitate this process, the researchers developed a specialized algorithm designed to filter out pulse and fluctuation interference. …”
    Get full text
    Article
  12. 132

    CME Velocity Field Calculation Model Based on an Unsupervised Transformer Optical Flow Network by Qingyang Chen, Hong Lin, Zhenping Qiang, Hui Liu, Kaifan Ji, Zhenhong Shang

    Published 2024-01-01
    “…The optical flow algorithm (OF) is one the main methods for calculating image velocity field and has many applications in space weather. …”
    Get full text
    Article
  13. 133

    An embedded intelligence engine for driver drowsiness detection by Shirisha Vadlamudi, Ali Ahmadinia

    Published 2022-01-01
    “…This drowsiness of drivers can be detected using various methods, for example, algorithms based on behavioural gestures, physiological signals and vitals. …”
    Get full text
    Article
  14. 134

    IoTFlowGenerator: Crafting Synthetic IoT Device Traffic Flows for Cyber Deception by Joseph Bao, Murat Kantaciourglu, Yevgeniy Vorobeychik, Charles Kamhoua

    Published 2023-05-01
    “…This implies that, to build better honeypots and enhance cyber deception capabilities, IoT honeypots need to generate realistic network traffic flows. To achieve this goal, we propose a novel deep learning based approach for generating traffic flows that mimic real network traffic due to user and IoT device interactions. …”
    Get full text
    Article
  15. 135

    Ensemble Method for Anomaly Detection On the Internet of Things by Kurniabudi Kurniabudi, Eko Arip Winanto, Lola Yorita Astri, Sharipuddin Sharipuddin

    Published 2024-01-01
    “…Therefore, the attack detection method must be able to recognize the type of attack on a very large data traffic flow and unbalanced data. …”
    Get full text
    Article
  16. 136

    A Flow-Speed Model for Motorways in England: Analysis Under Various Weather Conditions by Ye Liu, Haibo Chen, Chuhan Yin, Vivi Michalaki, Phillip Proctor, Gavin Rowley, Xiaowei Wang, Hongyuan Wei

    Published 2025-01-01
    “…The proposed model was fitter on both four-lane and lane-by-lane conditions than the existing models, in terms of lower relative error and RMSE values and higher <i>R</i><sup>2</sup> values (minimum <i>R</i><sup>2</sup> = 0.79), which means the proposed model captured the speed–flow relationship better. In addition, the proposed model was used to fit traffic characteristics under different weather conditions and decided the threshold of the CM algorithms using the Gaussian function. …”
    Get full text
    Article
  17. 137

    Crowd anomaly estimation and detection: A review by A. Hussein, M.W. Raed, A. Al-Shaikhi, M. Mohandes, B. Liu

    Published 2024-09-01
    “…We present a comprehensive literature review on crowd anomaly detection using disruptive technologies such as radio frequency identification, wireless sensor networks, Wi-Fi, and Bluetooth low energy, employing device-free noninvasive algorithms based on received signal strength indicator variations to detect the speed and direction of a moving crowd to predict the onset of a stampede. …”
    Get full text
    Article
  18. 138
  19. 139

    RivAIr: A custom-designed UAV-based sensor for real-time water area segmentation and surface velocity estimation by Marco La Salandra, Rosa Colacicco, Simone Panza, Giovanni Fumai, Pierfrancesco Dellino, Domenico Capolongo

    Published 2025-08-01
    “…This self-contained, edge-computing module integrates custom hardware with real-time machine learning and optical flow algorithms, enabling onboard water segmentation and river surface velocity estimation. …”
    Get full text
    Article
  20. 140

    Discovering the backbone network with a novel designed ant colony algorithm by Fang LYU, Jun BAI, Junheng HUANG, Bailing WANG

    Published 2020-11-01
    “…Forthe problem that in interactive network,the illegal and abnormal behaviors were becoming more hidden,moreover,the complex relation in real interactive network heightens the difficulty of detecting anomalous entities,an ant colony model was proposed for extracting the backbone network from the complex interactive network.The novel model simulated the relationships among entities based on the theory of path optimization,reduced the network size after quantifying the significance of each flow of information.Firstly,a strategy of initial location selection was proposed taking advantage of network centrality.Secondly,a novel path transfer mechanism was devised for the ant colony to fit the flow behavior of entities.Finally,an adaptive and dynamic pheromone update mechanism was designed for guiding the optimization of information flows.The experimental results show that the proposed model is superior to the traditional ant colony algorithm in both solving quality and solving performance,and has better coverage and accuracy than the greedy algorithm.…”
    Get full text
    Article