Search alternatives:
flow » low (Expand Search)
Showing 141 - 160 results of 455 for search 'flow detection algorithm', query time: 0.12s Refine Results
  1. 141
  2. 142

    Tracking Lava Flow Cooling from Space: Implications for Erupted Volume Estimation and Cooling Mechanisms by Simone Aveni, Gaetana Ganci, Andrew J. L. Harris, Diego Coppola

    Published 2025-07-01
    “…Here, we present an alternative approach based on the post-eruptive Thermal InfraRed (TIR) signal, using the recently proposed VRP<sub>TIR</sub> method to quantify radiative energy loss during lava flow cooling. We identify thermally anomalous pixels in VIIRS I5 scenes (11.45 µm, 375 m resolution) using the TIRVolcH algorithm, this allowing the detection of subtle thermal anomalies throughout the cooling phase, and retrieve lava flow area by fitting theoretical cooling curves to observed VRP<sub>TIR</sub> time series. …”
    Get full text
    Article
  3. 143

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  4. 144

    An Entropy Based Anomaly Traffic Detection Approach in SDN by Mingxin Wang, Huachun Zhou, Jia Chen, Hongke Zhang

    Published 2015-09-01
    “…As the anomaly patterns were detected, the security center would cooperate with the central controller to install the flow table to alleviate the influence of the attack. …”
    Get full text
    Article
  5. 145

    Improved printed circuit board defect detection scheme by Lufeng Bai, Wen Hao Xu

    Published 2025-01-01
    “…Compared to the original YOLOv8 algorithm, this algorithm improves the average accuracy on small targets by $$5.5\%$$ for mAP50.…”
    Get full text
    Article
  6. 146

    Equivalence Between Optical Flow, the Unrest Index, and Walking Distance to Estimate the Welfare of Broiler Chickens by Danilo Florentino Pereira, Irenilza de Alencar Nääs, Saman Abdanan Mehdizadeh

    Published 2025-05-01
    “…Optical Flow velocity metrics (mean, variance, skewness, and kurtosis) were extracted using the Farnebäck algorithm. …”
    Get full text
    Article
  7. 147

    Detection and Optimization of Traffic Networks Based on Voronoi Diagram by Rui Tao, Jian Liu, Yuqing Song, Rui Peng, Dali Zhang, Jiangang Qiao

    Published 2021-01-01
    “…We present a traffic peak detection method, which constructs the Voronoi diagram of the input traffic flow data and computes the prominence of candidate peak points using the diagram. …”
    Get full text
    Article
  8. 148

    Advanced algorithms for UAV tracking of targets exhibiting start-stop and irregular motion by Dinesh Kumar Nishad, Saifullah Khalid, Dharmendra Prakash, Vinay Kumar Singh, Priyanka Sahani

    Published 2025-08-01
    “…Conventional tracking algorithms, typically based on the assumption of constant velocity, are poorly suited for such dynamic scenarios. …”
    Get full text
    Article
  9. 149

    Exact Quantum Algorithms for Quantum Phase Recognition: Renormalization Group and Error Correction by Ethan Lake, Shankar Balasubramanian, Soonwon Choi

    Published 2025-03-01
    “…We explore the relationship between renormalization-group (RG) flow and error correction by constructing quantum algorithms that exactly recognize one-dimensional symmetry-protected topological (SPT) phases protected by finite internal Abelian symmetries. …”
    Get full text
    Article
  10. 150

    Visualization of Anomalies using Graph-Based Anomaly Detection by Ramesh Paudel, Lauren Tharp, Dulce Kaiser, William Eberle, Gerald Gannod

    Published 2021-04-01
    “…Network protocol analyzers such asWireshark are valuable for analyzing network traffic but pose a challenge in that it can be difficult to determine which behaviors are out of the ordinary due to the volume of data that must be analyzed. Network anomaly detection systems can provide vital insights to security analysts to supplement protocol analyzers, but this feedback can be difficult to interpret due to the complexity of the algorithms used and the lack of context to determine the reasoning for which an event was labeled as anomalous. …”
    Get full text
    Article
  11. 151

    Overcoming Stagnation in Metaheuristic Algorithms with MsMA’s Adaptive Meta-Level Partitioning by Matej Črepinšek, Marjan Mernik, Miloš Beković, Matej Pintarič, Matej Moravec, Miha Ravber

    Published 2025-05-01
    “…When stagnation occurs, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>M</mi><mi>s</mi><mi>M</mi><mi>A</mi></mrow></semantics></math></inline-formula> divides the optimization run into partitions, restarting the MA for each partition with function evaluations guided by solution history, enhancing efficiency without modifying the MA’s internal logic, unlike algorithm-specific stagnation controls. The experimental results on the CEC’24 benchmark suite, which includes 29 diverse test functions, and on a real-world Load Flow Analysis (LFA) optimization problem demonstrate that MsMA consistently enhances the performance of all tested algorithms. …”
    Get full text
    Article
  12. 152

    Intelligent Analysis of Flow Field in Cleaning Chamber for Combine Harvester Based on YOLOv8 and Reasoning Mechanism by Qinglin Li, Ruihai Wan, Zhaoyue Wu, Yuting Yan, Xihan Zhang

    Published 2025-02-01
    “…This paper studied an intelligent method to analyze simulation result data which is based on the object detection algorithm and the reasoning mechanism. YOLOv8, one of the deep learning object detection algorithms, was selected to identify key-point data from the flow field in a cleaning chamber. …”
    Get full text
    Article
  13. 153

    ANTi-JAM solutions for smart roads: Ant-inspired traffic flow rules under CAVs environment by Marco Guerrieri, Nicola Pugno

    Published 2025-01-01
    “…The macroscopic traffic flow variables of interest were estimated using the deep learning method and the YOLO detection algorithm. …”
    Get full text
    Article
  14. 154

    Multivariate Machine Learning Model Based on YOLOv8 for Traffic Flow Prediction in Intelligent Transportation Systems by Fukui Wu, Hanzhong Tan, Linfeng Zhang, Shuangbing Wen, Tao Hu

    Published 2025-01-01
    “…Subsequently, five machine learning algorithms and three deep learning algorithms are employed to predict traffic flow. …”
    Get full text
    Article
  15. 155

    DIO-SLAM: A Dynamic RGB-D SLAM Method Combining Instance Segmentation and Optical Flow by Lang He, Shiyun Li, Junting Qiu, Chenhaomin Zhang

    Published 2024-09-01
    “…Feature points from moving objects can negatively impact the accuracy of Visual Simultaneous Localization and Mapping (VSLAM) algorithms, while detection or semantic segmentation-based VSLAM approaches often fail to accurately determine the true motion state of objects. …”
    Get full text
    Article
  16. 156

    An anomaly detection scheme for data stream in cold chain logistics. by Zhibo Xie, Heng Long, Chengyi Ling, Yingjun Zhou, Yan Luo

    Published 2025-01-01
    “…A measurement anomaly detection algorithm based on the improved isolated forest algorithm is proposed. …”
    Get full text
    Article
  17. 157

    Utilizing Calibration Model for Water Distribution Network Leakage Detection by Geumchae Shin, Soon Ho Kwon, Suhyun Lim, Seungyub Lee

    Published 2024-09-01
    “…The proposed model comprises two distinct algorithms: (1) PRC estimation using MCMC and (2) a leakage detection algorithm employing a Kolmogorov–Smirnov test. …”
    Get full text
    Article
  18. 158

    LDoS attack detection method based on traffic classification prediction by Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue

    Published 2022-03-01
    “…The experimental results show that the global LDoS attack traffic detection method based on the Hurst index and GBDT algorithm achieves better detection results under different attack rates.…”
    Get full text
    Article
  19. 159

    Energy optimization using adaptive control algorithm to enhance the performance of SDN_IOT environment by I. Varalakshmi, M. Thenmozhi

    Published 2025-03-01
    “…This paper presents an algorithm for detecting DDoS attacks earlier from the network using the entropy method and mitigating the attacks earlier using stochastic techniques. …”
    Get full text
    Article
  20. 160

    Detecting phishing gangs via taint analysis on the Ethereum blockchain by Kangrui Huang, Weili Chen, Zibin Zheng

    Published 2023-01-01
    “…Based on this, we propose a heuristics algorithm for phishing gang detection. And we also summarize gang patterns and reveal money laundering in phishing activities. …”
    Get full text
    Article